Skip to content

Latest commit

 

History

History
87 lines (85 loc) · 9.45 KB

File metadata and controls

87 lines (85 loc) · 9.45 KB

Not The Hidden Wiki

Other Links (To be segregated in the future)


  • Abatchy’s Port Forwarding Guide - link
  • Windows Port Forwarding - link
  • SSH Tunnelling Explained - link
  • Understanding Proxy Tunnels - link
  • Understanding Port forwarding with Metasploit - link
  • Explore Hidden Networks with Double Pivoting - link
  • 0xdf hacks stuff. Pivoting and Tunnelling - link
  • Docker Container Breakout: Abusing SYS_MODULE capability - link
  • OSCE3 Guide - link
  • CRTO – Notes to Exam Preparation - link
  • 7ways to escape a container - link
  • Security Mind Maps - link
  • mindmaps abount pentesting - link
  • Linux Security and Hardening Security Guide - link
  • Ebook Joas (great resourses offsec) - link
  • Red-Team-Management - link
  • Pentest Notes - link
  • A Pivot Cheatsheet for Pentesters - link
  • LOTS - link
  • OWASP MSVS - link
  • RedTeam Infrastructure Wiki - link
  • Walking the Tightrope: Maximizing Information Gathering - link
  • Secureum Mind Map - link
  • Microsoft Defender for IoT Ninja Training - link
  • Abusing Managed Identities - link
  • Game Hacking Academy - link
  • macOS Red Teaming - link
  • Tests with cards - link
  • Shodan Snippets - link
  • pure bash bible - link
  • One Way Or Another: Initial Access Vectors - link
  • Youssef Sammouda: Blog - link
  • 0xPat: Blog - link
  • Vegeta_Ssj Pastebin - link
  • Swaks: Swiss Army Knife for SMTP - link
  • Snake&Apple - link
  • The shades of tunneling - link
  • OSCE³ REVIEW - link
  • OSED Preparation - link
  • OSWE Preparation - link
  • OSEP Preparation - link
  • Infrastructure testing with MSF - link
  • Better Service Discovery - link
  • Snake&Apple I - Mach-O - link
  • Snake&Apple II - Code Signing - link
  • Snake&Apple III - Checksec - link
  • MailSniper - link
  • Snake&Apple IV - Dylibs - link
  • Cyber Security Mindmap - link
  • DYLD — Do You Like Death? (I) - link
  • DYLD — Do You Like Death? (II) - link
  • DYLD — Do You Like Death? (II) - link
  • Phishing With Dynamite - link
  • SMTP Smuggling - Spoofing E-Mails Worldwide - link
  • Living Off the Foreign Land - Part 1/3 - link
  • Evil QR - Phishing With QR Codes - link
  • MalRDP: Implementing Rouge RDP Manually - link
  • Building a Red Team Infrastructure in 2023 - link
  • Walking the Tightrope: Maximizing Information Gathering while Avoiding Detection for Red Teams - link
  • The Hacker Recipes - link
  • Persistence Using Windows Terminal "Profiles" - link
  • Evilginx, meet BITB - link
  • A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course - link
  • How disable comments make static analysis tools worse - link
  • A Large-Scale Security-Oriented Static Analysis of Python Packages in PyPI - link
  • DevSecOps with DAST and Security Hub - link
  • Source Code Analysis Tools - link
  • A Guide On Implementing An Effective SAST Workflow - link
  • A repository containing a variety of mindmaps for cyber security technologies, methodologies, courses, and certifications, presented in a tree structure for easy understanding - link
  • A mind map collection by Orange Cyberdefense detailing various cybersecurity topics. - link
  • A GitHub repository offering a collection of static binaries compiled for ARM, x86, and x86_64 by polaco1782. - link
  • ERNW's GitHub repository containing a collection of statically compiled tools such as Nmap and Socat. - link
  • A GitHub repository by andrew-d featuring various Unix tools built as statically-linked binaries. - link
  • w4cky Blog - link
  • Public Pentesting Reports - link
  • Pentesting Reporting Tool - link
  • How to report your findings - link
  • Awesome Shodan queries - link
  • Introducing Misconfig Mapper - link
  • cloud penetration testing - link
  • Talkback is a smart infosec resource aggregator, designed to help security enthusiasts be more productive. - link
  • Analysis of user password strength - link