<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>zx10r blog</title><link>https://portfolio.aimansam.my/blog/</link><description>Recent content on zx10r blog</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Sat, 09 May 2026 18:40:00 +0800</lastBuildDate><atom:link href="https://portfolio.aimansam.my/blog/index.xml" rel="self" type="application/rss+xml"/><item><title>Active Directory Lab Notes</title><link>https://portfolio.aimansam.my/blog/posts/active-directory-lab-notes/</link><pubDate>Sat, 09 May 2026 18:40:00 +0800</pubDate><guid>https://portfolio.aimansam.my/blog/posts/active-directory-lab-notes/</guid><description>Notes from building and attacking an Active Directory lab, with emphasis on enumeration, trust relationships, and privilege escalation paths.</description></item><item><title>Web Exploitation Workflow</title><link>https://portfolio.aimansam.my/blog/posts/web-exploitation-workflow/</link><pubDate>Sat, 09 May 2026 11:10:00 +0800</pubDate><guid>https://portfolio.aimansam.my/blog/posts/web-exploitation-workflow/</guid><description>A practical workflow I use for approaching web targets in labs and CTFs, from surface mapping to exploit validation.</description></item><item><title>My First CTF</title><link>https://portfolio.aimansam.my/blog/posts/my-first-ctf/</link><pubDate>Wed, 06 May 2026 00:34:31 +0800</pubDate><guid>https://portfolio.aimansam.my/blog/posts/my-first-ctf/</guid><description>A short walkthrough of my first rooted CTF target, from initial enumeration to privilege escalation.</description></item></channel></rss>