archive.logs β€” 10 entries

Blog

Detailed guides, technical deep-dives, and documentation for my projects.

#Cerberus#DFIR#Blue Team#EDR#Threat Detection#MITRE ATT&CK#Python#Linux Security

Cerberus - A Real-Time Host Behavioral Forensics Agent

How we built an edge-analysis security agent that captures every command, detects attack chains in real time with 7 detectors and on-host ML, and reduces log volume by 90%+ before it ever leaves the host.

#Claude Opus 4.6#DFIR#HackTheBox#Sherlock#Windows Forensics#AI Agent#Incident Response

Hunter (Insane) from HackTheBox Sherlock investigated by Claude Opus 4.6 - DFIR

Claude Opus 4.6 autonomously investigated a compromised Windows workstation on HackTheBox. 13 out of 19 forensic questions correct on the first attempt, parsing EVTX, Prefetch, Registry, PCAP, and more on Linux.

#Claude Opus 4.6#AI Pentesting#HackTheBox#Autonomous Hacking#Claude Code#Red Team#AI Agent

Interpreter (Medium) from HackTheBox hacked by Claude Opus 4.6 - 20 min

Second experiment. Claude Opus 4.6 autonomously compromised the Interpreter machine on HackTheBox in 19 minutes and 56 seconds. 112 tool calls, zero human intervention.

#Claude Opus 4.6#AI Pentesting#HackTheBox#Autonomous Hacking#Claude Code#Red Team#AI Agent

Facts (Easy) from HackTheBox hacked by Claude Opus 4.6 - 22 min

I gave Claude Opus 4.6 a single prompt and watched it autonomously pwn a easy-difficulty HackTheBox machine in under 23 minutes. 132 tool calls, zero human intervention.

#Cyber Kill Chain#Unified Kill Chain#Detection & Response#Defensive

Detection Techniques

Detection & Response techniques based on Cyber Kill Chain and Unified Kill Chain.

#MS17-010#EternalBlue#Metasploit#Privilege Escalation#TryHackMe#Offensive

Blue

Deploy & hack into a Windows machine, leveraging common misconfigurations issues.

#SQLi#Joomla CMS#Cracking Hashes#Privilege Escalation#TryHackMe#Offensive

Daily Bugle

Compromise a Joomla CMS account via SQLi, practise cracking hashes and escalate your privileges by taking advantage of yum.

#ProFTPD#Samba#Privilege Escalation#PATH Hijacking#TryHackMe#Offensive

Kenobi

Walkthrough on exploiting a Linux machine. Enumerate Samba for shares, manipulate a vulnerable version of proftpd and escalate your privileges with path variable manipulation.

#Rejetto#HFS#Metasploit#PowerShell#Privilege Escalation#TryHackMe#Offensive

Steel Mountain

Hack into a Mr. Robot themed Windows machine. Use metasploit for initial access, utilise powershell for Windows privilege escalation enumeration and learn a new technique to get Administrator access.

#Active Reconnaissance#Web Application Attacks#Code Injection#Privilege Escalation#TryHackMe#Offensive

Vulnversity

Learn about active recon, web app attacks and privilege escalation.