Skip to content

Commit 1c37204

Browse files
committed
updated
1 parent 51e4137 commit 1c37204

File tree

13 files changed

+115
-17
lines changed

13 files changed

+115
-17
lines changed

docs/assets/images/favicon.ico

14.7 KB
Binary file not shown.

docs/exploit/reconnaissance/index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -52,11 +52,11 @@ nmap -sP <target-ip>/8 -T2
5252

5353
## Port Scan
5454

55-
See [Port Scan](port-scan.md) for details.
55+
See [Port Scan](./port-scan.md) for details.
5656

5757
## Subdomains
5858

59-
See also [Subdomain Discovery](subdomain/subdomain-discovery.md), [DNS Pentesting](../dns/index.md).
59+
See also [Subdomain Discovery](./subdomains/subdomain-discovery.md), [DNS Pentesting](../dns/index.md).
6060

6161
### Google Search
6262

docs/index.md

Lines changed: 6 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,8 @@
11
# Introduction
22

3-
Exploit Notes is sticky notes for pentesting.
3+
<img src="./assets/images/logo.png" alt="Logo" width="128" />
4+
5+
Exploit Notes is a security research site.
46
Search hacking techniques and tools for penetration testings, bug bounty, CTF.
57

68
## Comprehensive Resources
@@ -21,32 +23,24 @@ This project contains vast information in the cybersecurity field such as below:
2123

2224
## Disclaimer
2325

24-
Exploit Notes are only for educational purpose or penetration testing, not attacking servers that you're not authorized.This site will not take any responsibility even if you attack the server illegally or cause damage unintentionally.
26+
Exploit Notes is only for educational purpose or penetration testing, not attacking servers that you're not authorized.This site will not take any responsibility even if you attack the server illegally or cause damage unintentionally.
2527
Please use this contents at your own risk.
2628

2729
The contents are not original, but based on the information on the internet, the author actually tried and functioned.
2830
Although the author strives to post the latest information on the content of this site as much as possible, there is no guarantee that it will always be new.
2931

3032
I'm not a security expert, just an enthusiast, so the contents are not necessarily accurate.
3133

32-
## Use Locally
34+
## Use It Offline
3335

3436
To use Exploit Notes locally, run the following command:
3537

3638
```sh
37-
git clone https://github.com/hideckies/exploit-notes.git
39+
git clone https://github.com/hdks-bug/exploit-notes.git
3840
cd exploit-notes
3941
python3 -m venv .venv
4042
source .venv/bin/activate
4143
pip3 install -r requirements.txt
4244
mkdocs serve
4345
```
4446

45-
## Donate Me
46-
47-
If you find this site helpful, please consider supporting my ongoing efforts through a donation.
48-
49-
<a href="https://www.buymeacoffee.com/hdks" target="_blank"><img src="https://cdn.buymeacoffee.com/buttons/v2/default-yellow.png" alt="Buy Me A Coffee" style="height: 42px !important;" ></a>
50-
<a href='https://ko-fi.com/R5R0S649A' target='_blank'><img height='42' style='border:0px;height:42px;' src='https://storage.ko-fi.com/cdn/kofi1.png?v=3' border='0' alt='Buy Me a Coffee at ko-fi.com' /></a>
51-
52-

docs/malware/infostealers/target-files-for-infostealers.md renamed to docs/malware/collection/target-files-for-infostealers.md

File renamed without changes.

docs/malware/infrastructures/abused-services-for-c2.md renamed to docs/malware/command-and-control/abused-services-for-c2.md

File renamed without changes.

docs/malware/evasion/hide-files.md

Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
# Hide Files
2+
3+
## Hide Files using Attrib
4+
5+
```powershell
6+
attrib +h +s example.exe
7+
```
8+
9+
## Hide File Extensions in Explorer
10+
11+
For example, to make an executable file (.exe) appear as a PDF document, the file name can be modified as follows:
12+
13+
```powershell
14+
mv .\example.exe .\example.pdf.exe
15+
```
16+
17+
Since Windows Explorer hides file extensions by default, it will appear as example.pdf.
18+
19+
Alternatively, a more forceful approach is to insert numerous spaces before the actual extension, effectively preventing it from being displayed in File Explorer.
20+
21+
```powershell
22+
mv '.\example.exe' '.\example.pdf .exe'
23+
```
File renamed without changes.

docs/malware/infrastructures/abused-services-for-malware-hosting.md renamed to docs/malware/exfiltration/abused-services-for-malware-hosting.md

File renamed without changes.

docs/support.md

Lines changed: 51 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,51 @@
1+
# Support
2+
3+
## Help Sustain Independent Security Research
4+
5+
This website is dedicated to in-depth research on exploits, malware analysis, and offensive security techniques.
6+
All content is created independently and shared freely for educational and research purposes.
7+
8+
If you find the articles useful, insightful, or helpful in your work, please consider supporting the project.
9+
10+
Your support helps to:
11+
12+
- Maintain domain costs
13+
- Invest in security tools
14+
- Continue publishing high-quality technical research
15+
- Keep the content free and accessible to everyone
16+
17+
Even a small contribution makes a meaningful difference.
18+
19+
---
20+
21+
## ☕ Buy Me a Coffee
22+
23+
<a href="https://www.buymeacoffee.com/hdks" target="_blank">
24+
<img src="https://cdn.buymeacoffee.com/buttons/v2/default-yellow.png"
25+
alt="Buy Me A Coffee"
26+
style="height: 42px !important;">
27+
</a>
28+
29+
---
30+
31+
## 💛 Support via Ko-fi
32+
33+
<a href='https://ko-fi.com/R5R0S649A' target='_blank'>
34+
<img height='42'
35+
style='border:0px;height:42px;'
36+
src='https://storage.ko-fi.com/cdn/kofi1.png?v=3'
37+
border='0'
38+
alt='Support on Ko-fi' />
39+
</a>
40+
41+
---
42+
43+
## Why Your Support Matters
44+
45+
Independent security research requires time, tools, infrastructure, and continuous learning.
46+
Unlike corporate-sponsored research, this project relies entirely on community support.
47+
48+
If this site has helped you learn something new, solve a problem, or gain deeper technical insight,
49+
consider giving back to help it grow.
50+
51+
Thank you for being part of this journey.

0 commit comments

Comments
 (0)