- IP Header
- TCP/IP Model Stack - Layers & Protocols
- ISO/OSI Model
- IPv4 vs IPv6
- IPv6 address
- Basic Computer Networking
- IP Routing
- TCP vs UDP
- Firewall
- DNS
- Wireshark Tool
- WebApp vs WebSite
- HTTP/1.x
- HTTP vs HTTPS
- High Performance Browser Networking - Book
- What is HTTPS
- netcat Tool
- HTTP Cookies
- SOP
- Burp Suite by PortSwigger
- ZAP by OWASP Foundation
- What is a Proxy Server
- Host and Network Based Attacks by Tim DeWeese
- Microsoft Learn - IIS
- Microsoft Learn - SMB
- Microsoft Learn - RDP
- Microsoft Learn - WinRM
- CrackMapExec
- evil-winrm
- Privilege Escalation - Windows Kernel Exploits
- Microsoft Learn - UAC
- Microsoft Learn - Access Tokens
- ADS Alternate Data Streams
- SAM Database
- Windows authentication attacks - part 1 - RedForge
- Linux and GNU
- Apache Web Server
- CVE-2014-6271 - ShellShock
- Linux Privilege Escalation: Linux kernel / distribution exploits
- Cron Jobs
- SUID
- Understanding /etc/shadow file format on Linux
- Metasploit Framework
- Metasploit in Kali Linux
- Metasploit Unleashed – Free Ethical Hacking Course by OffSec
- Armitage GUI
- PTES
- MSF Installer
- How to Use Metasploit in Kali Linux + Metasploitable3
- Metasploitable3 - rapid7 Github
- Shikata Ga Nai Encoder Still Going Strong - Mandiant
- Haraka
- Methods Used by Linux for Hashing Passwords
- Exploitation PTES
- Banner Grabbing
- Nmap Scripting Engine
- exploit-db.com
- Rapid7 db
- Searchsploit
- Cross Compile to Win from Linux
- PrivescCheck
- Linux Privilege Escalation Guide(Updated For 2023 - by Rashid-Feroze
- Linux Privilege Escalation using SUID Binaries
- Persistence - MITRE ATT&CK
- Enabling Remote Desktop - OffSec
- SSH Penetration Testing
- Scheduled Task/Job - MITRE ATT&CK
- What is Social Engineering?
- FBI IC3 Releases 2022 Internet Crime Report
- Trendmicro Security 101: Business Email Compromise (BEC) Schemes
- CEO Fraud Attacks - KnowBe4
- NIST SP 800-115 - Technical Guide to Information Security Testing and Assessment
- Social Engineering Penetration Testing: Attacks, Methods, & Steps - Purplesec.us
- Gophish