Wiki
Portfolio
search
    Security expand_more
    Security chevron_right

    Offensive & defensive security insights.

    Blockchain
    Web3 and smart contract vulnerabilities.
    Cloud Security
    Infrastructure and network defense.
    Cryptography
    Encryption algorithms and principles.
    Forensics
    Digital investigation and analysis.
    Governance Risk and Compliance
    Policies, standards, and risk management.
    Hack the Box
    Offensive security practice and writeups.
    Identity and Access Management
    IAM architectures and principles.
    Mobile Security
    Securing iOS and Android applications.
    Network Security
    Protecting network infrastructure.
    Payment Card Industry Data Security Standard
    PCI DSS compliance.
    Security Operations
    Monitoring and incident response.
    Threat Intelligence
    Analyzing cyber threats.
    Vulnerabilities
    Common security flaws and mitigations.
    Web Security
    Securing web applications and APIs.
    Open Source Intelligence (OSINT)
    Open Source Intelligence (OSINT)
    Technical Deep Dive into OSINT and Dual-Perspective Strategies
    Learn more chevron_right
    Engineering expand_more
    Engineering chevron_right

    Scalable systems & modern engineering.

    Algorithms & Data Structures
    Core computer science concepts.
    Database Systems
    SQL, NoSQL, and data modeling.
    DevOps & Automation
    CI/CD and infrastructure code.
    Programming Fundamentals
    Language syntax and best practices.
    SysOps & Infrastructure
    System administration and scaling.
    System Design & Architecture
    Designing scalable applications.
    UI/UX & Frontend Foundations
    Advanced CSS animations and modern frontend principles.
    Frontend & UI/UX Terminology: The Visual Language of the Web
    Frontend & UI/UX Terminology: The Visual Language of the Web
    Frontend & UI/UX Terminology: The Visual Language of the Web
    Learn more chevron_right
    AI & ML expand_more
    AI & ML chevron_right

    Generative AI & LLM architectures.

    AI Agents & Automation
    Multi-agent systems, orchestration, and AI-driven development workflows.
    GenAI
    Generative models and applications.
    Machine Learning
    Data processing and predictive models.
    Security Considerations for AI Agents
    Security Considerations for AI Agents
    Security Considerations for AI Agents
    Learn more chevron_right
    Career expand_more
    Career chevron_right

    Interview tips & career strategies.

    Certificates
    Professional certifications and study guides.
    Interview
    Preparation and technical interviews.
    Post-Interview
    Next steps and negotiations.
    Automating OSCP Reports
    Automating OSCP Reports
    Automating OSCP and Penetration Testing Reports
    Learn more chevron_right
    Personal expand_more
    Personal chevron_right

    Identity, philosophy & personal growth.

    Identity
    Personal reflections and identity.
    Life Information
    Useful tips and life hacks.
    Philosophy
    Thoughts and philosophical discussions.
    The world of hacker
    The world of hacker
    요즘에는 배워야 할 것들이 너무 많아서 압박감을 느낄 정도이다보니 이런 글을 쓰게 되었다. 나의 시간은 제한적인데 무엇을 배워야할지, 어디에 시간을...
    Learn more chevron_right
    Tools expand_more
    Tools chevron_right

    Hand-picked toolkits & tech tutorials.

    Exploitation
    Tools for offensive security.
    Reconnaissance
    Information gathering tools.
    Operating System
    OS-level tools and utilities.
    Jekyll
    Static site generation.
    Forensics Tools
    Digital forensics utilities.
    ELK
    Elasticsearch, Logstash, and Kibana.
    Waybackurls
    Waybackurls
    Waybackurls: Discovering Forgotten Paths for Reconnaissance
    Learn more chevron_right
    Personal
    Life Information

    A Collection of Useful Sites

    Mar 14, 2018 · visibility views

    Cybersecurity

    • Security Certification Roadmap
    • Google Security Blog
    • Google Project Zero
    • HackTricks
    • OWASP TOP10
    • OWASP Cheat Sheet Series
    • CWE TOP25
    • Salted Password Hashing
    • Hacking Tools
    • Daniel Miessler’s Blog

    Software Engineer

    • 정규식이랑 데이터랑 매칭 되는지 확인 해주는 사이트
    • regex 자동 생성

    Table of Contents

    Related Posts

    The world of hacker
    Personal

    The world of hacker

    한국의 사이버 보안에 대한 나의 시선
    Personal

    한국의 사이버 보안에 대한 나의 시선

    The world of hacker
    Personal

    The world of hacker

    Future of AI
    Personal

    Future of AI

    Logo Hyoeun's Wiki

    Ethical Hacker · Cybersecurity Engineer

    Topics

    • Security
    • Engineering
    • AI & ML
    • Career
    • Tools
    • Personal

    Portfolio

    • About Me
    • Projects
    • CTF

    Connect

    • GitHub
    • LinkedIn
    • Email
    © 2026 Hyoeun Choi. All rights reserved. Terms Privacy