0% found this document useful (0 votes)
321 views16 pages

God Level Cyber Resources

The document provides a comprehensive list of resources for learning about cybersecurity, including courses, tutorials, and blogs across various topics such as penetration testing, networking, operating systems, web pentesting, binary exploitation, privilege escalation, and more. It includes free training options, YouTube channels, and GitHub repositories to aid beginners and advanced learners in enhancing their skills. Additionally, it highlights tools and guides for practical application in the cybersecurity field.

Uploaded by

nitr0gen1yt
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
321 views16 pages

God Level Cyber Resources

The document provides a comprehensive list of resources for learning about cybersecurity, including courses, tutorials, and blogs across various topics such as penetration testing, networking, operating systems, web pentesting, binary exploitation, privilege escalation, and more. It includes free training options, YouTube channels, and GitHub repositories to aid beginners and advanced learners in enhancing their skills. Additionally, it highlights tools and guides for practical application in the cybersecurity field.

Uploaded by

nitr0gen1yt
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

Intro To CyberSec

●​ Learning Path for Beginners - Mrashleyball


●​ Free Security Training - Varonis
●​ PentesterLab Bootcamp - Pentesterlab
●​ Penetration Testing Bootcamp - HackerSploit YouTube (55 Videos)
●​ Beginning in Offensive Security Part 1 - Mrs_Skelli
●​ Beginnings of Offensive Security Part 2 - Mrs_Skelli
●​ Awesome Thread To Explain All the Essentials Tools in a Simple Way - Parsan26 Twitter
●​ W3rni0 Awesome Resources - W3rni0 Github
●​ CyberSec Courses for Beginners - Hackerstop.org
●​ Future Careers for the World's Workforce
●​ FreeTraining DFIRDIVA Core Training CyberSec
●​ CyberAces tutorials Windows, Linux, Networking, PowerShell, Bash, Python
●​ Awesome Computer History
●​ ITMASTERS Free Short Course on PenTesting and a free exam at the end.
●​ Introduction to Cyber Security (Skillsforall)
●​ So you want to be a Hacker?
●​ Becoming a Pentester by Jhalon
●​ TryHackMe Beginner Path
●​ HackerSploit YouTube Channel
●​ TheCyberMentor YouTube Channel. PEH course is divided into categories in his channel
for FREE!!
●​ These can also be found on TCM's PEH course or on YouTube below. The course he
offers is free on YouTube. He also does giveaways which can be found on TCM's Twitter
○​ Full Ethical Hacking Course - Beginner Network Penetration Testing (2019)
○​ Zero to Hero: A Practical Network Penetration Testing Course
○​ Web Application Pentesting
○​ Buffer OverFlow Series

Networking
NOTE: Some are taken from EbookFoundation
●​ Free Code Camp
○​ Network Layers and the Relationships Between Them
○​ How Computers Work, How the Internet Works And Some Computer Security
Basics
●​ ITMASTERS Free Short Course Computer Network Fundamentals and a free exam at
the end.
●​ What is IP addressing? How IPv4 works| ipv4 vs ipv6 | 5 types of ip classes | public vs
private ip - IT k Funde YouTube
●​ An Introduction to Computer Networks - Second Edition - open.umm.edu
●​ FREE CCNA 200-301. Complete Course. NetworkChuck 2021
●​ Cisoc Skillsforall Network Essentials
●​ N/W Basics Part 1 Hackers-Arise
●​ N/W Basics Part 2 Hackers-Arise
●​ Service Names with their Port Numbers
●​ Intro to Networks by Peter L Dordal
●​ An Introduction to Computer Networks (HTML, PDF, Kindle)
●​ Bits, Signals, and Packets: An Introduction to Digital Communications and Networks
●​ Code Connected vol.1 (PDF) (book on ZeroMQ)
●​ Computer Networking : Principles, Protocols and Practice (HTML, ePub, PDF, Kindle)
●​ Computer Networks: A Systems Approach - Larry Peterson and Bruce Davie (HTML,
epub, mobi, PDF)
●​ Distributed systems for fun and profit
●​ High-Performance Browser Networking - Ilya Grigorik
●​ How HTTPS Works - DNSimple
●​ HTTP Succinctly, Syncfusion (PDF, Kindle) (email address requested, not required)
●​ HTTP2 Explained - Daniel Stenberg
●​ Introduction to HTTP - Launch School
●​ IPv6 for IPv4 Experts - Yar Tikhiy (PDF)
●​ Kafka, The definitive Guide - Neha Narkhede (PDF)
●​ Network Science - Albert-Laszló Barabási
●​ The TCP/IP Guide
●​ Understanding IP Addressing: Everything you ever wanted to know (PDF)
●​ ZeroMQ Guide
●​ What is Computer Networking
●​ Networking Fundamentals (netacad)
●​ The Five Pillars of an Information/Cyber Security Professional
●​ Professor Messer N10-007 Network+
●​ Computer-Network-tutorials
●​ Networking Tutorials - InetDaemon's IT Tutorials
●​ Network Fundamentals (youtube)
●​ Networking Basics 1 (By Night and Skelli)
●​ Networking Basics 2 (By Night and Skelli)
●​ Computer Networking Course offered By Georgia Tech University [Free Course]
●​ Network Security Course offered By Georgia Tech University [Free Course]
●​ Networking For Web-Developers offered By Georgia Tech University [Free Course]

