Graphics

Adding two hypotrochoid curves

This is the result of direct addition of two hypotrochoids on top of each other, i.e., (x, y) = (x_hypotrochoid1, y_hypotrochoid1) + (x_hypotrochoid2, y_hypotrochoid2)

Joining points on the circle

Joining points on the circle to form heart-shaped line art. If instead of circle we used hyptrochoid then we will get the following:

Drawing double polygon

AI generated javascript for drawing double polygon - about 60%. And about 5% of code really needs lots of manual Chrome Devtool debugging + ChatGPT advise.

Pentagon with Colored Line

How to draw pentagon with colored lines. This method of drawing lines is called chasing diagram. The two adjacent edge of the pentagon are specified.

Chasing diagram on a circle

This is just drawing two circles and joing lines from one circle to another, and input parameter is just adjusting the index offset from 0 to connect.

Chasing diagram on triangle

How to draw triangle. This method of drawing lines is called chasing diagram. The two adjacent edge of the pentagon are specified.

Back to Top ↑

MachineLearning

Continuity of thoughts problems in AI

The “continuity of thoughts” problem in large language models (LLMs) refers to the challenge of maintaining coherent and contextually relevant reasoning across multiple interactions or steps. This issue arises because LLMs, by design, generate responses based on the immediate input without inherently retaining long-term context or memory of previous interactions. Here are some key points and approaches related to this problem:

Using Groq to build AI agents framework

Groq primarily provides high-performance hardware for AI workloads and does not come with a specific proprietary AI agent framework. However, Groq’s ecosystem is designed to work seamlessly with widely-used AI frameworks, enabling the creation and deployment of AI agents by leveraging these existing tools.

Process of AI agent implementations using Groq

Creating AI agents using Groq involves leveraging the Groq hardware and software ecosystem, primarily designed for high-performance machine learning workloads. Groq processors are optimized for matrix operations and neural network computations, making them well-suited for implementing AI agents that require real-time decision-making or computationally intensive tasks.

AI agents framework

AI agents can be classified based on their purpose, behavior, and the techniques used to implement them. Here’s an overview of the most popular types of AI agents:

Back to Top ↑

Javascript

60 jQuery exercises

Here’s a list of 60 jQuery exercises, categorized by difficulty and functionality.

60 AngularJS exercises

A list of 60 AngularJS exercises, categorized into different topics to cover basics, data binding, directives, routing, services, and advanced features.

Tools for deobfuscating, decoding, or decrypting JavaScript

Here’s a list of tools and websites commonly used for deobfuscating, decoding, or decrypting JavaScript. These tools serve various purposes, including simplifying obfuscated code, reversing encoded strings, or analyzing minified JavaScript.

Back to Top ↑

AccessControl

Identifying Access Control Bugs

Access control bugs can be critical in exposing sensitive data or allowing unauthorized actions. Here are 30 methods to detect access control bugs systematically:

Back to Top ↑

CSP

top 30 CSP bypass techniques

The top 30 CSP bypass techniques known in the CTF and bug bounty hunting communities, along with their explanations and use cases:

Top 100 Content Security Policy (CSP) features

Content Security Policy (CSP) is an HTTP header that provides a robust mechanism to mitigate certain types of attacks, such as Cross-Site Scripting (XSS) and data injection. Here are the top 50 features and directives supported by CSP:

Back to Top ↑

Redis

100 key aspects of Redis

1-10: Basic Features and Commands

  1. In-Memory Storage – Redis stores data in RAM, making it extremely fast.
  2. Persistence Options – Redis supports RDB (snapshotting) and AOF (Append-Only File) for durability.
  3. Data Structures – Supports strings, lists, sets, sorted sets, hashes, bitmaps, hyperloglogs, and geospatial indexes.
  4. Basic CommandsSET, GET, DEL, EXPIRE, TTL, KEYS, FLUSHDB, FLUSHALL.
  5. Advanced CommandsZADD (sorted sets), HSET (hashes), LPUSH/RPUSH (lists), BITOP (bit operations).
  6. Atomic Operations – All Redis operations are atomic at the single command level.
  7. Pipeline Support – Redis allows multiple commands to be sent together for efficiency.
  8. Pub/Sub Messaging – Real-time publish-subscribe capabilities using PUBLISH and SUBSCRIBE.
  9. Transactions (MULTI/EXEC) – Supports multiple operations in a single transaction.
  10. Lua Scripting – Supports server-side scripting via Lua (EVAL, EVALSHA).
Back to Top ↑

Rootkits

Back to Top ↑

Java

Back to Top ↑

chatbot

Back to Top ↑

AI

Back to Top ↑

AI

Back to Top ↑

APIHacking

Back to Top ↑

AWS

Back to Top ↑

Agile

Back to Top ↑

Android

Back to Top ↑

Apache Kafka

Back to Top ↑

CSPBypass

Client Side CSP Bypass

Here’s a detailed list of 30 ways client-side Content Security Policy (CSP) bypasses are possible, with explanations and references to potential vulnerabilities:

Back to Top ↑

Chinese Idioms/Proverbs

Back to Top ↑

Deepseek

Back to Top ↑

Game

Back to Top ↑

Gitlab

Top GitLab’s bug bounty program hunters

Based on GitLab’s bug bounty program reports from recent years, here are some of the most notable bug hunters who have made significant contributions:

Back to Top ↑

Gobuster

Back to Top ↑

HPROF dump file

Back to Top ↑

IR

Back to Top ↑

JWT

Back to Top ↑

LLM design

Comparing different LLM models: what are the key differentiator

There are numerous factors that differentiate large language model (LLM) implementations, leading to variations in performance, efficiency, and accuracy. Below are 50 key differentiators, categorized into architecture, training, data handling, optimization techniques, and deployment strategies.

