We write some intros and techniques for information security, including penetration testing, blue team techniques, malware analysis.