[
    {
        "id": "example-bloodhound-edges",
        "title": "BloodHound Edges Worth Hunting First",
        "category": "ad",
        "tag": "Active Directory",
        "img": "assets/img/project2.jpg",
        "date": "2026-04-15",
        "excerpt": "A practical short-list of BloodHound edges that consistently shorten attack paths in real Active Directory engagements — what to run, why it works, and what defenders should detect.",
        "meta": [
            "BloodHound",
            "Active Directory",
            "ACL Abuse",
            "Red Team"
        ],
        "file": "writeups/example-bloodhound-edges.html",
        "url": "https://aymanazzam.is-a.dev/writeups/example-bloodhound-edges.html"
    },
    {
        "id": "xss-admin",
        "title": "Stored XSS in Admin Dashboard",
        "category": "web",
        "tag": "Web",
        "img": "assets/img/project4.jpg",
        "date": "2025-09-12",
        "excerpt": "Discovery, reproducible PoC, and remediation guidance for a stored cross-site scripting vulnerability in an administrative messaging component.",
        "meta": [
            "XSS",
            "Burp Suite",
            "CVSS High"
        ],
        "file": "writeups/xss-admin.html",
        "url": "https://aymanazzam.is-a.dev/writeups/xss-admin.html"
    },
    {
        "id": "ad-enumeration",
        "title": "Active Directory Enumeration Workflow",
        "category": "ad",
        "tag": "Active Directory",
        "img": "assets/img/project2.jpg",
        "date": "2025-08-21",
        "excerpt": "End-to-end AD recon workflow used during real engagements: domain discovery, ACL analysis, BloodHound collection, and detection signals to prioritize defense.",
        "meta": [
            "AD",
            "BloodHound",
            "PowerShell"
        ],
        "file": "writeups/ad-enumeration.html",
        "url": "https://aymanazzam.is-a.dev/writeups/ad-enumeration.html"
    },
    {
        "id": "kerberos-attack",
        "title": "Kerberoasting Attack Chain",
        "category": "ad",
        "tag": "Active Directory",
        "img": "assets/img/project3.jpg",
        "date": "2025-07-05",
        "excerpt": "Technical research into Kerberoasting on modern Windows environments — attack chain, detection telemetry, PoC scripts, and Kerberos hardening guidance.",
        "meta": [
            "Kerberos",
            "Impacket",
            "Hashcat"
        ],
        "file": "writeups/kerberos-attack.html",
        "url": "https://aymanazzam.is-a.dev/writeups/kerberos-attack.html"
    },
    {
        "id": "tryhackme-capstone",
        "title": "TryHackMe Red Team Capstone",
        "category": "tryhackme",
        "tag": "TryHackMe",
        "img": "assets/img/project1.jpg",
        "date": "2025-06-14",
        "excerpt": "Lab-to-field writeup of a TryHackMe red team capstone — objective-based planning, execution notes, pivoting techniques, and post-engagement lessons learned.",
        "meta": [
            "THM",
            "Red Team",
            "Pivoting"
        ],
        "file": "writeups/tryhackme-capstone.html",
        "url": "https://aymanazzam.is-a.dev/writeups/tryhackme-capstone.html"
    },
    {
        "id": "idor-analysis",
        "title": "IDOR Exploitation Analysis",
        "category": "web",
        "tag": "Web",
        "img": "assets/img/project1.jpg",
        "date": "2025-05-02",
        "excerpt": "In-depth analysis of an insecure direct object reference in a file-download endpoint — exploitation logic, business impact, and robust server-side authorization patterns.",
        "meta": [
            "IDOR",
            "Burp Suite",
            "AuthZ"
        ],
        "file": "writeups/idor-analysis.html",
        "url": "https://aymanazzam.is-a.dev/writeups/idor-analysis.html"
    },
    {
        "id": "web-cache-poisoning",
        "title": "Web Cache Poisoning Research",
        "category": "research",
        "tag": "Research",
        "img": "assets/img/project4.jpg",
        "date": "2025-04-18",
        "excerpt": "Original research on cache poisoning vectors against modern CDNs and reverse proxies — PoC payloads, cache-key analysis, and hardening recommendations.",
        "meta": [
            "Cache",
            "CDN",
            "Research"
        ],
        "file": "writeups/web-cache-poisoning.html",
        "url": "https://aymanazzam.is-a.dev/writeups/web-cache-poisoning.html"
    }
]
