I’m a security researcher building an AI-augmented offensive workflow. Most of my pentest work happens with Claude in the loop โ€” not as a magic oracle, but as a fast research assistant, payload analyst, and methodology critic.

This blog exists for three reasons:

  1. Transparency. Every writeup tells you where AI helped, where AI failed, and what I had to figure out manually. No magic.
  2. Methodology over flags. A pwn is just a checkpoint. The interesting question is how the thinking went.
  3. Public learning record. This is my white-hat trail โ€” for recruiters, for the Anthropic CVP review, for myself.

What you’ll find here

  • ๐ŸŸข Starting Point โ€” Tier 0โ€“2 walkthroughs. Foundation, not flex.
  • ๐Ÿ”ต Easy / Medium retired machines โ€” real portfolio.
  • ๐ŸŸฃ CTF events (Cyber Apocalypse, Business CTF) โ€” published the day they end.
  • ๐Ÿค– AI-assist log in every post โ€” exactly what I asked Claude, what it gave me, what I corrected.

Tooling

  • Notes: Obsidian
  • Writeup pipeline: Markdown โ†’ Hugo โ†’ Caddy on bare-metal Ubuntu
  • AI: Claude Opus 4.7 via Claude Code (CVP-pending)
  • Recon: nmap, ffuf, gobuster, BloodHound, kerbrute, evil-winrm
  • Reporting: SysReptor for cert exams

Contact

Telegram: @pankratix