Statement of purpose

Having been in the infosec space for a few years, my local drive is awash with unstructured notes, thoughts and ideas. This is my attempt to organise them into a logical narative, with the aim to make a useful resource for myself and hopefully others.

There are likely to be pages in which not all steps are included or basic principles are not explained. In these cases, I encourage you to reach out to me via twitter or the associated github repository.

Some key takeaways before diving into the site:

Most techniques have been identified by other security researchers. Wherever possible, there will be links to original sources of information or relevant articles for further reading. If you feel you should be creditied for something and have not, or want to contribute or suggest corrections, get in touch.

Last updated

Was this helpful?