Skip to content

Da VinciΒΆ

"Mess with the best, die like the rest."

You found it.

This section lives outside the main nav. No breadcrumbs. No search index. Just commands that don't belong anywhere respectable.

  • Recon & Enumeration


    Network discovery, port scanning, and passive OSINT.

    Recon

  • Password Attacks


    Wordlist attacks, hash cracking, credential spraying.

    Password attacks

  • Web Application


    Common web vulns, directory busting, and enumeration.

    Web

  • Windows / AD


    Post-exploitation, privilege escalation, and lateral movement in Windows environments.

    Windows & AD

  • WiFi Hacking


    Monitor mode, handshake capture, WPA/WPA2 cracking, PMKID attacks, and rogue APs.

    WiFi