🛡️ Welcome to Cyber with KT Vault
Welcome to my personal Cybersecurity Knowledge Vault. This is a living “Digital Garden” documenting my research, labs, and findings in the world of offensive security. (Build Triggered: 2026-01-24)
🎯 Purpose & Goals
This vault serves as a comprehensive research journal and knowledge repository for my continuous journey in cybersecurity. It is structured to provide a transparent view of my technical evolution, methodology, and commitment to the infosec community.
My goal is to maintain a high standard of documentation that reflects:
- Technical Growth: A chronological record of solving complex security challenges and labs.
- Methodological Consistency: Documenting a structured and repeatable approach to reconnaissance, exploitation, and post-exploitation.
- Continuous Learning: Deep dives into emerging security tools, custom automation, and evolving threat landscapes.
- Open Knowledge Sharing: Contributing back to the community through clear, detailed, and actionable write-ups.
📂 Explore the Vault
🏁 Solved Machines
A comprehensive collection of walk-throughs and write-ups for various platforms:
- Hack The Box (HTB): Detailed methodologies for Linux and Windows targets.
- TryHackMe (THM): Path-based learning and lab completions.
- VulnHub & Proving Grounds: Offensive security practice notes.
📚 Knowledge Base
Practical guides and reference material for daily security work:
- Setup Tools: Custom automation scripts and environment configurations.
- Tool Usage: Cheat sheets and advanced techniques for standard industry tools (Nmap, Metasploit, Burp Suite, etc.).
- Methodologies: Structured checklists for different phases of a pentest.
🛠️ Tech Stack & Tools
- OS: Kali Linux, Parrot Security, Windows (AD Labs)
- Frameworks: Metasploit, Cobalt Strike (Educational), Mythic C2
- Scripting: Python, Bash, PowerShell
- Documentation: Markdown + Obsidian + Quartz
🤝 Connect with Me
“Security is not a product, but a process.” – Bruce Schneier