Category Index
Jump by topic or browse the full notebook tree below.
Topic Map
Structured like a notebook: categories, subtopics, and individual notes.
Recon & Footprinting
Baseline recon flows, passive/active info gathering, and service footprinting.
Scanning & Enumeration
Nmap and vulnerability scanning workflows for discovery.
Web Exploitation
Web exploitation patterns, fuzzing, and testing checklists.
Network Exploitation
SMB, pass-the-hash, and lateral movement notes.
Credential Attacks
Credential access, cracking, and vault extraction.
Post-Exploitation
Privilege escalation, token abuse, and Persistence notes.
Payloads & Shells
Payload crafting, shells, and delivery patterns.
Transfer & Exfiltration
File transfer, staging, and exfil techniques across operating systems.
- Astaroth_Example_DLL_Injection
- Detection/Evasion
- Encryption before transferring
- File Transfer using Common Coding Languages
- Linux File Transfer
- Living off the Land (Binary Uploads/Downloads)
- Netcat for FileTransfer
- Nginx / Apache Server for filetransfer
- Overview-Commands
- PHP reverse shell
- PowerShell for Filetransfer
- Windows Filetransfer
- Linux File Transfer
- Windows Filetransfer
Tools & Automation
Notes on common Tools, scripts, and workflows.
Labs & Practice
Hands-on exercises and lab walkthroughs.
Course Notes
Course notes and structured study tracks.
Archive & Misc
Notes and experiments that do not fit elsewhere.