Neko

Security Notes

My notes on cybersecurity topics.


Last updated: May 4th, 2023

Initial Access

Post

Web

Reversing and Exploiting

  • Reversing
    An all-in-one post about reversing, split into theory and practice.
  • Linux Exploit Development
    Goes over the basic theory, some intro stack smashing, exploit mitigations and bypasses, shellcoding and more.
  • Windows Exploit Development
    Goes over the basic theory, some intro stack smashing, exploit mitigations and bypasses, shellcoding and more.

IoT

  • Hardware
    Finding schematics, patents and breaking down electronic devices without breaking them.
  • Firmware
    Firmware analysis and exploitation
  • Radio and Wireless
    Radio and wireless analysis and exploitation

Mobile

  • Android
    Android app analysis and exploitation
  • iOS
    iOS app analysis and exploitation

Cloud (Coming Soon)

  • AWS
    AWS pentesting
  • Azure
    Azure pentesting

Active Directory (Coming Soon)

  • AD
    Anatomy of an active directory network and how to hack it.