Operating Systems
●​ Introduction To Operating Systems offered By Georgia Tech University [Free Course] -
Udacity
●​ Advanced Operating Systems course offered By Georgia Tech University [Free Course] -
Udacity
●​ GT - Refresher - Advanced OS offered by Georgia Institute of Technology [Free Course]
- Udacity
●​ Gatech Sslab CS 3210: Operating Systems - TC.gts3.org

Web-Pentesting
●​ Browser to Shell - Systemweakness.com
●​ Web-Services Recon - Thehacker.recipes
●​ OTP Bypass Step To Step - TechnicalSurendre Medium
●​ Web-Services Hacking Guides - Sushant747.gitbooks
●​ Resources for Beginner Bug Bounty Hunters - Nahamsec Github
○​ Resources for Beginner Bug Bounty Hunters - Basics - Nahamsec Github
○​ Resources for Beginner Bug Bounty Hunters - Labs Setup - Nahamsec Github
○​ Resources for Beginner Bug Bounty Hunters - Vuln Types - Nahamsec Github
○​ Resources for Beginner Bug Bounty Hunters - Blogs and Reports - Nahamsec
Github
●​ XSS Resources - InfosecWriteups
●​ SSTI and Some More Easy Reports for Bug Hunting - Gandhim373 Medium
●​ SecurityIdiots - Web Hacking Blogs by Faraz Khan
●​ Web Cheat Sheet - Guide.OffsecNewbie
●​ Web Application Penetration Testing Notes - Techvomit.net
●​ RCE via LFI Log Poisoning - ShahJerry33 Medium
●​ Xapax Attacking Web Applications - OAuth Attack (Many more topics in the index)
●​ 5 Most Effective Ways of Learning in Bug Bounty
●​ HackAllTheThings Web-App Articles
●​ Web Hacking 101 PwnFuntion
●​ HackerStop BugBounty resources
●​ HackerSploit Web-App PenTesting Tutorials
●​ XXE Vulnerabilities and Attacks Hackers-Arise
●​ XSS Attacks Hackers-Arise
●​ Burp Suite Part 2 - Bypass Weak Input Validation to Upload Malware to a Website
●​ Burp Suite Part 3 - Testing for Persistent XSS
●​ Burp Suite Part 4 - RFI
●​ MR-SINISTER blogs and guides
●​ Bug Bounty Training
●​ Practice your XSS skills
●​ Hacker101
●​ Tryhackme Web Path
●​ Web Application Ethical Hacking - Penetration Testing Course for Beginners
●​ Burp Suite Essentials
●​ Portswigger Web-Learning Path
●​ Template Injection Workshop - Gosecure.Github
●​ OWASP's Top Ten Vulns (By Night and Skelli)
●​ Introduction to Web Application Hacking OWASP Top 10

