💡
💡
💡
💡
Offsec Journey
Search…
⌃K
Introduction
Learning Resources
Web App Pentesting
Reconnaisance
OSINT
Vulnerability Scanning
Resource Development
Password Crack Rig
Malware
C2 Infrastructure
Phishing Infrastructure
Initial Access
Phishing
Password Spray
Malicious Outlook Rules
Host Triage
Situational Awareness
Internal Reconnaissance
Enumeration
Lateral Movement
Misc.
Defense Evasion
Dynamic Analysis
Static Analysis
General
Windows Internals
Execution
.NET Post Exploitation
Powershell
AMSI
Privilege Escalation
Domain Privilege Escalation
Local Priv Esc - Windows
Local Priv Esc - Linux
Lateral Movement
Tunnels & Port Forward
Persistence
Local Persistence
Domain Persistence
Linux
Enumeration
Lateral Movement
Misc.
Exploitation Techniques
Exploit Dev
Kali Linux Fu
Kali Fu
File System
Scanning & Enumeration
Redis
Port Scan
RPC
Kerberos
WinRM
Telnet
PBX
RDP
Finger
VNC
Mail Servers
SSH
SMB
Content Management Systems
FTP
Web Server
DNS
LDAP
Database Services
IKE VPN Service
SNMP
Sniffing
Web App Vulnerabilities
Directory Traversal
Server-Side Template Injection
HTTP Parameter Pollution
Sensitive Data Exposure
Broken Access Control
Business Logic Testing
Broken Authentication
XXE
File Inclusion
SSRF
Injection
Insecure Deserialization
Cross-Site-Scripting (XSS)
API Pentesting
Resources
Programming
Bash
Maintaining Access
C2 - Command & Control
Notes
Cloud Security Pentest
Penetration Testing AWS Storage
Pentesting Azure
Pentesting Cloud Networks
Blue Team
Home Lab
Reverse Engineering
Forensics
Reverse Engineering
Malware Analysis
Buffer Overflow
Learning Resources
Home Lab Project
Initial Configuration
Active Directory
Exfiltration
Attack Vectors
Wireless Pentesting
Radius
Powered By
GitBook
Introduction
Welcome!
This Gitbook contains all the information and resources compiled during my on-going Infosec Career. This is an ongoing project and gets updated regularly with new content.
I hope this helps whoever is reading this as much as it has helped me.
Next - Learning Resources
Web App Pentesting
Last modified
1yr ago