/images/logo.png

The team is composed of 0xBlank, Pezzz and Steels, check the About us section for more informations. On this website you will find articles about :

  • Our path to pentest/red-team certifications
  • HackTheBox and CTF writeup
  • Presentation of homemade tools
  • Miscellaneous articles

Check out Flop.py Book a central repository of techniques, methodologies, and tools in several categories including Pentest, DFIR, OSINT & more !

Latest articles:

🕵️ HTB-Writeup : BROSCIENCE

Introduction Welcome to our new HackTheBox write-up! In this article, we will guide you through the steps we took to successfully compromise the targeted machine. BroScience is an Medium Linux machine. External Recon Let’s do some recon ! Nmap scan 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 └─$ nmap 10.10.11.195 -T4 -A -p- -Pn PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.

🛠️ OPSE Part 3: Create your own plugin

Introduction In this article, we’ll explain to you how to write your own plugin to extand and automate the OSINT process. By following this guide, developer’s plugins will be automatically added to the OPSE core. This article is part of a three-part series on the OPSE project. In this series of articles we will present different part of the project: Presentation of the tool w/ installation, usage and an example; A technical presentation of the tool, how it is thinked and coded; A guide to develop your own OPSE plugin !

🛠️ OPSE Part 2: Developing an OSINT framework in Python

Introduction In this article, we’ll explain OPSE, a tool that we developed during our school project to automate the OSINT process. This article is part of a three-part series on the OPSE project. In this series of articles we will present different part of the project: Presentation of the tool w/ installation, usage and an example; A technical presentation of the tool, how it is thinked and coded; A guide to develop your own OPSE plugin !

🕵️ HTB-Writeup : PHOTOBOMB

Introduction Welcome to our new HackTheBox write-up! In this article, we will guide you through the steps we took to successfully compromise the targeted machine. Photobomb is an Easy Linux machine. Recon nmap 1 2 3 4 5 6 7 8 9 10 └─$ rustscan -a 10.10.11.182 -b 2500 -- -T4 -Pn -sV -A PORT STATE SERVICE REASON VERSION 22/tcp open ssh syn-ack OpenSSH 8.2p1 Ubuntu 4ubuntu0.5 (Ubuntu Linux; protocol 2.

🕵️ HTB-Writeup : AMBASSADOR

Recon NMAP scan 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 PORT STATE SERVICE REASON VERSION 22/tcp open ssh syn-ack OpenSSH 8.2p1 Ubuntu 4ubuntu0.5 (Ubuntu Linux; protocol 2.0) 80/tcp open http syn-ack Apache httpd 2.4.41 ((Ubuntu)) |_http-generator: Hugo 0.94.2 | http-methods: |_ Supported Methods: POST OPTIONS HEAD GET |_http-server-header: Apache/2.4.41 (Ubuntu) |_http-title: Ambassador Development Server 3000/tcp open ppp?

🕵️ HTB-Writeup : UPDOWN

Introduction Welcome to our new HackTheBox write-up! In this article, we will guide you through the steps we took to successfully compromise the targeted machine. UpDown is an Medium Linux machine. Recon Let’s do some recon ! Nmap 1 2 3 4 5 6 7 8 9 10 11 12 └─$ nmap 10.10.11.177 -T4 -A -Pn -p- PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.5 (Ubuntu Linux; protocol 2.