###########################################
#GOLD MINE FOR REAL #
###########################################
#linux privilege escaltion -https://sushant747.gitbooks.io/total-oscp-guide/privilege_escalation_windows.html?fbclid=IwAR1n1cs1dBadliOVI4iO7po3WmgS8hP4kBBGDXCl-ozy0F7tCOM5QAGOa4M -https://www.exploit-db.com/exploits/44298/?fbclid=IwAR3WLH81B-zz7NeMdCVhAg_y7pv_iwCMuqbjnWpaFXRatQwoNFuqcMK-9a8 -https://guif.re/linuxeop?fbclid=IwAR1S2fxnHcMyTuOZFYoZb55AJmHQ-MYTuOQpPsJFotW7HvmKRqpf7Ml9wTM -https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/ -https://hackingandsecurity.blogspot.com/2017/09/oscp-linux-priviledge-escalation.html?m= -https://github.com/Kabot/LinEnum?fbclid=IwAR0u_1DRK6WSzjd9G9QXWHMLSowsgMCcebg2Gtt0by-gMSZeG909ePMnsDs -https://www.exploit-db.com/exploits/45175/ -https://github.com/xairy/kernel-exploits/blob/master/CVE-2017-1000112/poc.c?fbclid=IwAR1Clh7cnBqOLYkPjBmx9Idy9Z8NmFS4NJxwotX-8dsZOcBmboLmpuBBBAk -https://securingtomorrow.mcafee.com/mcafee-labs/linux-kernel-vulnerability-can-lead-to-privilege-escalation-analyzing-cve-2017-1000112/?fbclid=IwAR1s_QDQu68-x7i_lCjnYkLh1obrx4RMC7t4Z-u4kAzra0iodABV_vvX6NQ -https://sushant747.gitbooks.io/total-oscp-guide/privilege_escalation_windows.html?fbclid=IwAR0A0HAziFZVgl2RU_em1nvRF-YmEKfOspH3KRP04rGmy7z2IXm5KZ0RyMM -https://github.com/xairy/linux-kernel-exploitation?fbclid=IwAR0um6G67BVPKkwQ4OWNA6GRRnOYhKzQoQm40zGj4Dh-OizIRKMiPWfV_p4 -https://latesthackingnews.com/2018/12/12/privilegeesc-linux-open-source-script-for-enumeration-on-linux/?fbclid=IwAR2r8kyTgDtO8SfadJvx7sJdE92zmsMeqY56ZDptKhQdtKtiawDoREnAecE
#windows privilege escalation -https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/?fbclid=IwAR39P6CyPdcb67Cs8BtU6afQpeLREUtRw_DAsqEjnjjDv5t0kYNBQkM4aVs -https://github.com/hausec/ADAPE-Script/tree/master?fbclid=IwAR0Rknful54lmO7gfM59yksrjSPYeLMmDsQyulz_EaFiZlXlHAZAaMWHjZQ -https://github.com/OneLogicalMyth/zeroday-powershell?fbclid=IwAR3H7rHz-R2omfIVycOBAJ0S66atEWlhBCc3cJX65l6kxadCPgPMcXs7vsY -https://github.com/hausec/ADAPE-Script/tree/master?fbclid=IwAR196t8_BgX-S_r6cUsDNnB0X1LhtH1NNWVA8D00Cu5CHB7pt_mvuQdQLj4 -https://github.com/ExpLife0011/awesome-windows-kernel-security-development?fbclid=IwAR2vObtRf4zDLPOgi0D4P0ddfW5TjrPWeEHnN4-VO03-tHgGAGSTN5MvdcU -https://hunter2.gitbook.io/darthsidious/privilege-escalation/alpc-bug-0day -https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/ -https://speakerdeck.com/heirhabarov/hunting-for-privilege-escalation-in-windows-environment
