Welcome
Last updated
Last updated
The purpose of this site is essentially educational. It is a collection of cybersecurity write-ups and research notes created during my learning experience.
Most of the techniques used are not mine; however, references to all sources (CVEs, exploits, payloads, bounty reports, etc.) are added so you can do your own research. In a few indicated cases, I developed my own code snippets or made custom modifications to exploits. You are free to use my code whenever and wherever you like.
Currently, the available write-ups are the following: