<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Grindlab</title><description>Grindlab — where grind meets lab.</description><link>https://grindlab.dev/</link><item><title>HTB Administrator</title><link>https://grindlab.dev/blog/htb-administrator/</link><guid isPermaLink="true">https://grindlab.dev/blog/htb-administrator/</guid><description>Solving HTB Administrator</description><pubDate>Wed, 08 Apr 2026 19:36:00 GMT</pubDate></item><item><title>HTB Tabby</title><link>https://grindlab.dev/blog/htb-tabby/</link><guid isPermaLink="true">https://grindlab.dev/blog/htb-tabby/</guid><description>Hack The Box Tabby writeup. Exploiting Local File Inclusion (LFI) to read Tomcat configuration files and extract sensitive credentials.</description><pubDate>Fri, 03 Apr 2026 19:26:00 GMT</pubDate></item><item><title>XSS Notes</title><link>https://grindlab.dev/blog/cross-site-scripting/</link><guid isPermaLink="true">https://grindlab.dev/blog/cross-site-scripting/</guid><description>Comprehensive notes and practical examples covering Cross-Site Scripting (XSS) vulnerabilities and payloads.</description><pubDate>Tue, 27 Jan 2026 07:42:00 GMT</pubDate></item><item><title>Web Fuzzing Notes</title><link>https://grindlab.dev/blog/web-fuzzing/</link><guid isPermaLink="true">https://grindlab.dev/blog/web-fuzzing/</guid><description>Notes on discovering hidden web directories and parameters using fuzzing tools like ffuf, feroxbuster, and gobuster.</description><pubDate>Mon, 26 Jan 2026 00:02:00 GMT</pubDate></item><item><title>Setup Android Hacking Lab on Arch Linux with Frida and Burpsuite</title><link>https://grindlab.dev/blog/setup-lab/</link><guid isPermaLink="true">https://grindlab.dev/blog/setup-lab/</guid><description>Step-by-step guide to configuring a robust Android hacking lab on Arch Linux using Frida, Burpsuite, and AVD.</description><pubDate>Wed, 14 Jan 2026 13:24:00 GMT</pubDate></item><item><title>HTB Eighteen</title><link>https://grindlab.dev/blog/htb-eighteen/</link><guid isPermaLink="true">https://grindlab.dev/blog/htb-eighteen/</guid><description>Hack The Box Eighteen writeup. Exploiting MSSQL impersonation, extracting hashes, and WinRM password spraying for initial foothold.</description><pubDate>Fri, 19 Dec 2025 23:20:00 GMT</pubDate></item><item><title>HTB Expressway</title><link>https://grindlab.dev/blog/htb-expressway/</link><guid isPermaLink="true">https://grindlab.dev/blog/htb-expressway/</guid><description>Hack The Box Expressway writeup. Enumerating UDP port 500 for IKE/IPSec, cracking PSK, and exploiting a custom sudo vulnerability (CVE-2025-32463) for root.</description><pubDate>Fri, 05 Dec 2025 17:39:00 GMT</pubDate></item><item><title>HTB Cheat Sheet</title><link>https://grindlab.dev/blog/htb-cheatsheet/</link><guid isPermaLink="true">https://grindlab.dev/blog/htb-cheatsheet/</guid><description>A curated collection of essential payloads, commands, and resources for Hack The Box and general penetration testing.</description><pubDate>Fri, 05 Dec 2025 00:01:00 GMT</pubDate></item><item><title>Nyoba LLM</title><link>https://grindlab.dev/blog/llm-from-scratch/</link><guid isPermaLink="true">https://grindlab.dev/blog/llm-from-scratch/</guid><description>Personal study notes and code explanations based on Build a Large Language Model (From Scratch) by Sebastian Raschka.</description><pubDate>Thu, 21 Aug 2025 05:18:00 GMT</pubDate></item><item><title>Manual Crafting Shellcode</title><link>https://grindlab.dev/blog/manual-craft-shellcode-injection/</link><guid isPermaLink="true">https://grindlab.dev/blog/manual-craft-shellcode-injection/</guid><description>A deep dive into suffering: manually crafting a custom &apos;cat /flag&apos; shellcode in assembly from scratch.