Privilege Escalation using Text Editors Write-up
Explains how insecure configurations enable privilege escalation and demonstrates proper mitigation awareness.
Bind and Reverse Shell Reference Guide
Outlines shell types, connection handling, and post-exploitation access techniques. Shows strong understanding of remote access control.
Metasploit Framework Exploitation Guide
Documents exploit module use, payload configuration, and validation of successful compromise. Reflects practical offensive testing ability.