Writeups | Tips & Tricks | Checklists | Resources

This blog serves as my personal knowledge base and documentation platform. Here, I share CTF writeups, practical tips, methodologies, checklists, and other cybersecurity-related content that I use in my learning and work.


Writeups

Detailed walkthroughs and methodologies for solving vulnerable machines and CTF challenges.

Explore : Writeups 🔗


Resources

A collection of tools, scripts, mindmaps, and references I use or recommend.

Explore : Resources 🔗


Tips & Tricks

Quick notes, commands, and techniques that help with pentesting, automation, and workflow efficiency.

Explore : Cheetsheets 🔗


Checklists

Practical checklists for various phases of an engagement—reconnaissance, privilege escalation, post-exploitation, and reporting.

Coming soon…


Maintained by Heshan Perera — documenting the path of a hacker, one post at a time.