A living notebook containing the details of frequent as well as unique attack techniques, cmds for various security tools etc., gathered from my experiences of playing CTFs, solving HTB & THM Challenges and also based on my learnings from other interesting CTF writeups/security resources.
This repo is only intended for learning purposes. Do not make illegal use of the cmds, payloads, tools and techniques found in this repo!