Offensive Security Wiki

My personal wiki for offensive security.

Penetration testing, red teaming, vulnerability research, exploit development. Field notes, CVE deep-dives, and reference material I build up over time.

Start with the overview →

The four pillars

The disciplines this wiki covers. Each pillar links to its landing page.

Penetration Testing

Scoped, time-boxed assessments. Methodology, engagement types, reporting.

Red Teaming

Adversary emulation, full kill-chain. Stealth-first, OPSEC discipline.

Vulnerability Research

Code review, fuzzing, patch diffing — finding bugs nobody else has reported.

Exploit Development

Bug → primitive → reliable exploit. Mitigation-aware, version-portable.

Foundations & operator tradecraft

What you need to read, do, and use during an engagement — kill-chain stages, TTPs, runbooks, tools.

Concepts

99 pages — foundations + AD / cloud / web / mobile / Wi-Fi / networking

kill chain · ATT&CK · OPSEC · kerberoasting · LSASS dumping · DLL hijacking · EDR silencing

Techniques

11 pages — TTPs across operations and exploit dev

recon · initial access · priv-esc · lateral movement · persistence · ROP · UAF

Playbooks

4 pages — engagement runbooks

AD pentest · external · internal network · web app

Tools

28 pages — frameworks, debuggers, scanners, C2

nmap · Burp · Ghidra · Cobalt Strike · BloodHound · mimikatz · impacket

Resources

5 pages — reading lists, researchers, templates

reading list · researchers · papers & blogs · CVE template

Windows exploitation research

CVE deep-dives plus the kernel-mode and user-mode internals exercised by them. Start with the Windows research overview.

CVEs

29 deep-dive write-ups

CVE-2025-29824 (CLFS UAF) · CVE-2024-38063 (TCP/IP) · CVE-2024-30085 (cldflt) · SIGRed · CimFS

Kernel-mode exploitation

15 pages — drivers, subsystems, primitives, mitigations

architecture · CLFS · cldflt · IORING · WNF · kernel streaming · mitigations

User-mode exploitation

4 pages — heap, stack, browser, mitigations

heap internals · stack · browser · mitigations

Wi-Fi protocol research

The Wi-Fi research canon — from Pixie Dust WPS (2014) and KRACK (2017) through Dragonblood, FragAttacks, Framing Frames / MacStealer, TunnelCrack, SSID Confusion, PEAP/IWD bypass, MFP deauthentication, into the 2026 AirSnitch client-isolation work, and out into the ARP-over-GTK bridge-bypass primitive. The recurring theme: security-relevant decisions placed in unauthenticated framing fields, and defences placed at the wrong architectural layer.

Attacks

19 pages — protocol breaks across WEP / WPA / WPA2 / WPA3 / 802.1X / WPS

KRACK · Dragonblood · FragAttacks · Framing Frames · TunnelCrack · SSID Confusion · PEAP/IWD bypass · MFP deauth · Pixie Dust · abusing GTK · ARP over GTK · ARP spoofing · port stealing · gateway bouncing · broadcast reflection · rogue AP

Defenses

10 pages — controls that actually stop the attacks (AirSnitch + ARP-over-GTK)

group-key randomization · MACsec · VLANs · spoofing prevention · DAI · endpoint ARP hardening

Devices

1 page — AirSnitch vendor / router test results

tested devices — Tables I–III digest, which routers fail which tests.

Wi-Fi concepts

background needed to read the attacks — PHY, MAC, security, roaming, provisioning, networking

ARP · 802.11 standards · frequency bands · frame types · beacons · probes / PNL · key hierarchy · handshakes · SAE / Dragonfly · CCMP / GCMP · RSN IE · WPA versions · MFP / 802.11w · 802.1X · EAP · EAP-TLS · PEAP / TTLS · WEP · WPS · OWE · 802.11r FT · 802.11k+v · WNM / ANQP · DPP · Wi-Fi Direct / TDLS · Passpoint · client isolation · captive portals · monitor mode & injection

Source material

One provenance page per raw source file that fed the wiki — title, filename, status, excerpt. Raw text stays offline; this catalogue tracks what's been distilled into wiki pages and what's still pending.

All sources

147 provenance pages, grouped by origin

airsnitch · windows-exploit-research · offsec · blog

How this wiki works

I curate sources, take notes, and structure them as I read. Pages cross-reference each other; new sources extend existing pages rather than starting from scratch. See the schema for conventions and the log for what's been added when.