Penetration Testing Write-Ups & Research
Welcome to my technical portfolio.
This space documents selected penetration testing exercises, vulnerability research, and exploitation walkthroughs performed in controlled environments such as Hack The Box.
Each write-up aims to demonstrate:
- A methodical approach to vulnerability identification and exploitation
- Clear documentation of tools, reasoning, and attack paths
- Actionable remediation guidance when applicable
๐ Categories
-
Machines
Step-by-step penetration test walkthroughs organized by difficulty and platform. -
Research
Technical notes on interesting vulnerabilities, configurations, or security mispractices.
๐ค About the Author
Jose Raul Bongiovani | b0nyo
Certified Penetration Testing Specialist (CPTS) | Penetration Tester | Offensive Security Enthusiast
With a focus on Active Directory exploitation, network enumeration, and post-exploitation techniques, my goal is to maintain a structured methodology consistent with professional red team and internal assessment standards.
Contact: LinkedIn ยท GitHub ยท Hack The Box
โPrecision, documentation, and reproducibility are key components of every effective penetration test.โ