Welcome to my personal notes!
Somewhere in between a cheatsheet and a full course đĻ.
I keep three serving-men to help me; their names are Stack Overflow, Wikipedia, and Google. They serve me with their best. But though their vast knowledge, I have a fourth who helps me. My blog is where I document the struggles and the wins; it's where I find that last fragment of knowledge that begins. With it, I can share my thoughts and search my past mistakes; I improve my code and tweak it until my project shakes. And so I send my serving-men to seek the answers far, while my blog helps me understand and keeps me up to par. For every coder's needs are unique, and mine are met with glee; with all four helping me.
Recently updated notes âŗ
- Cybersecurity > Red team > 3. Exploitation > Techniques > Cheatsheet > Payloads
- Cybersecurity > Red team > 3. Exploitation > Techniques > Web > File inclusion
- Operating Systems > đī¸ Others > Containers > Docker
- Cybersecurity > Red team > 3. Exploitation > Techniques > Injection > Files > Union-based SQLi
- Cybersecurity > Red team > 3. Exploitation > Techniques > Injection > Files > Error-based SQLi
- Cybersecurity > Red team > 4. Privilege Escalation > Linux > Topics > sudo
- Cybersecurity > Cryptography > Algorithms > Hashing
- Cybersecurity > Red team > 3. Exploitation > Techniques > Others > Databases > File system
- Cybersecurity > Red team > 3. Exploitation > Techniques > Cheatsheet > Arbitrary File Access
- Cybersecurity > Red team > 2. Discovery > Techniques > Passwords > JWT