</description><pubDate>Sun, 10 Aug 2025 00:00:00 GMT</pubDate></item><item><title>Challenge Semalam Belajar Tanpa AI - Day 4</title><link>https://grindlab.dev/blog/challenge-no-ai-day-4/</link><guid isPermaLink="true">https://grindlab.dev/blog/challenge-no-ai-day-4/</guid><description>Day 4 of the No-AI challenge: analyzing the Obfuscated malware challenge and verifying file hashes.</description><pubDate>Tue, 05 Aug 2025 00:00:00 GMT</pubDate></item><item><title>Challenge Semalam Belajar Tanpa AI - Day 3</title><link>https://grindlab.dev/blog/challenge-no-ai-day-3/</link><guid isPermaLink="true">https://grindlab.dev/blog/challenge-no-ai-day-3/</guid><description>Day 3 of the No-AI challenge: focusing on initial malware analysis and malicious script deobfuscation.</description><pubDate>Sun, 03 Aug 2025 00:00:00 GMT</pubDate></item><item><title>Challenge Semalam Belajar Tanpa AI - Day 2</title><link>https://grindlab.dev/blog/challenge-no-ai-day-2/</link><guid isPermaLink="true">https://grindlab.dev/blog/challenge-no-ai-day-2/</guid><description>Day 2 of the No-AI challenge: exploring blue team tactics, DFIR, and network forensics using Wireshark.</description><pubDate>Fri, 01 Aug 2025 00:00:00 GMT</pubDate></item><item><title>Challenge Semalam Belajar Tanpa AI - Day 1</title><link>https://grindlab.dev/blog/challenge-no-ai-day-1/</link><guid isPermaLink="true">https://grindlab.dev/blog/challenge-no-ai-day-1/</guid><description>Day 1 of my personal challenge: diving into memory corruption and pwn concepts entirely without AI assistance.</description><pubDate>Thu, 31 Jul 2025 00:00:00 GMT</pubDate></item><item><title>Return Oriented Programming</title><link>https://grindlab.dev/blog/rop/</link><guid isPermaLink="true">https://grindlab.dev/blog/rop/</guid><description>Learning binary exploitation through Return Oriented Programming (ROP), focusing on POP RDI gadgets and execution flows.</description><pubDate>Tue, 29 Jul 2025 00:00:00 GMT</pubDate></item><item><title>Introduction To Shellcode Injection with Shellcraft</title><link>https://grindlab.dev/blog/basic-shellcode-injection/</link><guid isPermaLink="true">https://grindlab.dev/blog/basic-shellcode-injection/</guid><description>A beginner-friendly guide to writing and injecting shellcode using Shellcraft for binary exploitation.</description><pubDate>Tue, 22 Jul 2025 07:06:00 GMT</pubDate></item><item><title>Buffer Overflow dan ret2win</title><link>https://grindlab.dev/blog/buffer-overflow/</link><guid isPermaLink="true">https://grindlab.dev/blog/buffer-overflow/</guid><description>Detailed walkthrough and personal notes on solving basic buffer overflow and ret2win challenges.</description><pubDate>Fri, 18 Jul 2025 21:43:00 GMT</pubDate></item><item><title>Path Traversal Notes</title><link>https://grindlab.dev/blog/path-traversal/</link><guid isPermaLink="true">https://grindlab.dev/blog/path-traversal/</guid><description>Security research notes and payload examples for identifying and exploiting Path Traversal (LFI/RFI) vulnerabilities.</description><pubDate>Wed, 16 Jul 2025 16:27:59 GMT</pubDate></item><item><title>Div dan Modulus Dalam Bahasa Assembly</title><link>https://grindlab.dev/blog/div-modulo/</link><guid isPermaLink="true">https://grindlab.dev/blog/div-modulo/</guid><description>Exploring how integer division and modulo operations work at the low level in x86_64 assembly language.</description><pubDate>Sun, 22 Jun 2025 14:08:17 GMT</pubDate></item></channel></rss>