#windows eploit -https://github.com/PowerShellMafia/PowerSploit?fbclid=IwAR1GCKh1DDpV6nfKabv_weHoepEByp61g1EEM7Qpipmpe_2f7ZsP-TcAeas
#windows active directory -https://www.slideshare.net/rootedcon/carlos-garca-pentesting-active-directory?fbclid=IwAR3AWoY0ewoV4H-t0Troy_HtuI6Begy2aGpzKns9_Nfawzt1CcHPEJ9thnk -https://github.com/infosecn1nja/AD-Attack-Defense?fbclid=IwAR1Q1nf4tkY3OxhNU8VzAbdDPNASffMuhmfx3IdemN2h5nVqNRj2leh-f8A -https://github.com/byt3bl33d3r/DeathStar?fbclid=IwAR2BsthMpmXbXdW_byc-ap7wYp84IMW4t2WB0HRp7Icb6pkwu9um2IRlfug
#SQL injection -http://securityidiots.com/Web-Pentest/SQL-Injection/Part-1-Basic-of-SQL-for-SQLi.html?fbclid=IwAR2SxFy1jYBEr0GL_L3p_mSivlka-wFp73u0UOwb98JfPGabeFN9Oj8YjjA -https://www.youtube.com/watch?v=9Rrrm0JsLVw&fbclid=IwAR3sg8BVMXO-3QlTfVp47TnFND_BUYmuEK6o9t62uXRwYT7QUP0demdYKdc -https://gbhackers.com/perform-manual-sql-injection-2/?fbclid=IwAR0ZnkvB51Kka3h837U_o_wTNzfRQLhLcjMhbjoIn82MViIWCr7I67NdJGk
#wireless penetration -https://www.udemy.com/wifi-hacking-from-a-penetration-testers-perspective/?couponCode=FINAL_FB_GIVEAWAY&fbclid=IwAR0rUXuZiZOGyZEjF1A-MDIZsSLrzmkEzjlBULd2Wkd_bGASx3UiFe9G26c -https://gbhackers.com/wireless-penetration-testing-checklist-a-detailed-cheat-sheet/?fbclid=IwAR37j40vqsPTrsd9EIudKNKrewVFMX-TjR8wNwVu4V9qYt5EfkFMp7WdwbQ -https://www.shellvoide.com/wifi/how-to-perform-automated-wifi-wpa-wpa2-cracking/?fbclid=IwAR27K6O4bO9hZ97lz_8DN6fc3cwddlFYM54Trr5xCzP8usX2lEbUWQ386y4 -https://wpa-sec.stanev.org/?submit&fbclid=IwAR14cLPiAsWfKLj7NLw_5lYHOWn3-lr5lVf6X66DpRsA8ltNBSf45NhzCBk -https://gbhackers.com/wireless-penetration-testing-checklist-a-detailed-cheat-sheet/?fbclid=IwAR0Ezy1Lon0Ef2AfyYH-oZ-WoCAG1KBu2UxSfZVJkD_Usi2QN-cql1MS_iQ
#malware analysis -https://docs.google.com/presentation/d/14nHfy7iEhVd7qA-i4-8kT_mnudT2phKNO7RE34AiEho/present?fbclid=IwAR0DlG5EzpJAVBQK7gMgO9iK_IcbNhTaD24e9srHGmOCbU36DgHFvBWhHCs#slide=id.p -https://gbhackers.com/most-important-tools/ -https://github.com/rshipp/awesome-malware-analysis?fbclid=IwAR1AQzGSV2VaC25mPK9ILlqXLhixJdzFqbnPGfpripf96p9gkJQS7tA5_bE
#burpsuite -https://kalilinuxtutorials.com/burpsuite/?fbcli=IwAR3jFaR1WRAnpqR7ipXdvg7kQRLyCL3wSNnzZK1iPaJsGjLEs5k7hlWTTMs -https://training.peritusinfosec.com/p/burp-suite-mastery/?product_id=715832&coupon_code=BLACKFRI&fbclid=IwAR1t8pRg63tV5DthZk8YFeh2Apd5wmRUXLawyEnYCiamIumqQaTVAr25qv0
