Skip links
Skip to primary navigation
Skip to content
Skip to footer
Posts
Menu
About
Toggle search
Toggle menu
Menu
Toggle menu
📝 Posts
How to become a Pentester (2024)
Security Awareness
Seniority != Mastery
Sliver C2 Basics
📚 Notes
eJPT
Beginner
eCPPTv2
Intermediate
System Security
Network Security
Powershell
Linux Security
Web App Security
Wi-Fi Pentest
Metasploit & Ruby
PNPT
Practical
Practical Ethical Hacker
OSINT
External Pentest Playbook
Linux Privesc
Windows Privesc
Movement, Pivoting and Persistence
eWPTXv2
Web
Encoding & Filtering
Evasion Basics
Cross-site scripting (XSS)
XSS Filter Evasion
Cross-site request forgery (CSRF)
HTML5
SQL Injection
SQLI Filter Evasion
XML Attacks
Attacking Serialization
Server Side Attacks
Attacking Crypto
Authentication & SSO
APIs & Cloud Apps
Attacking LDAP
Active Directory Exploitation
Powershell
Bloodhound
Win Privesc
Lateral Movement
AD CS
CRTP
AD
AD Enumeration
Local Privesc
Lateral Movement
Offensive .NET
AD Persistence
AD Privesc
AD Defense
CRTE
AD Elite
Lateral Movement
AD Privesc
AD Persistence
Cross attacks
Cheat Sheet
☁️ CLOUD
Intro to Cloud Pentesting!
Get Familiar with Azure!
CARTP Review (Azure)
Intro & Recon
Enum & Privilege Escalation
Lateral mov & Persistence
🐳 CONTAINER
Hacking Containers!
Hacking Kubernetes!
Container Security - Defense in Layers!
Linux Isolation Primitives in Action!
From Containers to Pods
🔐 My CVEs
CVE-2024-2479
CVE-2024-2480
Enter your search term...