Exploit Notes is sticky notes for pentesting.
Search hacking techniques and tools for penetration testings, bug bounty, CTF.
This project contains vast information in the cybersecurity field such as below:
- Reconnaissance
- Linux
- Windows
- Web
- Database
- Network
- Container (Docker, Kubernetes)
- Cryptography
- Binary, Reverse Engineering
- AI/Machine Learning
- Blockchain, Smart Contract
Exploit Notes are only for educational purpose or penetration testing, not attacking servers that you're not authorized.This site will not take any responsibility even if you attack the server illegally or cause damage unintentionally.
Please use this contents at your own risk.
The contents are not original, but based on the information on the internet, the author actually tried and functioned.
Although the author strives to post the latest information on the content of this site as much as possible, there is no guarantee that it will always be new.
I'm not a security expert, just an enthusiast, so the contents are not necessarily accurate.
If you find issues or new hacking techniques, please issue or send pull request.
If it's a simple edit, you can edit it online from this GitHub repository.
However if you want to check the modified site, clone this repository, modify the contents, and manually test the modified site with the command below.
You need deno
for this.
git clone https://github.com/hideckies/exploit-notes.git
cd exploit-notes
# Start local server
deno task serve
If you find this site helpful, please consider supporting my ongoing efforts through a donation.