#network camera -https://neonsea.uk/blog/2018/08/01/hikvision-keygen.html?fbclid=IwAR3JFE3aShDT-eLQHcX8ArYbJJQG2VG7ANrTv_OBIrqPuPJ1f5d2x4kSBik
#buffer overflow -https://www.youtube.com/watch?v=e059hzzg3Zo&feature=youtu.be&fbclid=IwAR3--qoCiPqjESBYzSruPL8uFJMYRfRufWye49jogJshoG44g07M-B43ZAM -https://www.youtube.com/watch?v=gJXoqEFNOcs&feature=youtu.be&fbclid=IwAR2uc2Zm7gJmet7N5QzfRQSOBAiKYGqSMtdaBpLdiHnQz3XEfycQunXAJkA -https://www.youtube.com/watch?v=r_ml1j9k-Gk&feature=youtu.be&fbclid=IwAR0O7K7A_wdE6YQDRnNz6jXUTMl-wJlH74NtDyMghKWErokJbHQO6nQWxls -https://www.youtube.com/watch?v=goF472hJYys&feature=youtu.be&fbclid=IwAR2PRBTW4d-ffzFTpOibd1CMbiHKKgTFENS8Pr74AO-HFpifFOtmNJh6dCM -https://www.youtube.com/watch?v=EaZTt7MIrzg&feature=youtu.be&fbclid=IwAR3HtTctQI-fOEw88anFOiwiqPLRaDOlJ4WvVDWdHr0m6L6FXb7v4tpbDps -https://www.youtube.com/watch?v=GZO2XPyAFts&feature=youtu.be&fbclid=IwAR1UgmISIm-LTbn_Z2DtbfzAZRwXZUzxj58nJGl3u7pEm-4WHYCCwRIDNxI -https://www.youtube.com/watch?v=_3fzj3qsLPU&feature=youtu.be&fbclid=IwAR0mdpAEdfJFn0t7wUvntFKh_NSPwcYxfxqPDhrYFc_1kVD4W4Kaca6ld_8 -https://proactivedefender.blogspot.com/?fbclid=IwAR0UYl6UgFYd0BTHXdG5Oo2jJ0A84XoVmCEjPBaj1idsNwmj3Zvfh-7GtVI -https://stacktrac3.co/vulnserver-write-up/?fbclid=IwAR1ytECmHB9QZZTochAt9YVMBKge43ifX1Q9PxlCPahP1dOQEXAU-RnPZgE
#OSCP notes -http://0xc0ffee.io/blog/OSCP-Goldmine?fbclid=IwAR2--FYsZo77AzCQ_F8EZqROHppPe6RAWUtskZ-pQkRrk-XZhlp7JmeUcEg -https://www.keiththome.com/oscp-course-review/?fbclid=IwAR239djLDCKmGkWpGST2D0WKA7rVeCUSoZoHnN660vwX5RqhbPmNagN1AQk -https://www.netmux.com/blog/purple-rain-attack?fbclid=IwAR1d8hN94aQSQ3ARujn8W3H7NS03phoaFtaKtA3KxtzQhKpbFCeH1uWoVl8 -https://www.vortex.id.au/?fbclid=IwAR2d5W21R85El_4EDPtcIMswHbPLiln82ZsXKy0uo63Z6zoGMB-EEKYJkN4 -https://thor-sec.com/review/oscp/oscp_review/?fbclid=IwAR1Yuzuj_lB7SqYLJ28i-KWGlPssSZpmrKYVsPef_3gXgDnM0717sNzMVZg -https://guif.re/?fbclid=IwAR1-vQsPeD97FJu6h-0gB9x1Gi2UgHhJlWl9rSlJT0zbvsgW7oECyxepCY4 -https://scriptdotsh.com/index.php/2018/04/17/31-days-of-oscp-experience/?fbclid=IwAR2PDO6B7jQXayS0vWr064bXJPcswuuj37VtCf2sHZ_I6Ss-KLouWaAA5r0
#CTF -https://mrt -https://gtfobins.github.io/gtfobins/whois/?fbclid=IwAR2BGMKkGj6FDit8h20UwvybkYMsFOmd17mt9ryB2u7pwQtwiC0L5e7ZzcY -https://github.com/swisskyrepo/PayloadsAllTheThings?fbclid=IwAR0HOZxovFMKbW7eqZvByT_Wh_nqlNIs7b9X4XT7S13kuBniAoBgk1c2lio
