Skip to content

hdks-bug/exploitnotes

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Exploit Notes

Logo

Exploit Notes is a security research site.
Search hacking techniques and tools for penetration testings, bug bounty, CTF.

Comprehensive Resources

This project contains vast information in the cybersecurity field such as below:

  • Reconnaissance
  • Linux
  • Windows
  • Web
  • Database
  • Network
  • Container (Docker, Kubernetes)
  • Cryptography
  • Binary, Reverse Engineering
  • AI/Machine Learning
  • Blockchain, Smart Contract

Disclaimer

Exploit Notes is only for educational purpose or penetration testing, not attacking servers that you're not authorized.This site will not take any responsibility even if you attack the server illegally or cause damage unintentionally.
Please use this contents at your own risk.

The contents are not original, but based on the information on the internet, the author actually tried and functioned.
Although the author strives to post the latest information on the content of this site as much as possible, there is no guarantee that it will always be new.

I'm not a security expert, just an enthusiast, so the contents are not necessarily accurate.

Use It Offline

To use Exploit Notes locally, run the following command:

git clone https://github.com/hdks-bug/exploit-notes.git
cd exploit-notes
python3 -m venv .venv
source .venv/bin/activate
pip3 install -r requirements.txt
mkdocs serve

☕ Donate Me

If you find this site helpful, please consider supporting my ongoing efforts through a donation.

Buy Me A Coffee

Buy Me a Coffee at ko-fi.com

Releases

No releases published

Packages

 
 
 

Contributors 6

Languages