Techbook
02 Hydra
Initializing search
Home
AI
Architecture
Automation
Coding
Cybersecurity
Tools
Techbook
Home
Home
Techbook
AI
AI
AI
LLMs
LLMs
01 Introduction
02 Environment Setup
03 Models
04 Parameters
05 Tokenization
06 Context Window
07 Prompts
08 Requests and Responses
09 User Interface
10 Tools
11 Agents
12 HuggingFace
13 LLM Frameworks
LLMs
Architecture
Architecture
Architecture
DSA
DSA
DSA
Leetcode
Leetcode
001 Two Sum
002 Add Two Numbers
Leetcode
Automation
Automation
Automation
Selenium
Coding
Coding
Coding
Python
Python
001 Imports
002 Keywords
Python
Cybersecurity
Cybersecurity
01 - Introduction
01 - Introduction
01 Introduction to Cybersecurity
02 Introduction to Pentesting
03 Search Skills
Introduction
02 - Linux
02 - Linux
01 Introduction to Linux
02 Files and Directories
03 Linux Shell
04 Users and Groups
05 Application and Utilities
06 Process Management
07 System Management
Linux
03 - Windows
03 - Windows
01 Command Prompt
02 PowerShell
03 Active Directory
Windows
04 - Networking
04 - Networking
01 Introduction to Networking
02 Networking Concepts
03 Networking Essentials
04 Networking Core Protocols
05 Networking Secure Protocols
06 OSI Model
07 Introduction to LAN
08 WIFI Hacking
Networking
05 - Cryptography
05 - Cryptography
01 Introduction to Cryptography
02 Public Key Cryptography
03 Hashing
Cryptography
06 - Reconnaissance
06 - Reconnaissance
01 Content Discovery
02 Subdomain Enumeration
03 - Tools
03 - Tools
01 Browser
02 FFUF
03 Gobuster
Tools
04 - Resources
04 - Resources
01 Wordlists
Resources
Reconnaissance
07 - Exploitation
07 - Exploitation
01 Authentication
02 Access Control
03 File Inclusion
04 Server Side Request Forgery
05 Cross Site Scripting
06 Command Injection
Exploitation
Tools
Tools
01 Metasploit
02 Hydra
03 John The Ripper
04 SQLMap
Cybersecurity
Tools
Tools
01 Google Collab
Tools
02 Hydra