Skip to content

ZeroMisconfig
— Stay Secure.

Explore the vulnerabilities shaping the threat landscape and build architectures that hold the line against the most advanced offensives.

bash — ZeroMisconfig
Live
12345678
Session Active
UTF-8
zeromisconfig.tech
WiresharkWireshark
MetasploitMetasploit
Kali LinuxKali Linux
Burp SuiteBurp Suite
PythonPython
GoGo
DockerDocker
n8nn8n
HackTheBoxHackTheBox
WiresharkWireshark
MetasploitMetasploit
Kali LinuxKali Linux
Burp SuiteBurp Suite
PythonPython
GoGo
DockerDocker
n8nn8n
HackTheBoxHackTheBox

Specialized Research Areas

Deep dives into the architectures shaping the modern threat landscape.

0x01 AUTOMATION
n8n logo

n8n Automation

Automation has no side — offensive, defensive, or operational. This section explores n8n through hands-on labs and real workflows: automating security tasks, orchestrating attack chains, and streamlining business processes. Each topic is broken down to understand not just how to build it, but why it works.

WebhookLogicNotify
0x02 INFRASTRUCTURE
Docker logo

Docker Security

Containers are a target and a tool. This section covers both sides — how attackers exploit container environments and how defenders lock them down. From threat modeling to runtime hardening, each article goes deep enough to understand the technology before touching the controls.

$ docker run --cap-drop=ALL
0x03 IDENTITY
Active Directory logo

Active Directory

AD is the most attacked asset in enterprise networks — for good reason. This section explores both the offensive tradecraft that makes it vulnerable and the defensive configurations that protect it. Labs, attack paths, misconfigurations, and mitigations — with enough depth to understand the system before trying to break or secure it.

UserAdmin
0x04 APPLICATION
Web logo

Web Application

Web applications break in predictable ways — once you know where to look. This section covers attack techniques and defensive configurations side by side, from OWASP fundamentals to deeper logic flaws. Labs and real-world scenarios to understand how vulnerabilities are found, exploited, and fixed.

"status": "vuln"
0x05 KERNEL
Linux logo

Linux Security

Linux is the foundation most attacks land on — and most defenses are built from. This section covers both the attacker's view and the defender's playbook: privilege escalation, kernel hardening, access controls, and audit. Everything through labs and technical deep dives, built to understand the system from the ground up.

# sysctl -w kernel
0x06 GAMIFICATION
CTF logo

CTF Writeups

Focus on the game. This section documents write-ups, challenges, and competition labs. From binary exploitation to crypto, these articles break down the thought process needed to solve complex security puzzles under pressure.

0x07 DEFENSE
Hardening logo

System Hardening

Defense by design. This section covers system lockdowns, security baselines, and preventative controls. Practical guides on turning a default installation into a fortress, ensuring every configuration is a barrier for the attacker.

LATEST SECURITY ADVISORIES

INTEL_FEED

ZM-ADV-2026-102 APR 30, 2026

Remote Code Execution in Pro-SaaS v4.2

Authentication bypass lead to pre-auth RCE via insecure deserialization in the management portal.

SEVERITY: CRITICAL
VIEW ADVISORY
ZM-ADV-2026-098 APR 28, 2026

Cloud-Native Credential Harvesting

Deep-dive into IMDSv2 exfiltration techniques in multi-tenant Kubernetes environments.

SEVERITY: HIGH
VIEW ADVISORY
ZM-ADV-2026-095 APR 26, 2026

Active Directory Privilege Escalation

Analysis of a novel technique to escalate privileges from a standard domain user to Domain Admin using misconfigured ACLs.

SEVERITY: HIGH
VIEW ADVISORY