Cybersecurity notes covering offensive techniques and CTF walkthrough
These are my public personal notes, where I want to share my knowledge in cybersecurity in order to consolidate various techniques in one single place. And hopefully help someone who's starting their journey.