Hacking Notes | Welcome
Hacking Notes // 2026
RED
Offensive operations
BLUE
Defensive operations
H / N
 ONLINE|v2.0|OPEN SOURCE

A curated collection of Red Team and Blue Team security notes. Built from real-world experience. Open source and always evolving.

Support this project with a star on  GitHub


Red Team

ENTER
Offensive Security

Information gathering, scanning and enumeration, web application exploitation, privilege escalation, and post-exploitation techniques across Windows and Linux systems.

reconscanningweb hackingexploitationprivesc

Blue Team

ENTER
Defensive Security

Email and file analysis, log correlation, malware reverse engineering, memory forensics, packet inspection, and incident response methodologies.

detectionforensicsmalwareSIEMthreat hunting

Resources

[ END OF FILE ]