Skip to content


These are my pentesting notes.

They've been collected from various places on the internet, and I didn't record sources for them, but if anything here belongs to you, and you want it taken down, or a note added to give you credit, please reach out, and let me know!

Don't use these techniques on systems that you don't have permission to access. If you do, it's not my fault.