Keyboard shortcuts

Press or to navigate between chapters

Press S or / to search in the book

Press ? to show this help

Press Esc to hide this help

⚠️ under construction ⚠️

This repository is a work in progress. I am gradually importing all my notes, so some sections may be incomplete or missing. Please be patient while I continue to expand and organize the content.

Welcome to My Cybersecurity Notes

Welcome! This is a personal collection of notes, tutorials, and references covering a wide range of cybersecurity topics. These notes are intended to document concepts, techniques, and practical exercises in a way that’s both structured and easy to navigate.

Purpose

The goal of this repository is to:

  • Serve as a learning journal for cybersecurity concepts.
  • Provide organized, searchable notes for future reference.
  • Offer a practical guide for hands-on exercises and labs.

What You Will Find Here

This repository is structured into several main sections:

  • Attack – Offensive security techniques, including exploitation, post-exploitation, and red-team strategies.
  • Defend – Defensive strategies, including system hardening, monitoring, and incident response.
  • General – Cybersecurity fundamentals, protocols, tools, and best practices.
  • Labs and Exercises – Practical, hands-on exercises to reinforce learning.

How to Use These Notes

  • Navigate using the table of contents in the sidebar or SUMMARY.md if using mdBook.
  • Each topic includes explanations, examples, and links to further resources.
  • Hands-on guides and labs often include step-by-step instructions for practical experimentation.

Notes on Usage

  • These notes are for educational purposes only.
  • Do not attempt unauthorized access to systems. Always use safe, legal environments for testing.
  • Contributions and improvements are welcome via pull requests.

“Cybersecurity is not just about tools; it’s about understanding systems, thinking like an attacker, and protecting what matters.”


Enjoy your journey through the world of cybersecurity!