Author: TheM3chanik
Mission: To break, build, and truly understand everything from the lowest bit to the highest exploit chain.
BlackHex is my fully personalized, self-curated lab for mastering offensive security, covering:
- 🔍 Reverse Engineering
- 🕷️ Exploit Development
- 🧬 Kernel Hacking
- 🔓 Hardware Hacking
- 🌐 Web & Bug Bounty
- 🕵️ Digital Forensics & Incident Response
- 🧠 Cryptography Attacks
- 🛡️ Red/Blue Team Tactics
- 🗂️ Private Research & Custom Tools
If it can be hacked, reversed, fuzzed, exploited, or secured — it belongs here.
The lab is organized into topic directories like:
0_Core_Foundations/
├─ Linux_Basics_PrivEsc/
├─ Networking_DeepDive/
├─ Python_Automation_Tools/
├─ C_C++_System_Programming/
1_Reverse_Engineering/
├─ Assembly_Fundamentals/
├─ Static_Analysis_Basics/
├─ Dynamic_Analysis_Debugging/
├─ Crackmes_Challenge_Ladder/
2_Exploit_Development/
├─ Intro_BOF_Practice/
├─ ROP_Basics/
3_Kernel_Hacking/
├─ Linux_Kernel_Internals/
4_Hardware_Hacking/
├─ Hardware_Basics_UART_JTAG/
5_Web_Application_Security/
├─ OWASP_Top10_Practical/
6_Cryptography/
├─ Crypto_Basics_Breaking/
7_Forensics/
├─ PCAP_Analysis_Basics/
8_Red_Blue_Team/
├─ Offensive_AD_Attacks/
9_Bug_Bounty/
├─ RealScope_OSINT/
10_Projects_Documentation/
├─ Custom_Exploits/
Each subtopic contains a checklist.md:
- ✅ Tasks divided into Basics, Intermediate, Advanced
- Real, practical steps — not generic theory
- Fully version-controlled
-
Clone the repo to your local machine.
-
Pick a topic folder (e.g.
1_Reverse_Engineering/Assembly_Fundamentals). -
Open
checklist.mdand start working through tasks:- [ ]= TODO- [x]= DONE
-
Commit your progress:
git add . git commit -m "Marked Crackmes basic tasks as done" git push
-
Use the included check_progress.py to track how much is done:
python3 check_progress.py
📂 The script recursively scans all directories for checklist.md files and counts completed [x] vs pending [ ] tasks. Stay honest with your progress — this is your training ground, not filler fluff.
By the end, Operation BlackHex should cover ~80–90% of the practical skillset needed to:
- Crack CTFs and real-world bounties.
- Research new exploits.
- Build tools that replace industry standards.
- Push deeper — into your own custom hacking challenges.
- If it’s too easy → raise the difficulty.
- If something is missing → add your own folders.
- If it’s too quiet → break something real.
To understand something, you have to break it first.
Personal, private, and evolving. Feel free to fork the structure — but the exploits, writeups, and secrets stay mine.
⚙️ Let’s break everything. Build everything. And keep it hexed.
🖤 — TheM3chanik