Offensive Cybersecurity
Sort
Active Directory
Also, consider taking a look at my Active Directory Attack Map. While it doesn't cover every possible attack avenue, and isn't ...
File Transfers and Data Exfiltration
Hash Cracking
Kali Optimizations
Network Pivoting
Nmap
Web
Memory Forensics
PJPT & PNPT Study Group Lessons
This book will hold all of the lesson plans and/or supplementary material for when I teach in the PJPT study group in the F0xhu...
Hydra
Linux
Any offensive security notes pertaining to Linux exploits or privilege escalation