Sticky notes for pentesting.
Search hacking techniques and tools for penetration testings, bug bounty, CTFs.
Reconnaissance
Linux
Windows
Web
Network
RE & BE
Database
Cryptography
Malware
Blockchain
Machine Learning
- Adversarial Attack on NLP
- Adversarial Attack with FGSM (Fast Gradient Signed Method)
- Cluster Analysis for Machine Learning
- Data Manipulation for Machine Learning
- Dimensionality Reduction for Machine Learning
- Image Analysis for Machine Learning
- Image Manipulation for Machine Learning
- Image Recognition Bypass for Machine Learning
- Jupyter Notebook Pentesting