Forem

Devon Argent profile picture

Devon Argent

404 bio not found

Joined Joined on 
Day 23: Python Import Hijacking & The Writable Directory Trap 🕵️‍♂️

Day 23: Python Import Hijacking & The Writable Directory Trap 🕵️‍♂️

Comments
1 min read
Day 22: Exploiting systemd & Writable Files — The "Silent" Path to Root 🕵️‍♂️

Day 22: Exploiting systemd & Writable Files — The "Silent" Path to Root 🕵️‍♂️

Comments
1 min read
Day 21: PATH Hijacking & Cron Exploitation — The Automation Trap 🕵️‍♂️

Day 21: PATH Hijacking & Cron Exploitation — The Automation Trap 🕵️‍♂️

Comments
1 min read
Day 20: SUID Deep-Dive — From Zip to Tar Exploitation 🕵️‍♂️

Day 20: SUID Deep-Dive — From Zip to Tar Exploitation 🕵️‍♂️

1
Comments
1 min read
Day 19: Linux Capabilities — The "Silent" Path to Root 🕵️‍♂️

Day 19: Linux Capabilities — The "Silent" Path to Root 🕵️‍♂️

Comments
1 min read
Day 18: The Danger of Wildcards (*) & Library Injection 🕵️‍♂️

Day 18: The Danger of Wildcards (*) & Library Injection 🕵️‍♂️

1
Comments
1 min read
title: Day 17: Deep Dive into Privilege Inheritance & Capability Abuse 🕵️‍♂️

title: Day 17: Deep Dive into Privilege Inheritance & Capability Abuse 🕵️‍♂️

1
Comments
1 min read
Day 16: The Linux Auditor’s Roadmap — Post-Exploitation Mastery 🕵️‍♂️

Day 16: The Linux Auditor’s Roadmap — Post-Exploitation Mastery 🕵️‍♂️

Comments
1 min read
Day 15: The Post-Exploit Workflow — Stabilization & Escalation 🛡️ published: true

Day 15: The Post-Exploit Workflow — Stabilization & Escalation 🛡️ published: true

Comments
1 min read
Day 14: Linux Local Privilege Escalation — The Auditor's Roadmap 🕵️‍♂️

Day 14: Linux Local Privilege Escalation — The Auditor's Roadmap 🕵️‍♂️

Comments
1 min read
Day 13: Mastering LD_PRELOAD Privilege Escalation 🛡️

Day 13: Mastering LD_PRELOAD Privilege Escalation 🛡️

Comments
1 min read
Day 12: Auditing Linux Privilege Escalation Vectors 🕵️‍♂️

Day 12: Auditing Linux Privilege Escalation Vectors 🕵️‍♂️

Comments
1 min read
Day 11: Auditing Linux Privilege Escalation Vectors 🕵️‍♂️

Day 11: Auditing Linux Privilege Escalation Vectors 🕵️‍♂️

Comments
1 min read
Day 10: Advanced Privilege Escalation & Security Audits 🕵️‍♂️

Day 10: Advanced Privilege Escalation & Security Audits 🕵️‍♂️

1
Comments
1 min read
Day 9: Understanding Privilege Escalation & SUID Mechanics 🛡️

Day 9: Understanding Privilege Escalation & SUID Mechanics 🛡️

1
Comments
1 min read
Day 8: User Lifecycle Management — From Onboarding to Security Audits 🔐

Day 8: User Lifecycle Management — From Onboarding to Security Audits 🔐

1
Comments
1 min read
Day 7: Linux Collaborative Security — Mastering SetGID 🛡️

Day 7: Linux Collaborative Security — Mastering SetGID 🛡️

1
Comments
1 min read
Day 6: Architecting Project Phoenix — Housekeeping & Archiving 📦

Day 6: Architecting Project Phoenix — Housekeeping & Archiving 📦

Comments
1 min read
Day 5: Managing Users, Groups, and Shells in Linux 🐧

Day 5: Managing Users, Groups, and Shells in Linux 🐧

Comments
1 min read
Day 4: Deciphering the "rwxr-x---" Mystery (Linux Permissions) 🛡️

Day 4: Deciphering the "rwxr-x---" Mystery (Linux Permissions) 🛡️

2
Comments
1 min read
Day 3: Reading and Comparing Files via CLI 🛠️

Day 3: Reading and Comparing Files via CLI 🛠️

1
Comments
1 min read
Day 2: Navigating Linux Like a Pro (CRUD for Files) 📂

Day 2: Navigating Linux Like a Pro (CRUD for Files) 📂

Comments
2 min read
Day 1: My Minimalist Database Setup on macOS 🚀

Day 1: My Minimalist Database Setup on macOS 🚀

Comments
1 min read
loading...