Sticky notes for pentesting.
Search hacking techniques and tools for penetration testings, bug bounty, CTFs.
Reconnaissance
Linux
Windows
Web
Network
Reverse Engineering
Database
Cryptography
Malware
Blockchain
Machine Learning
- Cluster Analysis for Machine Learning
- Create Malicious ML Model
- Pickle Code Injection
- Jupyter Notebook Pentesting
- Image Manipulation for Machine Learning
- Data Manipulation for Machine Learning
- Read HDF5 (H5) File
- Image Recognition Bypass for Machine Learning
- Dimensionality Reduction for Machine Learning