source
For Unix / macOS / Windows 128

Commands that are frequently used.

Common Vulnerabilities and Exposures (CVE) 37

Common Vulnerabilities and Exposures.

"Random Stuff" 17

Other stuff that comes in handy.

Tools 536

A collection of tools.

Introduction

This site is a curated repository of tools, techniques, and writeups, designed to support your journey in offensive security, ethical hacking, and beyond. Whether you're exploring new methodologies, troubleshooting tools, or diving into detailed technical guides, you'll find resources here to help you stay ahead.

Built for both reference and exploration, this knowledge base reflects my ongoing learning and experience in cybersecurity. Explore the categories, bookmark your favorites, and feel free to contribute via the GitHub repository. Together, we can sharpen our skills and deepen our understanding of this ever-evolving field.

Updates and Changes

There is no dedicated changelog available. All content updates are made through Pull Requests. To view the full history of changes, please refer to the Pull Requests section.

Contributing

Contributions are always welcome. Please see the contribution guidelines before getting started.

Licensing

This Knowledge Base (KB) is made available under the GNU General Public License v3.0.

Other Tools

Discover more helpful tools and resources here!