This repository contains my personal collection of practical survival guides (aka cheatsheets) that discribe different tools, techniques and procedures mainly focust on conducting red teaming engagements and internal infrastructure pentesting.
As the learning journey continues the guides will further mature and be updated regurarly with new content. So stay tuned.
- Get control over the initial access system
- Elevate privileges on Windows
- Elevate privileges on Linux
- Active Directory domain reconnaissance
- Active Directory misconfiguration abuse & vulnerability exploitation
- Database enumeration and exploitation
- Lateral movement
- Forest enumeration and exploitation
- Windows & Linux client payload development
- Password spraying
- Network access via physical implants
- Network access via wireless access point
- Password recovery techniques
- Command & Control framework usage
- External reconnaissance & OSINT gathering (under construction)
- Setup C2 infrastructure (under construction)
- Setup and conduct a phishing campaign (under construction)
The following guides are currently in the pipeline: setup C2 infrastructure; external reconnaissance & OSINT gathering; more advanced payload development for EDR bypassing; and how to setup and conduct a phishing campaign.
The guides in this repo are the product of my own notes that find their origin in multiple publicly and sometimes paid (e.g. CRTO, OSEP) resources. Therefore, all the credits go to the great people behind these courses, blog posts and tools. This repository is meanly a tribute to their work. In the guides, references are made to the repo's and sometimes blog posts were you can find the discribed tools and techniques.