Skip links
Skip to primary navigation
Skip to content
Skip to footer
Posts
Menu
About
Toggle search
Toggle menu
Menu
Toggle menu
Posts
- How to become a Pentester (2024)
- Security Awareness
- Sliver C2 Basics
────────────────
Notes
eJPT
────────────────
eCPPTv2
- System Security
- Network Security
- Powershell
- Linux Security
- Web App Security
- Wi-Fi Pentest
- Metasploit & Ruby
────────────────
PNPT
- Practical Ethical Hacker
- OSINT
- External Pentest Playbook
- Linux Privesc
- Windows Privesc
- Movement, Pivoting and Persistence
────────────────
eWPTXv2
- Encoding & Filtering
- Evasion Basics
- Cross-site scripting (XSS)
- XSS Filter Evasion
- Cross-site request forgery (CSRF)
- HTML5
- SQL Injection
- SQLI Filter Evasion
- XML Attacks
- Attacking Serialization
- Server Side Attacks
- Attacking Crypto
- Authentication & SSO
- APIs & Cloud Apps
- Attacking LDAP
────────────────
Active Directory Exploitation
- Powershell
- Bloodhound
- Win Privesc
- Lateral Movement
- AD CS
────────────────
CRTP
- AD Enumeration
- Local Privesc
- Lateral Movement
- Offensive .NET
- AD Persistence
- AD Privesc
- AD Defense
────────────────
CRTE
- Lateral Movement
- AD Privesc
- AD Persistence
- Cross attacks
- Cheat Sheet
────────────────
CLOUD
- Intro to Cloud Pentesting!
- Get Familiar with Azure!
- CARTP Review (Azure)
- Intro & Recon
- Enum & Privilege Escalation
- Lateral mov & Persistence
────────────────
CONTAINER
- Hacking Containers!
My CVEs
CVE-2024-2479
CVE-2024-2480
Enter your search term...