Not The Hidden Wiki
- Abatchy’s Port Forwarding Guide - link
- Windows Port Forwarding - link
- SSH Tunnelling Explained - link
- Understanding Proxy Tunnels - link
- Understanding Port forwarding with Metasploit - link
- Explore Hidden Networks with Double Pivoting - link
- 0xdf hacks stuff. Pivoting and Tunnelling - link
- Docker Container Breakout: Abusing SYS_MODULE capability - link
- OSCE3 Guide - link
- CRTO – Notes to Exam Preparation - link
- 7ways to escape a container - link
- Security Mind Maps - link
- mindmaps abount pentesting - link
- Linux Security and Hardening Security Guide - link
- Ebook Joas (great resourses offsec) - link
- Red-Team-Management - link
- Pentest Notes - link
- A Pivot Cheatsheet for Pentesters - link
- LOTS - link
- OWASP MSVS - link
- RedTeam Infrastructure Wiki - link
- Walking the Tightrope: Maximizing Information Gathering - link
- Secureum Mind Map - link
- Microsoft Defender for IoT Ninja Training - link
- Abusing Managed Identities - link
- Game Hacking Academy - link
- macOS Red Teaming - link
- Tests with cards - link
- Shodan Snippets - link
- pure bash bible - link
- One Way Or Another: Initial Access Vectors - link
- Youssef Sammouda: Blog - link
- 0xPat: Blog - link
- Vegeta_Ssj Pastebin - link
- Swaks: Swiss Army Knife for SMTP - link
- Snake&Apple - link
- The shades of tunneling - link
- OSCE³ REVIEW - link
- OSED Preparation - link
- OSWE Preparation - link
- OSEP Preparation - link
- Infrastructure testing with MSF - link
- Better Service Discovery - link
- Snake&Apple I - Mach-O - link
- Snake&Apple II - Code Signing - link
- Snake&Apple III - Checksec - link
- MailSniper - link
- Snake&Apple IV - Dylibs - link
- Cyber Security Mindmap - link
- DYLD — Do You Like Death? (I) - link
- DYLD — Do You Like Death? (II) - link
- DYLD — Do You Like Death? (II) - link
- Phishing With Dynamite - link
- SMTP Smuggling - Spoofing E-Mails Worldwide - link
- Living Off the Foreign Land - Part 1/3 - link
- Evil QR - Phishing With QR Codes - link
- MalRDP: Implementing Rouge RDP Manually - link
- Building a Red Team Infrastructure in 2023 - link
- Walking the Tightrope: Maximizing Information Gathering while Avoiding Detection for Red Teams - link
- The Hacker Recipes - link
- Persistence Using Windows Terminal "Profiles" - link
- Evilginx, meet BITB - link
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course - link
- How disable comments make static analysis tools worse - link
- A Large-Scale Security-Oriented Static Analysis of Python Packages in PyPI - link
- DevSecOps with DAST and Security Hub - link
- Source Code Analysis Tools - link
- A Guide On Implementing An Effective SAST Workflow - link
- A repository containing a variety of mindmaps for cyber security technologies, methodologies, courses, and certifications, presented in a tree structure for easy understanding - link
- A mind map collection by Orange Cyberdefense detailing various cybersecurity topics. - link
- A GitHub repository offering a collection of static binaries compiled for ARM, x86, and x86_64 by polaco1782. - link
- ERNW's GitHub repository containing a collection of statically compiled tools such as Nmap and Socat. - link
- A GitHub repository by andrew-d featuring various Unix tools built as statically-linked binaries. - link
- w4cky Blog - link
- Public Pentesting Reports - link
- Pentesting Reporting Tool - link
- How to report your findings - link
- Awesome Shodan queries - link
- Introducing Misconfig Mapper - link
- cloud penetration testing - link
- Talkback is a smart infosec resource aggregator, designed to help security enthusiasts be more productive. - link
- Analysis of user password strength - link