blogroll: 44
This data as json
| id | title | url | description | category | slug | publish_date | status | confidence | importance | created_at | rss | last_post_date | last_post_title | last_checked | platform | username | publication_url |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 44 | 0xRick | https://0xrick.github.io/categories/hack-the-box/ | Ahmed Hesham aka 0xRick, a penetration tester interested in offensive security, OS internals, exploit and malware development. Shares CTF writeups, research, and personal notes. | HackTheBox / Offensive Security | 0xrick | 2025-06-19 | Active | certain | 6.0 | 2026-01-05 06:11:20 | https://0xrick.github.io/feed | 2022-11-03 | A dive into the PE file format - LAB 1: Writing a PE Parser | 2026-02-06T12:46:01.322Z |