- Hacknetics
- Active Directory Management
- Active Directory AD Attacks
- buffer-overflows
- c2-frameworks
- covering-tracks
- Data Exfiltration
- Exploit Development
- file-transfers
- lateral-movement
- lin-priv-esc
- Things I have Pwn"d before
- persistence
- Linux Persistence
- Windows Persistence
- Assign Group Memberships
- Guest Windows Account Persistence
- WMI Persist With Event Filters
- SAM SYSTEM Exfil / Pass The Hash
- Backdoor Executable
- Special Privileges and Security Descriptors
- RID Hijacking
- Task Scheduler
- Hijacking File Associations
- Abusing Services
- Logon Triggered Persistence
- MSSQL Enabling xp cmdshell
- Sticky Keys
- Using Web Shells
- recon-enumeration
- resources
- shells
- tool-guides
- Asymmetric File Encrypt and Decrypt
- Aws Buckets
- cewl-crunch
- Creating a Custom Wordlist
- evil-winrm
- Git
- gobuster
- Hashcat
- Hydra User Guide
- John
- Linux Basics
- Mimikatz
- netcat
- Nmap
- nuclei
- PowerView
- r2
- Resources
- tcpdump
- T-Shark User Guide
- tmux
- ssh
- Vim
- Wireshark
- kwp
- LAPS
- KeePass KeeThief
- FileCryptography.psm1
- Impacket Pastable Commands
- crackmapexec Pastable Commands
- feroxbuster
- NetExec
- Ligolo-ng
- gs-netcat
- Web Path
- Wifi/Bluetooth/ZigBee/SDR/SmartCards
- Windows
- firewalls
- Malware Analysis
- Infrastructure Development
- Python3 Reference
- EDR
- Host Forensics
- Cloud
- OSINT
- Phishing
- Random
- Linux
- Windows Malware Development
- Golang