Binary-Exploitation
●​ Nop-Tech Notes for OSED - nop-tech Github
●​ Understanding Assembly Language - Dennis Yurichev
●​ Reverse Engineering For Everyone! - 0xinfection Github
●​ Start Learning Reverse Engineering - Coder_RC Twitter
●​ Pwn College
●​ Binary Exploitation Blogs - Aidenpearce369 Github.io
●​ ROP Emporium - Learn return-oriented programming through a series of challenges.
●​ GuyInATuxedo Nightmare - Guyinatuxedo.github
●​ PWN Land - D4mianWayne Github
●​ Buffer Overflow Series - Heath Adams Youtube
●​ Buffer Overflow Guide - Johnjhacking Github
●​ How2Heap - Sellphish Github
●​ OmegaVoid Blogs on BinExp BOF - OmegaVoid.github
●​ Binary Exploitation for beginners - tc.gts3.org
●​ Exploit Development Learning Roadmap - Redit
●​ Modern Binary Exploitation - RPISEC Github
●​ Windows Binary Course (with videos) - Ashemery Github
●​ Exploit Development Learning resources - Kalitut.com
●​ Windows Exploit Development - SecuritySift - SecuritySift.com
●​ Crackmes - Thanks to Dasith
●​ Exploit Dev Resources - Rmusser01 Github
●​ Exploit Development blog - Aidenpearce369 Github.io
●​ Getting Started with Exploit Development - DayZeroSec.com

Thanks to Swanandx for the resources below. His Website. His Github

Blogs :-
●​ PWN challenges Writeups
●​ Binary Exploitation Blogs - Aidenpearce369 Github.io
●​ Kileak Github Writeups
●​ Exploit Development Blogs - Aidenpearce369 Github.io
●​ 4mianwayne PWN Writeups
●​ CTF101 Bin-Exp Buffer Overflow
●​ Skull Security PWN CTF walkthroughs
●​ Google project zero blog

Youtube :-
●​ Kileak PWN/Assembly CTF Writeup Videos
●​ Binary Exploitation/Memory Corruption by LiveOverflow

x86-64 Assembly
●​ IntroX86
●​ ARM Assembly
●​ Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration

Privilege Escalation
●​ Privilege Escalation - Conda YouTube
●​ Linux
○​ Linnux Privilege Escalation Resources - SirenSecurity.io
○​ Conda YouTube
■​ OSCP - Linux Privilege Escalation Methodology
○​ Linux Privilege Escalation - Docker Group
○​ Linux Exploit Suggester 2 - Github
○​ Privilege Escalation - Book.hacktricks
○​ Guide - Linux Privilege Escalation - Payatu.com
○​ Linux Privilege Escalation Checklist - NetBiosX Github
○​ Linux Priv Esc - PWNWiki.io
○​ Linux Privilege Escalation Resources - TCM Course Resources Github
○​ Privilege Escalation - Linux - Sushant747 Gitbooks
●​ Windows
○​ Windows Privilege Escalation Resources - SirenSecurity.io
○​ FuzzSecurity Windows Privilege Escalation
○​ Living Off The Land Binaries, Scripts and Libraries - lolbas-project.github
○​ Windows Priv Esc - PWNWiki.io
○​ The Read Team Guide - Privilege Escalation - KwcSec.github
○​ Windows Privilege Escalation Resources - TCM Course Resources Github
○​ Privilege Escalation Windows - Guide.OffsecNewbie

