Vulnerability Title Vulnerability description - reference Summary Tools Methodology Subentry 1 Subentry 2 Labs References Tools username/tool1 - Description of the tool username/tool2 - Description of the tool Methodology Quick explanation Exploit Subentry 1 Subentry 2 Labs Company - Lab 1 Company - Lab 2 Company - Challenge 1 Company - Challenge 2 References Blog title - Author (@handle) - Month XX, 202X