Foundations
Reference pages for planning, authorisation, scoping, documentation and delivery logic.
HackTheCoreResearch // Offensive Reference Platform
Move by surface, not by syllabus. The academy view groups the site into practical domains so you can jump straight into web, internal, cloud, API, mobile, identity, supply-chain, AI or industrial work without losing operational context.
Each domain opens into standalone reference notes, command-heavy pages and linked public material.
Reference pages for planning, authorisation, scoping, documentation and delivery logic.
Infrastructure-led offensive work from enumeration and credential pressure to pivoting and C2.
Host-level privilege paths across Linux, Windows and macOS with emphasis on verification and realism.
Application-security coverage spanning workflow, browser behaviour and exploitation logic.
Dedicated endpoint, token, object and schema abuse coverage beyond classic browser-led testing.
Provider identities, control planes, IaC drift, Kubernetes and cloud automation abuse.
Android and iOS testing, instrumentation, pinning bypass, storage and mobile reversing.
Entra, Okta, federation, token theft, consent abuse and tenant trust failures.
Signal capture, protocol analysis, rogue infrastructure and client-side wireless attack paths.
Payload staging, OPSEC, AV/EDR pressure, client-side chains and C2 tradecraft.
Git, CI/CD, runner abuse, package trust, signing, SBOM and build-system compromise.
Modbus, DNP3, PLC and HMI trust, segmentation drift and process manipulation risk.
Prompt injection, agent compromise, retrieval abuse, model APIs and offensive AI ops.
Autopilots, MAVLink, ROS, companion computers and field operator trust.
Payload engineering, shellcoding, analysis and exploit-oriented custom tooling.
Static and dynamic binary analysis across desktop and specialist targets.