OSCP

Wireless OSWP

WEP/WPA/WPA2 Attack

Windows Priv Esc

Privilege Escalation on Windows

Enumerating & Attacking AD

Enumerating and Attacking AD menu

Linux Priv Esc

Privilege Escalation Methods for Linux

Useful

tips,advice, tool usage and more

Tools Syntax

Syntax, usage and install info

File Transfers

How to transfer files

Mimikatz

How to use mimikatz

AD Attack Methodology

Active Directory Attacking Methodology

Useful tools explained

Tools and why to use them

Active Directory Information

Useful information on Active Directory

Reverse Shell Generator

Reverse Shell Generator - Several Languages

web App Methodology

My study notes: Web App Methodology

Sniffing Methodology

My study notes: Sniffing Methodology

Malware Detection Methodology

My study notes: Malware Detection Methodology

Evading Honeypots & Firewall Methodology

My study notes: Evading Honeypots & Firewall Methodology

IoT Methodology

My study notes: IoT Methodology

Wireless Methodology

My study notes: Wireless Methodology

Windows Processes

Information about Windows Processes

Information on Windows

Learn basics of Windows OS

Detect Windows Malware

information and links for Windows Malware

Malware

Malware Information and Links