Android Pentesting
●​ HackerStop Mobile Pentesting
●​ HackAllTheThings Mobile Pentesting
●​ Android Hacking video by Brain Moulding
Evasion And Malware
●​ BlackCloud - infosec and other stuffs
●​ Introduction to Sandbox Evasion and AMSI Bypasses - Jake Krasnov, Anthony Rose,
Vincent Rose - YouTube BC Security
○​ Hack to Basics – Adapting Exploit Frameworks to Evade Microsoft ATP -
BC-SECURITY Github
●​ How to bypass AMSI and execute ANY malicious Powershell code - 0x00-0x00.github
●​ AMSI Fail - amsi.fail
●​ Evading Detection: A Beginner's Guide to Obfuscation - YouTube BC-Security
●​ Bypass AMSI by Manual Modification - s3cur3th1ssh1t.github
●​ Defense Evasion - DMCXBlue.gitbook
●​ Defense Evasion
●​ Art of Anti Detection 1 – Introduction to AV & Detection Techniques - Pentest.blog
●​ Art of Anti Detection 2 - PE Backdoor Manufacturing) - Pentest.blog
●​ Malware Development Part 1 - 0xPat Github
●​ Malware Development Part 2 - 0xPat Github
●​ A Tale of EDR Bypass Methods - S3cur3th1ssh1t
●​ Defense Evasion - Kwsec.gitbook
●​ Evasion Windows - Akenofu.gitbook
●​ Windows Defender AV Evasion - Purpl3f0xsecur1ty
●​ Write a Crypter in any Language - Netsec.expert
●​ Bypass AV Dynamics - blog.Sevages
●​ Decon27 C# Workshop - Mvelazc0 Github
●​ Weaponising C# Fundamentals - Fozavci
●​ Getting Started with Malware Development - C5pider Twitter
●​ Implane Development and Defense Evasion Part 1 - File Basics Lsteelo Medium
●​ GhostSec420 Bypass AV Dynamics
●​ NiiConsulting Simple CMD Reverse Shell
●​ IRED Team
●​ 0xHop Blog on AV Evasion part 1
●​ 0xHop Blog on AV Evasion part 2
●​ AV Evasion Mimikatz - IppSec YouTube

Forensics
●​ Introduction to Windows Forensics
●​ A Source for PCAP Files and Malware Samples
●​ Stegsnow - Delightlylinux
●​ Data Carving using Foremost - Hackingarticles.in
Amazing Sites
●​ KhaoticDev.Net Resources
●​ The Book of Secret Knowledge - Trimstray Github
●​ SirenSecurity.io
●​ XssMice and other tweets (Resources) - Twitter
●​ Code.org
●​ TeachYourselfInfoSec.com
●​ TheHacker.recipes
●​ Python Training - Distruptivelabs
●​ Lolbas-project.github.io
●​ PWNWiki.io
●​ BC-Security Videos - YouTube
●​ Free Security Training - Varonis
●​ Infosec_Reference - Rmuser01 Github
●​ 0xSP.com
●​ Offensive-Resources - Zeyad-Azima Github
●​ PentesterLab Bootcamp - Pentesterlab
●​ W3rni0 Awesome Resources - W3rni0 Github
●​ Programming Tasks (with solutions in all languages) - Rosettacode
●​ Resources for Beginner Bug Bounty Hunters - Nahamsec Github
●​ W3rni0 Awesome Resources - W3rni0 Github
●​ SecurityIdiots - Web Hacking Blogs by Faraz Khan
●​ OSCE3 (OSWE, OSEP, OSED) Complete Guide - CyberSecurityUP Github
●​ Rowbot's Pentesting Notes - OffsecNewbie.com
●​ Reverse Shell Cheat Sheet
●​ HighOnCoffee Blogs
●​ GhostSec420 Pentest Toolkits and Resources
●​ GTFOBins - Linux Service Escalation Cheat Sheet
●​ Wadcoms - Windows Service Escalation Cheat Sheet
●​ A brilliant CheatSheet and Explanations for various topics - Xapax Github
●​ FuzzSecurity Tutorial
●​ Nickapic's notes
●​ ExplainShell
●​ List of hackable sites
●​ TryHackMe
●​ HackTheBox
●​ Active Directory Security
●​ Great eCPPTv2 External Resources
●​ DFIR Madness
●​ HackerStop
●​ Cisco's Skillsforall
●​ LeanPub (You can get many books)
●​ Name The Hash (Usefull for finding the hash type and hashcat/john mode)
●​ IPPSEC Blogs, Videos and Walkthroughs
●​ NetCat Use Cases
●​ Hackers Arise
●​ Exploit Development and Overflows FuzzySecurity
●​ Tsushima blogs (Programming and CyberSec)
●​ Learn Linux
●​ Proffesor Messer
●​ Linux Notes for Professionals

