I’m a security researcher building an AI-augmented offensive workflow. Most of my pentest work happens with Claude in the loop โ not as a magic oracle, but as a fast research assistant, payload analyst, and methodology critic.
This blog exists for three reasons:
- Transparency. Every writeup tells you where AI helped, where AI failed, and what I had to figure out manually. No magic.
- Methodology over flags. A pwn is just a checkpoint. The interesting question is how the thinking went.
- Public learning record. This is my white-hat trail โ for recruiters, for the Anthropic CVP review, for myself.
What you’ll find here
- ๐ข Starting Point โ Tier 0โ2 walkthroughs. Foundation, not flex.
- ๐ต Easy / Medium retired machines โ real portfolio.
- ๐ฃ CTF events (Cyber Apocalypse, Business CTF) โ published the day they end.
- ๐ค AI-assist log in every post โ exactly what I asked Claude, what it gave me, what I corrected.
Tooling
- Notes: Obsidian
- Writeup pipeline: Markdown โ Hugo โ Caddy on bare-metal Ubuntu
- AI: Claude Opus 4.7 via Claude Code (CVP-pending)
- Recon: nmap, ffuf, gobuster, BloodHound, kerbrute, evil-winrm
- Reporting: SysReptor for cert exams
Contact
Telegram: @pankratix