Domain // 01
Research
Frame the job, shape the evidence, set the rules and move with a clear engagement model.
Open Research
HackTheCore
Offensive Research Platform // Online
Independent offensive-security platform for research, pentesting, web exploitation, internal operations, cloud abuse, API pressure, mobile assessment, identity and SSO attack paths, privilege escalation, wireless tradecraft, AI attack-surface assessment, reverse engineering, cyber-physical security and specialist operator workflow.
web // network // privesc // wireless // ai // reverse // cyber-physical
research briefs // public links // cert context // native structure
knowledge // exam // radar // signature // simplex relay
ops@hackthecore:~$ platform --status
offensive research surface online
ops@hackthecore:~$ cat domains.conf
research=active
web=active
network=active
privesc=online
relay=simplex
ops@hackthecore:~$ nmap -sC -sV -Pn target.internal
surfaces, routes and weak assumptions under observation
ops@hackthecore:~$ tail -f /var/log/ops.log
ops@hackthecore:~$
Use the platform by attack surface. Go straight to web, internal, escalation, AI or cyber-physical work without walking through a course timeline.
Every route is built to help you isolate trust boundaries, weak assumptions, reachable control paths and practical follow-on questions.
The public surface stays low-noise, reference-heavy and direct, while contact remains deliberate through the SimpleX relay.
Primary surfaces // Choose your route
Pick the surface that matches your target. Each route is designed to move you from a live question into usable offensive context, references and next-step material.
Domain // 01
Frame the job, shape the evidence, set the rules and move with a clear engagement model.
Open ResearchDomain // 02
Use the pentest portal when you want the broadest operational hub across the platform.
Open PentestDomain // 03
Internal footholds, credential pressure, lateral movement, AD logic and operator movement.
Open NetworkDomain // 04
Application trust boundaries, browser-side pressure and classic web exploitation routes.
Open WebDomain // 05
REST, GraphQL, JWT, OAuth/OIDC, object abuse and API fuzzing as a dedicated surface.
Open APIDomain // 06
AWS, Azure, GCP, Kubernetes, identities, CI/CD trust and cloud control-plane abuse.
Open CloudDomain // 07
Android and iOS testing, instrumentation, pinning bypass, storage and mobile reversing.
Open MobileDomain // 08
Entra, Okta, SSO, tenant drift, token abuse, federation and conditional-access pressure.
Open IdentityDomain // 09
Host-level escalation logic across Linux, Windows and macOS.
Open PrivEscDomain // 10
Payload staging, OPSEC, EDR pressure, client-side chains and C2-aware custom tooling.
Open TradecraftDomain // 11
Git, CI/CD, runners, signing, SBOM, package trust and build-system attack paths.
Open Supply ChainDomain // 12
Industrial protocols, PLC/HMI trust, segmentation failures and process-level risk.
Open OT / ICSDomain // 13
Prompt injection, jailbreaks, retrieval abuse, tool misuse and offensive AI operations.
Open AIDomain // 14
Autopilots, MAVLink, ROS, telemetry abuse, companion computers and control-plane trust.
Open Cyber-PhysicalDomain // 15
Searchable glossary and indexed terminology when you need definitions without losing momentum.
Open KnowledgeDomain // 16
Practice mode with direct feedback, explanations and score tracking.
Open ExamOrientation // Operator-first
If you already know the pressure point — cloud identity, an API contract, a mobile client, an internal foothold, a Kubernetes cluster, an agentic AI workflow or an industrial control network — the site should get you to the right attack language fast. This section exists to help the visitor choose the shortest route from problem to useful context.
Start // Pick your pressure point