Skip to main content

Hacking

Disclaimer: These are my personal notes, published "as-is" without warranty or guarantee of any kind. Use at your own risk. Licensed CC BY-NC-SA 4.0.

Personal notes on hacking, used on HTB.

Forensics

Notes on digital forensics, office files, Powrshell, Packet capture, etc.

Overflows

Provide user input which causes an overflow (segfault).

Shell

Getting a shell, then what to do next.

Web

Attacking web applications.

Windows

Notes on hacking Windows.