Gitbooks / Github.io

Gitbook
●​ OSCP Useful Links - BackDoorShell.gitbooks
●​ Strange-1 Gitbook
●​ The Read Team Handbook - KwcSec.gitbook
●​ Hack All The Things - Akenofu.gitbook
●​ DarkSidious - Hunter2.gitbook
●​ What is AD101? - Kvenkatraman10.gitbook
●​ Certification Notes and Cheat Sheets - Ferx.gitbook
●​ Red Team Notes 2.0 - DMCXBlue.gitbook
●​ Sushant747 - Sushant747.gitbooks
●​ D00mfist1 - D00mfist1.gitbooks

Github.io
●​ Lolbas-project - Github.io
●​ Shroudri - Github.io
●​ Reverse Engineering For Everyone! - 0xinfection Github
●​ Aidenpearce369 - Github.io
●​ byt3bl33d3r - Github.io
●​ 0xbharath Github.io
●​ PWNWiki - Github.io
●​ Wadcoms - Github.io
●​ 0x00-0x00 Github.io
●​ s3cur3th1ssh1t - Github.io
●​ Xapax Security Notes - Github.io
●​ Gosecure - Github.io
●​ GuyInATuxedo Nightmare - Github.io
●​ OmegaVoid - Github.io
●​ Swanandx - Github.io
●​ Kileak - Github.io
●​ D4mianwayne - Github.io
●​ 0xpat - Github.io
●​ S3cur3th1ssh1t - Github.io
●​ 0xHop - Github.io
●​ GTFOBins - Github.io
●​ GCHQ (CyberChef) - Github.io
●​ Razvioverflow - Github.io
●​ Fumenoid - Github.io

Pivoting / Port Forwarding Guides


(These can also be very helpfull for eCPPTv2)
●​ Port Forwarding - Fumenoid Github.io
●​ Windows Pivoting Commands - PWNWiki.io
●​ Pivoting on a Penetration Test - PWNWiki.io
●​ Metasploit Tutorials - Pivoting into Internal Subnets - Metasploitation YouTube
●​ Port Forwarding and Tunneling - Sushasnt747 Gitbooks
●​ Port Forwarding/SSH Tunneling - Guide.OffsecNewbie
●​ State of the Art of Network Pivoting
●​ Read Team Handbook Pivoting - KwcSec
●​ Offensive Security Guide to SSH Tunnels and Proxies - Specterops
●​ Wreath from TryHackMe
●​ Explore Hidden Networks with Double Pivoting - Pentest.blog
●​ BackDoorShell blog for Pivoting
●​ The Cyber Plumber's Handbook - It is a paid book
●​ A Red Teamer's guide to Pivoting
●​ How to use SSH Tunneling - Howtogeek
●​ Pivoting With Chisel
●​ Nessus over SOCKS over Metasploit
●​ SOCKS Proxy Lab Setup - by Kiwids (Notion)

Docker
●​ The Docker Handbook - Docker-handbook.farhaan.dev
●​ Docker For Pentesters - Blog.Ropnop
●​ Docker Getting Started - Docker Hub
●​ Docker 101 Tutorial - Docker.com
●​ University of Helsinki DevOps with Docker course - Devopswithdocker.co,

