Introduction
IT
1.
Attacks
❱
1.1.
Bruteforce
1.2.
Buffer Overflow
1.3.
Web
❱
1.3.1.
Click & Cursor Jacking
1.3.2.
CSRF
1.3.3.
LFI & RFI
1.3.4.
SQLi
1.3.5.
XSS
1.4.
Network
❱
1.4.1.
DDOS
1.4.2.
DNS
❱
1.4.2.1.
DNS Spoofing
1.4.3.
MITM
1.4.4.
Network Sniffing
1.4.5.
Network Spoofing
1.4.6.
Wifi
1.4.7.
Zombie Scanning
1.5.
Social Engineering
2.
OSINT
❱
2.1.
Google Dorks
3.
Programming
❱
3.1.
Go
3.2.
Python
3.3.
Rust
4.
AI
❱
4.1.
Deepfake audio
4.2.
Transfer learning
5.
System
❱
5.1.
Linux
5.2.
File system
6.
Tools
❱
6.1.
Docker
❱
6.1.1.
Dockerfile
6.2.
Kubernetes
6.3.
Git
❱
6.3.1.
Quickly share your git repository
6.4.
Matplotlib
7.
Technics
❱
7.1.
Natural Referencing
7.2.
Web Scrapping
7.3.
Reverse Engineering
❱
7.3.1.
Complete Analysis Example
8.
Pentest
❱
8.1.
Recognition
8.2.
Scanning
8.3.
Exploit
8.4.
Persistence
8.5.
Clearing Tracks
8.6.
Useful Commands
CTF Write Up
9.
Over The Wire
❱
9.1.
Bandit
9.2.
Leviathan
9.3.
Natas
10.
TryHackMe
❱
10.1.
Simple CTF
10.2.
Vulnversity
Astronomy
11.
Cool things to know
❱
11.1.
Polaris
12.
Astrophotography
❱
12.1.
Technics
Light
Rust
Coal
Navy
Ayu (default)
Introduction