Welcome to Wuthering Heights

Welcome to Wuthering Heights

Security Research Journal

Castlevania

曾经沧海难为水 除却巫山不是云

Security Notes Red Team Practice Learning Journal

What You Will Find

My Life

Personal reflections, growth moments, and the journey behind continuous practice.

CTF Write-Ups

Clear challenge breakdowns, practical payload ideas, and reproducible solving paths.

Virtual Machines

Lab machine walkthroughs from enumeration to exploitation and privilege escalation.

Learning Notes

Organized notes from experiments, tool usage, and security methodology practice.

Blog Disclaimer

This blog is for educational and research purposes, focused on personal cybersecurity practice.

No Misuse

This blog does not encourage any illegal attacks, software bypassing, or unauthorized intrusion activities.

Use at Your Own Risk

Any losses, consequences, or legal liabilities from applying this content are solely the reader's responsibility.

Legal Use Only

Content must be used only in authorized environments and lawful security testing contexts.

Updates

The author may revise and update this disclaimer as the scope and content of the blog evolve.

By accessing this blog, you acknowledge and accept the terms above.