Programming
●​ How To Start Learning Programming - Freecodecamp.org
●​ Resources for Beginner Bug Bounty Hunters - Coding - Nahamsec Github
●​ Learn Computer Science - Code.org
●​ Programming Tasks (with solutions in all languages) - Rosettacode
●​ Offensive Programming with Challenges - Zeyad-Azime Github
Note : Some are taken from EbookFoundation
●​ Programming Books Free
●​ Python
○​ Violent Python3
●​ Note : The following are some links which will help you to begin with python
programming to be a professional and the rest relies on Practice and small python
projects.
○​ Python Training - Distruptivelabs
○​ Art Of Packet Crafting with Scapy - 0xbharath Github.io
○​ Python Foundations - 0xbharath Github.io
○​ Python Network Programming - 0xbharath Github.io
○​ Introduction To Python Programming [Free Course]
○​ Python Data Science Cheatsheet
○​ Python-Projects
○​ Python-Projects for cybersecurity
●​ JavaScript
○​ The Modern JavaScript Tutorial - Javascript.info
○​ SoloLearn JavaScript course - Sololearn
○​ Playcode JS Tutorials
●​ C++
○​ C++ For Programmers - Catherine Gamboa (Udacity)
○​ C++ Programming Tutorial for Beginners (For Absolute Beginners)
○​ C++ Tutorial by The Bad Tutorials
○​ C++ Tutorial for Beginners - Full Course - Mike Dane - (freeCodeCamp)
○​ Google's C++ Course
○​ Introduction to C++ (MIT's opencourseware)
○​ Microsoft edX Courses:
■​ Advanced C++
■​ Intermediate C++
■​ Introduction to C++
●​ C
○​ C Programming Tutorial
○​ C Programming Tutorial for Beginners - Mike Dane - (freeCodeCamp)
○​ Introduction to Computer Science
○​ The Arduino Platform and C Programming
●​ C#
○​ Decon27 C# Workshop - Mvelazc0 Github
○​ Make System.Windows.Forms work in VS2019 - Kareem Sulthan Youtube
○​ Installing DotNet and running C# codes on Linux
○​ Weaponising C# Fundamentals - Fozavci
○​ C# 101 - Scott Hanselman, Kendra Havens Microsoft.
○​ C# Tutorial - Full Course for Beginners - Mike Dane - (freeCodeCamp)
○​ Learn how to program: C# - Epicodus Inc.
○​ Microsoft C# docs
●​ Bash
○​ Bash Programming guide - Guid.bash.academy
○​ Bash Programing Complete Series - Caleb Curry YouTube

