Skip to content

Playbooks

This is where I document the flows — not just the tools, but the thinking behind them.
Each playbook is a repeatable method I’ve tested, broken, and rebuilt.
They’re not static recipes. They’re living tactics.

What belongs here

  • Recon
    How I scan, fingerprint, and map a target — quietly or loudly.

  • Enumeration
    Digging deeper: services, users, directories, and misconfigurations.

  • Exploitation
    Turning a weakness into access — with or without a known CVE.

  • Post-Exploitation
    What I do once inside: persistence, pivoting, data extraction.

  • Obstacle Handling
    What shuts me down — and how I adapt when it does.

Why this matters

Tools change. Targets change.
But the flow — the way I approach a problem — is what I train.

Each playbook is a snapshot of how I think through a challenge.
It’s where I sharpen my instincts and document the paths I’ve walked.

How I’ll use this space

Some playbooks will be polished — step-by-step guides with diagrams and notes.
Others will be raw — half-finished ideas, failed attempts, and lessons learned.

That mix is intentional.
This isn’t a trophy case. It’s a training ground.