This is my collection of notes.

Disclaimer:

The tools and methods described here are for educational and professional security testing use only. The author does not condone the use of any techniques described within for illegal activity. Most of the notes are obtained from other sources and courses, and are not intended for any other use than professional penetration testing. It is simply a collection of things I have learnt about during my own studies, that I wish to note or share.