#study materials -https://mega.nz/?fbclid=IwAR3gEKJW4BOsIAquls4DBnDO65OW92oRL7tCR7JEuexEr2gV0xajmAlL8FQ#F!NsdFhSYY!z-ecu4lbJkEKI5VVxe9-TA -https://uptusuccess.com/download-paid-udemy-courses-for-free/amp/?fbclid=IwAR0TU4ylkBxpyOtiGTQT3uN25183bAyEkCw_R3QxDhx18Sa_BW5WSE1Fz7Q -https://hackingvision.com/2018/03/15/hacking-books-pdf-collection-2018/?fbclid=IwAR1MIWPL_u9e1UWl2o_T4jgWAoO8xpPdSqGypCLD-8S-qIt43Be-Url-0Es -https://github.com/robertcanare/Study-File
#ethical hacking free courses -https://mega.nz/?fbclid=IwAR28CDUlL44S0jKSViOL2A3TTj5XlJxbgrMu25xqN795EHq3J0vHU2VLfFo#F!BtZAjJIR!nek_MMo14Z_3_D_OLT5hsw --https://www.udemy.com/ethical-hacking-beginners-to-expert-level-kali-linux-tutorial/?couponCode=FBFREE001&fbclid=IwAR3B6jvs7saCQqH1SgqeYpN6sRGUzJnPDt3k1uTKPd9c_YS1crI2ZItqbgU
#penetration testing -https://github.com/enaqx/awesome-pentest?fbclid=IwAR1q5yN4WfB_5brIldL1LY2fRD0O9iECZ0KEsDotaLtJ5fk9Qx3QyqyopDQ -https://jivoi.github.io/2015/07/01/pentest-tips-and-tricks/?fbclid=IwAR1GLvx8Cr8A7NYwpPRE5CKkSD6vKFLsuNgEUYaPUFSZZVJkrL0rxIxBe94 -https://www.notsosecure.com/pwning-with-responder-a-pentesters-guide/?fbclid=IwAR0QK_U09B1mhNSjpHP56TW8g8ExXRZENGaFqVXLZdzkhaCWhEksCZ6s5x8 -https://www.linkedin.com/pulse/how-perform-external-black-box-penetration-testing-james-ceh-/?fbclid=IwAR3_QK6-ENvfjlv0my17XbD3LTMq14ftV9_Vaa4s-f-iBB7MacXCOypzAu8 -https://github.com/OlivierLaflamme/Cheatsheet-God?fbclid=IwAR3NBv6uO8I0XF3yIcgIM5i39wdhdQ2QJ-2R-Je0hnk5AypZuw4Z3s6rpuQ -https://blog.eccouncil.org/6-ways-to-be-a-better-pen-tester-part-1/ -https://gbhackers.com/hacking-tools-list/?fbclid=IwAR34ItaRUnBH73fCEXVRF4sF3RVYgju3XpfT5Sa3NZC12ksQbMM-cs1xosQ -https://gbhackers.com/hacking-tools-list/?fbclid=IwAR34ItaRUnBH73fCEXVRF4sF3RVYgju3XpfT5Sa3NZC12ksQbMM-cs1xosQ -https://blog.eccouncil.org/6-ways-to-be-a-better-pen-tester-part-1/?fbclid=IwAR0y-g26kcaorSjdMebwmt474uvJJdLRRDEiELUQawCkF6K9jhVf0sqabFI
#windows evasion / bypassing AV -https://gbhackers.com/malicious-payload-evasion-techniques/?fbclid=IwAR09baVu0CZRJCv9HkuPaUTu2wbhL3RZiwGkz667Q66P6fblW2qtlVpb8xM -http://www.powershellempire.com/?page_id=149&fbclid=IwAR2_slvmYwJsiBt6o8zB8GHthCK2178i_5pPlGCkhhQvC272Bcendxc5Alg -https://gbhackers.com/bypassing-an-antivirus/?fbclid=IwAR2k_yi7AQGfDzNlhvHx-azLqueL6RRMVFpmgQYgapvl-92UQcoTIr17LAk
#bug bounty tips -https://forum.bugcrowd.com/t/researcher-resources-how-to-become-a-bug-bounty-hunter/1102?fbclid=IwAR0uFG98i2WUq0vyRs4PEQncxhMmGouL6R-KgxcuCjJlEZ-ee2L-TP9kTH0
#network security -https://www.blackhat.com/presentations/bh-europe-05/BH_EU_05-Berrueta_Andres/BH_EU_05_Berrueta_Andres.pdf?fbclid=IwAR38V0GIvzx46wVcxiD3NZGKvd8XQHPIeRCPv6quPk6U6oLIM0BkuXp4tOA -https://www.kinniyalibrary.com/?fbclid=IwAR3Z9_T9pBA34VuwFvsNedFZnu-LGdIkJzaQf5WvkOYOLqzfGXNjL36BC60
