Personal collection of continuously updated offensive security notes.
Index
I - NPT
Chapter 1: Information Gathering
Chapter 2: Network Services Exploitation
Chapter 3: Post-Exploitation & Commands
Chapter 4: Privilage Escalation
II - WAPT
Chapter 5: Vulnerabilities
Chapter 6: Automation
Chapter 7: Web Security
III - MAPT
Chapter 8: APK Building
Chapter 9: Reversing
Chapter 10: Android Testing
IV - Miscellaneous
Chapter 11: Password Cracking
Chapter 12: Burp Suite
Chapter 13: Antivirus Evasion
Chapter 14: CTF Methodology
Uncategorized
Resources