|
Peter Kariuki — Cybersecurity student and penetration testing practitioner based in Kenya 🇰🇪, focused on offensive security and ethical hacking.
|
|
| Domain | Topics |
|---|---|
| 🌐 Web App Security | SQLi · XSS · SSRF · IDOR · LFI/RFI · CSRF · JWT Attacks |
| 🔌 Network Pentesting | Port Scanning · MITM · Sniffing · SMB · FTP · SSH Exploitation |
| 🔐 Password Attacks | Brute Force · Hash Cracking · Credential Stuffing · Rainbow Tables |
| 📁 Privilege Escalation | LinPEAS · WinPEAS · SUID · Cron Jobs · GTFOBins · Kernel Exploits |
| 🕵️ OSINT & Recon | Google Dorks · Shodan · TheHarvester · Maltego · DNS Enumeration |
| 🐛 Vulnerability Research | CVE Analysis · ExploitDB · Nuclei · Manual Code Review |
Documenting every machine, challenge, and vulnerability I learn from.
| # | Title | Category | Platform | Difficulty | Link |
|---|---|---|---|---|---|
| 01 | Coming Soon | Web Exploitation | TryHackMe | 🟢 Easy | — |
| 02 | Coming Soon | Privilege Escalation | HackTheBox | 🟠 Medium | — |
| 03 | Coming Soon | Network Pentesting | CTF Competition | 🔴 Hard | — |
| Status | Certification | Issuer | Target Date |
|---|---|---|---|
| 🟡 In Progress | eJPT — Junior Penetration Tester | INE / eLearnSecurity | Q2 2026 |
| 🟡 Studying | CompTIA Security+ | CompTIA | Q2 2026 |
| ⬜ Planned | CompTIA PenTest+ | CompTIA | Q3 2026 |
| ⬜ Planned | CEH — Certified Ethical Hacker | EC-Council | Q4 2026 |
| ⬜ Planned | PNPT — Practical Network Pentester | TCM Security | 2027 |
| ⬜ Planned | OSCP — Offensive Security Certified Pro | OffSec | 2027 |
| Platform | Focus | Sessions | Status |
|---|---|---|---|
| Web, Networks, Privilege Escalation | Weekly | 🟢 Active | |
| Machines & Pro Labs | Weekly | 🟢 Active | |
| Web App Vulnerability Labs | Daily | 🟡 Ongoing | |
| All Categories | Monthly | 🟢 Competing |
"You can't defend what you don't understand. Red team to learn. Blue team to protect."
| Domain | Skills & Concepts |
|---|---|
| 📊 SIEM & Log Analysis | Splunk SPL · Elastic Stack (ELK) · Log Correlation · Alert Tuning |
| 🚨 Incident Response | IR Playbooks · Evidence Collection · Containment · Eradication |
| 🔬 Digital Forensics | Volatility · FTK Imager · Autopsy · Memory Analysis · Disk Imaging |
| 🌐 Network Defense | Snort/Suricata IDS · Firewall Rules · Traffic Analysis · Anomaly Detection |
| 🦠 Threat Intelligence | MITRE ATT&CK · IOC Analysis · YARA Rules · VirusTotal · OSINT |
| 🔒 Endpoint Security | Wazuh EDR · File Integrity Monitoring · AV Evasion Detection |
| 🕵️ Threat Hunting | Hypothesis-Driven Hunting · Sigma Rules · Timeline Analysis |
┌─── DETECT ────────────────────────────────────────────────────┐
│ SIEM Alerts → IDS/IPS Triggers → Anomaly Baseline Deviation │
└──────────────────────────┬────────────────────────────────────┘
▼
┌─── TRIAGE ────────────────────────────────────────────────────┐
│ Alert Validation → False Positive Filtering → Priority Score │
└──────────────────────────┬────────────────────────────────────┘
▼
┌─── INVESTIGATE ───────────────────────────────────────────────┐
│ Log Correlation → IOC Lookup → TTPs Mapping (MITRE ATT&CK) │
└──────────────────────────┬────────────────────────────────────┘
▼
┌─── RESPOND ───────────────────────────────────────────────────┐
│ Containment → Eradication → Recovery → Lessons Learned │
└───────────────────────────────────────────────────────────────┘
| Category | Tools |
|---|---|
| 🔴 Scanners | Nmap · Masscan · Rustscan · Nikto · Nuclei |
| 🔴 Web Testing | Burp Suite · OWASP ZAP · SQLMap · ffuf · Gobuster |
| 🔴 Exploitation | Metasploit · ExploitDB · SearchSploit · msfvenom |
| 🔴 Password | Hashcat · John the Ripper · Hydra · Medusa · CeWL |
| 🔴 Post-Exploit | LinPEAS · WinPEAS · BloodHound · Mimikatz · Impacket |
| 🔴 OSINT | TheHarvester · Maltego · Shodan · Recon-ng · Sublist3r |
| 🔵 SIEM | Splunk · Elastic/Kibana · Wazuh · Graylog |
| 🔵 IDS / IPS | Snort · Suricata · Zeek · OSSEC |
| 🔵 Forensics | Volatility · Autopsy · FTK Imager · Binwalk · Strings |
| 🔵 Threat Intel | MISP · OpenCTI · VirusTotal · AbuseIPDB · Sigma Rules |
| 🔵 Traffic | Wireshark · tcpdump · NetworkMiner · Ettercap |
| ⚙️ Environment | Kali Linux · Parrot OS · Docker · VirtualBox · tmux |
| Platform | Handle | Link | |
|---|---|---|---|
| 📧 | G-Mail | ||
| 💼 | Peter Kariuki | ||
| 🐦 | Twitter / X | @BdMutant | |
| 🔐 | TryHackMe | peterkariukiwanj | |
| 💻 | HackTheBox | PKariuki007 | |
| 💬 | Text Only | ||
| 🌐 | Portfolio | Live Site |