PowerShell, Windows and Active-Directory Hacking


●​ Powershell101 book is from learnpub​
PowerShell
○​ Adversary Tactics: PowerShell - Specterops Github
○​ List_Local_Admins_Remote_Hosts.ps1 - Mubix Github
○​ PowerShell Course - info.varonis.com
○​ PowerShell for Pentesters by The Mayor - YouTube
○​ Powershell for Pentesters by PenTester Academy - YouTube
○​ PowerShell 101 by Mike F Robbins - Leanpub
○​ PowerShell and DSC Team Channel (YouTube) - Youtube
○​ HackAllTheThings PowerShell Cheat Sheet - Akenofu Gitbook
○​ PowerShell Beginners Guide (More Resources in the bottom on that page)
○​ Windows PowerShell Tutorials
○​ Guru99 PowerShell Tutorials
○​ All the things PowerShell (YouTube) - By Shane Young
○​ PowerShell For Beginners Full Course (YouTube) - By Nerd's lesson
○​ Learning Powershell by Microsoft
○​ PS 101. An Intro To PowerShell by Grimmie
○​ PowerShell Commands Cheat Sheet by TheMayor
○​ Advanced Tools and Scripting with PowerShell
●​ Windows and Active Directory Hacking
○​ Windows Persistance Techniques
○​ Strange-1 AD Cheatsheet and theory
○​ Building an Active Directory domain and hacking it - Chryzsh Github
○​ Setting up Active Directory - Shroudri Github.io
○​ RedTeam Enumeratoin - Aidenpearce369 Github.io
○​ Red Teaming Resources - SirenSecurity.io
○​ Active Directory Resources - Zjja Github
○​ Deploy-Deception - Labofapenetrationtester, Nikhil Mittal
○​ Mimikatz - Labofapenetrationtester, Nikhil Mittal
○​ Certified_Pre-Owned.pdf - Spectertops.io
○​ Windows Post-Exploitation Command List - Docs.google
○​ Windows Priv Esc - PWNWiki.io
○​ Active Directory Attack Defense - OxSP.com
○​ AD Recon and Movement Tricks - TheHacker.recipes
○​ Post-Exploitation - Mass Mimikatz - Mubix Github
○​ Practical Guide to NTLM Relaying in 2017 aka Getting a Foothold in 5 min -
Byt3bl33d34.Github.io
○​ Persistence
○​ [Thread] Kerberos basics & (ab)use of Certificates within Active Directory (i.e. AD
CS and PKINIT) - Shutdown (Charlie BROMBERG) Twitter
○​ TheReaderApp post of the Above - thereaderapp.com
○​ Attacking Active Directory - Conda YouTube
○​ How to Setup a Virtual Windows Active Directory Domain - Conda YouTube
○​ Attacking Active Directory - Bloodhound - Conda YouTube
○​ Attacking Active Directory - AS-REP Roasting - Conda YouTube
○​ Attacking Active Directory - Kerberoasting - Conda YouTube
○​ Priv2Admin - Gtworek Github
○​ RedTeam Security Live Hacking Demonstration - YouTube
○​ Intro To Windows Hashes - Hunter2.gitbook
○​ Understanding Active Directory Enumeration - Attl4s.github
○​ Pentesting AD MindMap - M4yFly
○​ Pentesting AD MindMap 2 - M4yFly
○​ TarlogicSecurity Kerberos Cheat Sheet
○​ Red Team Essentials Hexachodanu
○​ FuzzSecurity Windows Privilege Escalation
○​ The Read Team Guide - Privilege Escalation - KwcSec.github
○​ Privilege Escalation Windows - Guide.OffsecNewbie
○​ Top 16 Active Directory Vulnerabilites
○​ Kerberos in Active Directory - Hackndo
○​ Windows Red Team Cheat Sheet
○​ Icel0rd AD Hacking Cheat Sheet
○​ Attacking AD PEH notes by RubenFormation (Attacking and Setup)
○​ Active Directory Pentesting Cheat Sheet - InfoSec Writups
○​ CMD for Administration
○​ Windows Host Command Cheat Sheet by TheMayor
○​ AD Exploitation Cheat Sheet by SickB0y1337
○​ AD External Penesting by robbertscocca
○​ WADCOMS Cheat Sheet for AD Environment
○​ Kvenkatraman Gitbook AD101
○​ Attacking Kerberos (m0chan.github.io)
○​ Active Directory Environments Part Introduction
○​ Active Directory Basics
○​ Tryhackme Active Directory Basics
○​ AD Escalation
○​ Building an Active Directory Lab
○​ Kerberos authentication explained
○​ AP-REP roasting using rebeus and hashcat
○​ PTT Attack in mimikatz
○​ Kerberoasting revisting
○​ Attacking Active Directory (zer1t0)
○​ Not A Security Boundary: Breaking Forest Trusts
○​ IRED TEAM
○​ Kerberoasting
○​ Harmj0y Blogs
○​ CIS232 lessons
○​ Active Directory Security
○​ Post Exploitation
○​ Unofficial Guide to Mimikatz & Command Reference
○​ Active Directory Cookbook 4th Edition

OSINT Challenges / CTF's


Thank's to Jayy and MamaMouse for a lot of these resources
●​ OSINT Resources - Rmusser01 Github
●​ Social Engineering Resources - Nihal Umar (@0xnihalumar) Twitter
●​ THECYBERINST OSINT challenge
●​ OSINT Framework MindMap
●​ Sourcing game 1
●​ Twitter Quittime
●​ CyberINST course osintmini
●​ Sector035 twitter OSINT challenges
●​ TraceLabs Search Party
●​ TryHackMe GelocatingImages room
●​ TryHackMe Google Dorking room
●​ TryHackMe Sakura room
●​ TryHackMe SearchLightOsint room
●​ TryHackMe Somsint room
●​ CyberSoc Wales
●​ TryHackME OHSINT room
●​ Geoguessr
●​ CyberDefender labs
●​ HackTheBox challenges
●​ TraceLabs Slack
●​ TryHackMe MNEMONIC room
●​ TryHackMe JPGChat room
●​ TryHackMe Shodan room
Certification Resources
Resources for eCPPTv2, OSCP and many more
●​ OSCE3 (OSWE, OSEP, OSED) Complete Guide - CyberSecurityUP Github

