Welcome
The techniques and information in this handbook are for educational and ethical use only. Unauthorized use or testing without explicit permission from the asset owner can lead to system crashes, data loss, or legal consequences. You are solely responsible for your actions. Always conduct thorough research and ensure you have proper authorization before applying any techniques. Use responsibly and ethically.
Hey there, Hackers and Curious Minds!
Welcome to Rezy's Hacking Handbook. This document is my personal treasure trove, packed with techniques, tips, and tricks I’ve learned along the way. Whether you’re here to sharpen your skills, explore new exploits, or just satisfy your curiosity, you’ve come to the right place.
This isn’t just a collection of notes, it’s a showcase of my journey through the world of hacking. From basic concepts to advanced exploits, you’ll find everything I’ve explored, tested, and found worth sharing. Think of it as part cheat sheet, part diary, and part “Hey, look at this cool thing!”
I created this handbook with two goals in mind:
- To document my knowledge and experiments.
- Everything in one place for personal assessments.
Thanks for stopping by, and happy hacking!
Credits
All credit for the content in this handbook goes to the original authors of the techniques referenced. I do not claim ownership of any material; this handbook is a personal compilation created to centralize useful tips I rely on during security assessments, rather than using multiple bookmarks.
If I have included any content you'd prefer not to be shared, please contact me at mail@raunak-neupane.com.np. I'm happy to either remove the content or properly reference and credit the original source as requested. This project is intended purely for personal use, not to present others’ work as my own.
Some honorable mentions include:
- PayloadAllTheThings
- HackTricks
- ired.team
- exploit-notes.hdks.org
- PentesterLab
- HackerOne Hacktivity
- And various blogs I found on the internet