# Home

## Blog Posts

{% content-ref url="blog-posts/understanding-potential-vulnerabilities-in-authentication-mechanisms" %}
[understanding-potential-vulnerabilities-in-authentication-mechanisms](https://blog.verni.lol/blog-posts/understanding-potential-vulnerabilities-in-authentication-mechanisms)
{% endcontent-ref %}

## CTF Write-ups

* [Hackthebox](https://blog.verni.lol/hack-the-box-write-ups)
* [Try Hack Me](https://blog.verni.lol/try-hack-me-write-ups)

## Social

* [Linkedin](https://www.linkedin.com/in/gabriel-vernilo-mendes-46b786200/)
* [HackTheBox](https://app.hackthebox.eu/profile/308682)
* [TryHackMe](https://www.tryhackme.com/p/GabrielVernilo)
* [Github](https://github.com/gabriel-vernilo/)