OSCP
●​ OSCP Useful Links - BackDoorShell.gitbooks
●​ OSCP Preperation Guide - Cyber-Junk Github
●​ HackerStop OSCP resources
●​ Security Prince PWK OSCP Preparation Roadmap
●​ Conda OSCP Prep Videos
○​ OSCP - OSCP - Windows Privilege Escalation Methodology - Conda YouTube
○​ OSCP - Linux Privilege Escalation Methodology - Conda YouTube
○​ OSCP Priv Esc MindMap - C0nd4 Github
●​ TJNull's OSCP Prep Machines
●​ BurntMyBagel OSCP-Prep Resources
●​ Tips for OSCP
●​ BackDoorShell OSCP Usefull Links
●​ 0x4D31 OSCP resources
●​ The-Lynx-Team OSCP resources
●​ TJNull OSCP Prep

OSEP
●​ Nullg0re OSEP Experience
●​ OSEP Helful Resources - Nullg0re
●​ OSEP Code Snippets - Chvancooten Github
●​ OSEP PREP
●​ Pen300 OSEP Prep - Deletehead github
●​ Offensive Security Evasion - Joas Antino
●​ Awesome-Red-Team-Operations

OSED
●​ Nop-Tech Notes for OSED - nop-tech Github

eCPPTv2
●​ Great eCPPTv2 External Resources
●​ IamKsNoob Mind Maps and Notes
●​ Guides for Pivoting
●​ Ferx Githbook eCPPTv2 Notes
eCPTXv2
●​ Great eCPTXv2 External Resources

Security+
●​ Proffesor Messer's Security+ Training

Network+
●​ Professor Messer N10-007 Network+

Cheat Sheets
●​ Windows and AD Cheat Sheets
○​ Pentesting AD MindMap - M4yFly
○​ Pentesting AD MindMap 2 - M4yFly
○​ Windows Host Command Cheat Sheet by TheMayor
○​ AD Exploitation Cheat Sheet by SickB0y1337
○​ RedTeam_CheatSheet.ps1 by Jivoi
○​ Windows Red Team Cheat Sheet
○​ Icel0rd AD Hacking Cheat Sheet
○​ WADCOMS Cheat Sheet for AD Environment
○​ Windows & Active Directory Exploitation Cheat Sheet and Command Reference -
casvancooten.com
●​ Kerberos Cheat Sheet
○​ TarlogicSecurity Kerberos Attacks Cheat Sheet
●​ Penetration Tools Cheat Sheet
○​ Penetration-testing-tools-cheat-sheet
○​ Jivoli Pentest Tips and Tricks
●​ Pen Testing Bookmarks
○​ BookmarksList.md
●​ Precompiled Exploits:
○​ Offensive Security/exploit database bin sploits
●​ OSCP Cheat Sheets
○​ OSCP Cheat sheets
○​ OSCP Preparation Guide 2021
●​ CEH Cheat Sheet
○​ CEH Cheat Sheet
●​ Net Bios Scan Cheat Sheet
○​ NBTSCAN Cheat Sheet
●​ Reverse Shell Cheat Sheet
○​ Rev shell Generator
●​ NMap Cheat Sheet
○​ What is Nmap by Aksheet
○​ NMAP Cheat Sheet
●​ Linux Commands Cheat Sheet
○​ Linux Cheat Sheet
●​ Security Hardening CentOS 7
○​ Security Harden CentOS 7
●​ MetaSploit Cheat Sheet
○​ Metasploit Cheat Sheet
●​ Google Hacking Database:
○​ Google Dorking Database
○​ Google Hacking Cheat Sheet
●​ Windows Assembly Language Mega
○​ Assembly Language Mega 1
○​ Assembly Language Mega 2

You might also like