Welcome to Xylos Notes, a site that documents the various security-related work done while exploring hacking, social engineering, penetration testing, and the art of pwn in general. These pages are closed to members only, but any corrections or feedback would be greatly appreciated; just let us know in the forums.

In the meantime, here are the general categories from which all else will (hopefully) flow:

  • Exploits - Methods and tools for exploiting digital systems
  • How-Tos - Lists of how-tos and tutorials
  • Links - Favorite sites to read and reinterpret1
  • Protocols - Breakouts of protocols and how they work2
  • Reconaissance - Anything related to digital information gathering
  • References - Sites for review and perusal
  • Social Engineering - Anything related to human information gathering

  • To Do List - Things to study and research
  • Purchase List - What Xylos is looking to buy; message me if you have it and want to get rid of it!

- Xylos -

Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-NonCommercial-ShareAlike 3.0 License