Why subscribe?

This blog is for people who live in terminals, break things legally, and enjoy writing a good payload more than a good punchline. It’s a collection of walkthroughs, cheat sheets, and field notes from an ethical offensive security practitioner working through real CTFs, OSCP prep, and red team techniques. If that sounds like your scene, welcome.

Stay up-to-date

New posts land in your inbox without tracking scripts, SEO spam, or affiliate nonsense. It’s just clean technical content, archived and easy to reference later. The Substack app gives you offline reading and a decent comment UI, if you're into that.

Join the crew

Plenty of us came up reading pastebins, trading payloads, and quietly getting better. If you’ve ever reverse shelled an anime avatar or named a VM after a mech, you’ll probably fit in fine here. You don’t have to say much—just read, share if it helps, and drop a comment if you’ve got something clever to add.


About Me

I came up through government service, doing things we don’t put in writing and learning the trade from people who treat hex like a second language. These days, I work in offensive security in the private sector, still very much hands-on.

I hold a Master’s degree in Cybersecurity, along with certifications including CISSP, CEH, and I’m currently working toward OSCP. Most of what I publish here comes straight from lab notes, real-world pentesting prep, and the occasional rabbit hole I fell down on a weekend.

This blog is how I keep track of what works, what breaks, and what’s worth sharing. Hope it helps.

User's avatar

Subscribe to ToxSec

CTF and Bug Bounty walkthroughs from an independent security researcher.

People