# Cyber Codex

Welcome to the frontline of cybersecurity.\
This isn’t another blog full of recycled “Top 10 Security Tips.”\
This is where offensive security meets raw experience—real tools, real exploits, and real stories from the field.

I write for hackers, red teamers, and security pros who live for technical depth.

***

## Featured Reads

* **Weaponizing Automation: Crafting a Custom Recon Pipeline for Pentesters**
* **Cracking the Basics of Active Directory**
* **Kali GPT – The Future of Red Teaming is Here**
* **How Fake Cybersecurity Internships Exploit Beginners – and How to Spot Them**
* **Real-World Network Setups That Hackers Love**

***

## Hacker Journeys

* **My TryHackMe Journey (2022–2025)**
* **From Boot to Root: My HackTheBox Journey (2022–2025)**

***

## Offensive Playbooks & Cheat Sheets

* **Active Directory Cheat Sheet for 2025**
* **JWT Warfare: Obfuscation, Cracking, and Red Team Exploits**
* **Living Off the Land (LOTL): Turning Trusted Tools Into Silent Weapons**
* **Ultimate Technical Breakdown of the MITRE Ecosystem**

***

## Cloud & Enterprise Exploitation

* **Exploiting Misconfigurations in Azure, AWS, and GCP**
* **Initial Access via Microsoft Teams External Tenants**
* **Living Off the Cloud: Abusing Cloud Services for Red Teaming**
* **Network Time Protocol (NTP) Abuse for Enterprise Recon**

***

## Attack Simulations & Red Team Ops

* **Inside the Mind of a Red Teamer: A Realistic Attack Simulation**
* **Exploiting Kerberos Delegation in Active Directory in 2025**
* **The Art of Breaking OAuth: Real-World Exploits and Misuses**

***

## The Future of Cybercrime

* **AI-Powered Social Engineering: The New Cybercrime Playbook**
* **A Deep Dive Into the Ransomware Timeline and Its Shadow Empire**

***

This is a space for **hackers, defenders, and builders** who want to go beyond surface-level security content.\
Welcome to **the mindset of the adversary**—because understanding the attack is the only way to truly defend.
