Foundations
Reference pages for planning, authorisation, scoping, documentation and delivery logic.
HackTheCoreAreas // Offensive domain map
Use Areas when you want the fastest route into a target class, technology stack or operator problem. Each card opens a dedicated hub with focused notes, selected public references and linked specialist material.
Core domains, specialist surfaces and support zones across the platform.
Reference pages for planning, authorisation, scoping, documentation and delivery logic.
Infrastructure-led offensive work from enumeration and credential pressure to pivoting and C2.
Host-level privilege paths across Linux, Windows and macOS with emphasis on verification and realism.
Application-security coverage spanning workflow, browser behaviour and exploitation logic.
Dedicated endpoint, token, object and schema abuse coverage beyond classic browser-led testing.
Provider identities, control planes, IaC drift, Kubernetes and cloud automation abuse.
Android and iOS testing, instrumentation, pinning bypass, storage and mobile reversing.
Entra, Okta, federation, token theft, consent abuse and tenant trust failures.
Signal capture, protocol analysis, rogue infrastructure and client-side wireless attack paths.
Payload staging, OPSEC, AV/EDR pressure, client-side chains and C2 tradecraft.
Git, CI/CD, runner abuse, package trust, signing, SBOM and build-system compromise.
Modbus, DNP3, PLC and HMI trust, segmentation drift and process manipulation risk.
Prompt injection, agent compromise, retrieval abuse, model APIs and offensive AI ops.
Autopilots, MAVLink, ROS, companion computers and field operator trust.
Payload engineering, shellcoding, analysis and exploit-oriented custom tooling.
Static and dynamic binary analysis across desktop and specialist targets.