- All of the Best Links and Resources on Cyber Security.
- Cyber Intelligence
- Red - Offensive Operations
- Reconnaissance and Scanning
- Exploitation and Targets
- Offensive Frameworks
- Shells
- MSFVenom Commands
- Exploitation by Port
- Web App Vulnerabilities
- Web Technologies
- Special Targets
- Exploit Dev/Buffer Overflow
- Post Exploitation
- Attacking Active Directory
- Lateral Movement
- Password Attacks
- Web App Hacking
- Red/Purple Teaming
- Physical Security Testing
- Wireless Hacking
- Social Engineering
- Offensive Toolbox
- Blue - Defensive Operations
- Blue - DFIR: Digital Forensics and Incident Response
- Interact with remote machine
- Windows System Enumeration
- Windows Process Information
- Windows DFIR Checks
- Windows DFIR Check by MITRE Tactic
- Windows Event Logs
- Windows Remediation Commands
- IR Event Log Cheatsheet
- Linux DFIR Commands
- MacOS DFIR Commands
- YARA
- Memory Forensics
- Sandboxing
- File/Binary Analysis
- Malware
- Reverse Engineering
- Yellow - NetEng/SysAdmin
- Yellow - Logging and Security Architecture
- Yellow - Cloud
- Yellow - Containers
- Yellow - Code and CLI
- Yellow - AI, Machine Learning, and FOSS
- Grey - Privacy/TOR/OPSEC
- Training and Resources