#web application -https://github.com/minimaxir/big-list-of-naughty-strings?fbclid=IwAR0vAybYceatG1wujdiB9k0-KhCtOAMhDycRb0jTmW-wvvOA3pNEKMksP8k -https://n0where.net/php-webshells?fbclid=IwAR27-1MYEkojrxofzE1DHFCihLeJcgcIUhBRGTQVQV2Jz-rN0cugkvdvaIE -https://gbhackers.com/web-application-penetration-testing-checklist-a-detailed-cheat-sheet/ -https://latesthackingnews.com/2018/08/17/rapidscan-web-vulnerability-scanner-framework/?fbclid=IwAR2p0tYRVGo9CNBzHdo7aS8QCcEBqHDA4Iqu5vFQQySGC7sFZ5ByB-dB-i4 -https://github.com/swisskyrepo/PayloadsAllTheThings?fbclid=IwAR0HOZxovFMKbW7eqZvByT_Wh_nqlNIs7b9X4XT7S13kuBniAoBgk1c2lio -https://github.com/trimstray/htrace.sh?fbclid=IwAR0WNthDD3wSi1zT7xy88WgzK2oEL4CotOtIIdZnZkuhuScPuw_neSRs3UE -https://0x09al.github.io/waf/bypass/ssl/2018/07/02/web-application-firewall-bypass.html?fbclid=IwAR20DePpg-ZMUb3gSozLE-MmQFwyk67NRgMSXthPGzeA81JPdxBdXkUJWmk -https://gbhackers.com/penetration-testing-wordpress-website/?fbclid=IwAR0cxJP-934GybkZQW-26btvrfUuDVjKQhExmyYXW724mfj1LKu7BqizNHs -https://www.hacker101.com/videos?fbclid=IwAR05yhTqVn0EmfDj5QVxnD-RdcC9Z1rmWyo_Qc2IjvVAo-iY_gBWZSFOf50
#reverse shell -https://netsec.ws/?p=331&fbclid=IwAR3D_du_PKB0E0dB_M3BobttN3YzLUV5ae1I1kjpjfbGZlLuF0o2oZN7BnU
#red teaming -https://github.com/yeyintminthuhtut/Awesome-Red-Teaming?fbclid=IwAR1oxHbvqs6E2VwVwJjsMzRn9ln_faA5mJ-KwFYEBlPhhKRBpL7slAkZ1R4 -https://github.com/infosecn1nja/Red-Teaming-Toolkit/blob/master/README.md?fbclid=IwAR3eenVGF-dCquu4WhgM3sQ7Q-MDujEq-CRxw-TsGxu4mlm6tqdFLIhkCaQ -https://www.peerlyst.com/posts/the-red-team-guide-chapter-20-attacking-linux-unix-environments-chiheb-chebbi?utm_source=linkedin&utm_medium=Application_Share&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post -https://github.com/yeyintminthuhtut/Awesome-Red-Teaming?fbclid=IwAR1XSTFYKQUICzCQcVxNlub4Oq9J93c7JxW6kLy0V-i7dMMOWgK1osOSzcE -https://resources.infosecinstitute.com/red-team-assessment-phases-reconnaissance/?fbclid=IwAR3qVCUYm1Mi_pPjiOykFFW0ocHPWzx6ZydXiovAFnMr_cMZCqAEIa7zf4A
#microsoft macros -https://github.com/mwrlabs/wePWNise?fbclid=IwAR17fns6AhI6QqRPwQJ8dHr7WlkTkNdI9uGjEpC-NISLdRHPMDO2i-DYgFw
#cloud computing -https://gbhackers.com/cloud-computing-penetration-testing-checklist-important-considerations/?fbclid=IwAR3EXRITGAaNNuXJpLtp-ysPk04eRKkdOYmcb8Vfa48OgEdEuQg_meHIz8s