-
How to do a Security Review – An Example

Learn how to perform a complete Security Review for new product features—from scoping and architecture analysis to threat modeling and risk assessment. Using a real-world chatbot integration example, this guide shows how to identify risks, apply security guardrails, and deliver actionable recommendations before release.
-
Cyborg – TryHackMe Walkthrough

A step-by-step TryHackMe Cyborg walkthrough to achieve root access. Learn essential techniques for web enumeration, SSH access, and privilege escalation.
-
OverPass – TryHackMe Walkthrough

A step-by-step TryHackMe Overpass walkthrough, guiding you through reconnaissance, web enumeration, SSH access, and privilege escalation to root.