Back to Top ↑

Langchain

Back to Top ↑

LoadBalancer

Back to Top ↑

Microsoft Entra

Back to Top ↑

Network Anomaly Detection

Back to Top ↑

Odoo

Back to Top ↑

PathTraversal

Back to Top ↑

Postman

Back to Top ↑

PrivEscalation

Back to Top ↑

PrivilegeEscalation

Back to Top ↑

PrivsEscalation

Privilege escalation in Linx

Privilege escalation in Linux involves exploiting system vulnerabilities or misconfigurations to gain unauthorized elevated access. Staying informed about the latest techniques is crucial for both attackers and defenders. Below is a curated list of resources and tools that provide comprehensive information and scripts for Linux privilege escalation:

Back to Top ↑

Proxychains

10 different ways of using proxychains

proxychains is a powerful tool for routing application traffic through a chain of proxies. Below are 10 different ways to use it, with examples:

Back to Top ↑

RAG

Building a Retrieval-Augmented Generation (RAG) system

Building a Retrieval-Augmented Generation (RAG) system involves combining a retrieval mechanism with a generative model to produce contextually relevant and accurate responses. Below, I’ll outline the detailed steps to build a RAG system using suitable models from Hugging Face, a popular platform for open-source NLP models and tools. The process assumes you have some familiarity with Python, transformers, and basic machine learning concepts.

Back to Top ↑

ReactHooks

10 different ways of using React Hooks with examples

React Hooks are functions introduced in React 16.8 that allow you to use state and other React features in functional components. Here is an explanation of all the commonly used hooks, categorized into basic hooks, additional hooks, and custom hooks, with examples for each.

Back to Top ↑

SNMP

Back to Top ↑

SOC

Back to Top ↑

SSO

Back to Top ↑

Text-to-speech

Building a Text-to-Speech (TTS) system

Building a Text-to-Speech (TTS) system using models from Hugging Face involves selecting appropriate pre-trained models, setting up the pipeline, and generating audio from text input. Below, I’ll walk you through the detailed steps to create a TTS system using Hugging Face’s transformers library and other suitable tools. The process will leverage a popular TTS model like Tacotron 2 or VITS, paired with a vocoder like HiFi-GAN, both of which are available on Hugging Face.

Back to Top ↑

Time Series Database

Time Series Database

A Time Series Database (TSDB) is optimized for handling time-stamped or time-ordered data, which is often used in monitoring, financial applications, IoT, and analytics. Below are some well-known time series databases with their characteristics:

Back to Top ↑

Union-based SQL injection

Why is UNION Query-Based SQLi the Fastest SQL Injection Type?

The UNION-based SQL Injection technique is often considered one of the fastest ways to extract data from a vulnerable database. This is due to several reasons, including direct data retrieval, minimal execution complexity, and leveraging native SQL functions. Below is a detailed explanation.

Back to Top ↑

VisualStudio

Back to Top ↑

Vulnerabilites

Back to Top ↑

WAF-bypass

Bypassing a Web Application Firewall (WAF) for XSS exploits

Bypassing a Web Application Firewall (WAF) for XSS (Cross-Site Scripting) exploits requires a combination of techniques to evade detection mechanisms. Here’s a comprehensive approach to bypass WAFs when testing XSS vulnerabilities, relevant to your scenario with DalFox and Cloudflare WAF.

Back to Top ↑

Wordpress

100 differeny ways to test WordPress vulnerabilities

Testing a WordPress URL or webpage for vulnerabilities involves a structured methodology, leveraging both automated tools and manual techniques. Below are 100 different ways categorized into specific areas for comprehensive security testing:

Back to Top ↑

XSS

Prototype pollution leading to XSS

Crafting 50 distinct ways Cross-Site Scripting (XSS) can arise from prototype pollution, complete with code examples, is a substantial task that requires exploring various scenarios where prototype pollution vulnerabilities could be exploited to inject malicious scripts. Prototype pollution occurs when an attacker manipulates an object’s prototype (e.g., Object.prototype in JavaScript), affecting all objects that inherit from it. If this leads to the injection or manipulation of HTML, scripts, or other executable content in a web application, it can result in XSS.

Back to Top ↑

crypto

Back to Top ↑

forensics

Back to Top ↑

pentest

Back to Top ↑

text2video

Hugging Face for video generation

Hugging Face offers a variety of open-source models and tools for video generation, primarily through its Diffusers library, which supports tasks like text-to-video and image-to-video generation. Below are some of the key options available as of April 2, 2025, based on the latest developments in the ecosystem:

Back to Top ↑

valentine_game

Move your mouse to generate hearts!

Back to Top ↑