TryHackMe Blue Walk-through
Full Windows box analysis chaining enumeration, exploitation, and proof of concept. Demonstrates end to end analytical workflow and technical reporting.
Hack The Box Crocodile Walk-through
End-to-end engagement showing service behavior, attack-path logic, and containment strategy. Reflects practical penetration testing methodology.
NMAP Scanning Procedures
Detailed record of scan commands, flag selection, and service enumeration steps. Shows how I translate network data into actionable insight.