A huge chunk of my personal notes since I started playing CTFs and working as a red teamer. These are living documents and I updated or add to them relatively often.
DISCLAIMER: Please note that these documents are only provided for legal purposes. Please do not use the content for illigal actions.
NOTE: As always, it is pretty hard to point out every source for different tools or payloads. If I used your payload anywhere in my notes and you wanted to be mentioned, feel free to reach out to me on Twitter and I will add you asap.
If you like the project, give it a ⭐ or share it on various platforms. My goal is to create and to gather resources for people to help them on their career.
Thank you for reading.
- 01 Information Gathering
- 02 Vulnerability Analysis
- 03 Web Application Analysis
- 04 Database Assessment
- 05 Password Attacks
- 06 Wireless Attacks
- 07 Reverse Engineering
- 08 Exploitation Tools
- 09 Sniffing & Spoofing
- 10 Post Exploitation
- 11 Forensics
- 12 Reporting Tools
- 13 Social Engineering Tools
- AI
- Basics
- Blue Teaming
- Bug Bounty
- Cloud
- Command and Control
- Container
- Cryptography
- CVE
- Evasion
- Exploitation
- Frameworks
- Hardware
- IoT
- Malware Development
- Mobile
- Operational Security
- OSINT
- Payloads
- Privacy
- Templates
- Wordlists