Skip to content

David Gomes

Breaking, Building, and Securing the Digital World. 🔐

  • Programming
    • Best practices
    • Quarkus
    • App Security
    • Observability
    • Git
  • Infrastructure
  • System Design
  • Pentesting
    • Bug Bounty
  • Reverse Engineering

Category: Exploitation

This category explains some concepts of exploits and how it’s done.

Exploitation · Pentesting · Reverse Engineering · Vulnhub

Brainpan: 1 – OSCP-Like Vulnhub Walkthrough

March 25, 2018January 23, 2022 David Gomes2 Comments

Yet another OSCP-Like Vulnhub machine, this one is recommended if you're looking to challenge your exploitation skills. Try it out by yourself first! Machine link: https://www.vulnhub.com/entry/brainpan-1,51/

Olá!

Welcome to my blog, where I explore topics of both Information Security and Software Development.

From secure coding practices to hacking techniques, system design and programming, everything Software related has a place here!

GitHub
StackOverflow
LinkedIn
GitHub
StackOverflow
LinkedIn

Love my content? Buy me a coffee!

Choose an amount

€1.00
€2.00
€5.00

Your contribution is appreciated :)

Donate
Create a website or blog at WordPress.com
  • Subscribe Subscribed
    • David Gomes
    • Already have a WordPress.com account? Log in now.
    • David Gomes
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...