Skip to content

TheM3chaniK/BlackHex

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

⚔️ Operation BlackHex — TheM3chanik’s Personal Offensive Security Lab

Author: TheM3chanik
Mission: To break, build, and truly understand everything from the lowest bit to the highest exploit chain.


🧩 What is BlackHex?

BlackHex is my fully personalized, self-curated lab for mastering offensive security, covering:

  • 🔍 Reverse Engineering
  • 🕷️ Exploit Development
  • 🧬 Kernel Hacking
  • 🔓 Hardware Hacking
  • 🌐 Web & Bug Bounty
  • 🕵️ Digital Forensics & Incident Response
  • 🧠 Cryptography Attacks
  • 🛡️ Red/Blue Team Tactics
  • 🗂️ Private Research & Custom Tools

If it can be hacked, reversed, fuzzed, exploited, or secured — it belongs here.


🗂️ Structure

The lab is organized into topic directories like:

0_Core_Foundations/
├─ Linux_Basics_PrivEsc/
├─ Networking_DeepDive/
├─ Python_Automation_Tools/
├─ C_C++_System_Programming/  
1_Reverse_Engineering/
├─ Assembly_Fundamentals/
├─ Static_Analysis_Basics/
├─ Dynamic_Analysis_Debugging/
├─ Crackmes_Challenge_Ladder/
2_Exploit_Development/
├─ Intro_BOF_Practice/
├─ ROP_Basics/
3_Kernel_Hacking/
├─ Linux_Kernel_Internals/
4_Hardware_Hacking/
├─ Hardware_Basics_UART_JTAG/
5_Web_Application_Security/
├─ OWASP_Top10_Practical/
6_Cryptography/
├─ Crypto_Basics_Breaking/
7_Forensics/
├─ PCAP_Analysis_Basics/
8_Red_Blue_Team/
├─ Offensive_AD_Attacks/
9_Bug_Bounty/
├─ RealScope_OSINT/
10_Projects_Documentation/
├─ Custom_Exploits/

Each subtopic contains a checklist.md:

  • ✅ Tasks divided into Basics, Intermediate, Advanced
  • Real, practical steps — not generic theory
  • Fully version-controlled

✍️ How to Use

  • Clone the repo to your local machine.

  • Pick a topic folder (e.g. 1_Reverse_Engineering/Assembly_Fundamentals).

  • Open checklist.md and start working through tasks:

    • - [ ] = TODO
    • - [x] = DONE
  • Commit your progress:

    git add .
    git commit -m "Marked Crackmes basic tasks as done"
    git push
  • Use the included check_progress.py to track how much is done:

    python3 check_progress.py

📈 How it Works

📂 The script recursively scans all directories for checklist.md files and counts completed [x] vs pending [ ] tasks. Stay honest with your progress — this is your training ground, not filler fluff.


🎯 Goal

By the end, Operation BlackHex should cover ~80–90% of the practical skillset needed to:

  • Crack CTFs and real-world bounties.
  • Research new exploits.
  • Build tools that replace industry standards.
  • Push deeper — into your own custom hacking challenges.

🕳️ Notes to Self

  • If it’s too easy → raise the difficulty.
  • If something is missing → add your own folders.
  • If it’s too quiet → break something real.

🧵 TheM3chanik’s Motto

To understand something, you have to break it first.


🕹️ License

Personal, private, and evolving. Feel free to fork the structure — but the exploits, writeups, and secrets stay mine.

⚙️ Let’s break everything. Build everything. And keep it hexed.

🖤 — TheM3chanik


About

A personalized, full-stack offensive security lab by TheM3chanik — break everything, learn everything.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages