Cyber Codex

Offensive Security, Real-World Exploits, and Hacker Insights

Welcome to the frontline of cybersecurity. This isn’t another blog full of recycled “Top 10 Security Tips.” This is where offensive security meets raw experience—real tools, real exploits, and real stories from the field.

I write for hackers, red teamers, and security pros who live for technical depth.


  • Weaponizing Automation: Crafting a Custom Recon Pipeline for Pentesters

  • Cracking the Basics of Active Directory

  • Kali GPT – The Future of Red Teaming is Here

  • How Fake Cybersecurity Internships Exploit Beginners – and How to Spot Them

  • Real-World Network Setups That Hackers Love


Hacker Journeys

  • My TryHackMe Journey (2022–2025)

  • From Boot to Root: My HackTheBox Journey (2022–2025)


Offensive Playbooks & Cheat Sheets

  • Active Directory Cheat Sheet for 2025

  • JWT Warfare: Obfuscation, Cracking, and Red Team Exploits

  • Living Off the Land (LOTL): Turning Trusted Tools Into Silent Weapons

  • Ultimate Technical Breakdown of the MITRE Ecosystem


Cloud & Enterprise Exploitation

  • Exploiting Misconfigurations in Azure, AWS, and GCP

  • Initial Access via Microsoft Teams External Tenants

  • Living Off the Cloud: Abusing Cloud Services for Red Teaming

  • Network Time Protocol (NTP) Abuse for Enterprise Recon


Attack Simulations & Red Team Ops

  • Inside the Mind of a Red Teamer: A Realistic Attack Simulation

  • Exploiting Kerberos Delegation in Active Directory in 2025

  • The Art of Breaking OAuth: Real-World Exploits and Misuses


The Future of Cybercrime

  • AI-Powered Social Engineering: The New Cybercrime Playbook

  • A Deep Dive Into the Ransomware Timeline and Its Shadow Empire


This is a space for hackers, defenders, and builders who want to go beyond surface-level security content. Welcome to the mindset of the adversary—because understanding the attack is the only way to truly defend.

Last updated