- Reverse Engineering
- Pwn
- Web
- Clickjacking
- PHP Magic Hash
- Bug Bounty Guide
- Server Side Request Forgery (SSRF) RCE Tool
- Hacking Around HTA Files
- Javascript Beautifier
- Convert Curl to Python
- Parameter Discovery Tool
- Dakota State University Web Programming
- Convert JS function to unicode
- SQLmap tricks
- Intro to Reverse Engineering - Opensecuritytraining
- Intro to x86 - Opensecuritytraining
- MalwareUnicorn ReverseEngineering Workshops
- Dakota State University Intro to x86 Assembly
- Dakota State University C Programming
- Stepping through PE structures
- Guided Game Reversing Tutorials
- Network Miner - Analyze PCAPS
- Windows Log Files on Linux
- Foremost - Recover deleted files from disk image
- Collection of tools for various phases of pentesting
- Responsder in Memory
- O365 / Skype for Business Password Spray
- Post Exploitation - Dumping DC Creds
- Using Machine Account Passwords
- impacket stand-alone binaries
- Active Directory TTPs (spectre ops)
- Password Spraying Tools
- OSCE Review
- https://www.abatchy.com/tag/OSCE%20Prep/
- https://pastebin.com/RSPbatip
- https://0x09al.github.io/security/ctp/osce/exploitation/2017/07/06/osce-ctp-prep-heapspreay-seh-egghunter.html
- https://blog.g0tmi1k.com/2013/08/cracking-perimeter-ctp-offensive/
- https://hansesecure.de/offensive-security-certified-expert-me/
- https://tulpa-security.com/2017/07/18/288/
- https://davidstorie.ca/using-kali-linux-ctp-osce/ https://r00k.io/2016/11/trying-harder-er/
- Domain Recon
- Domain Recon
- LinkedIn User Scraping
- Potential Usernames
- Gmail SMTP Server Username Enumeration
- Phishing Infrastructure
- Phishing Server Setup Automation
- Disguising unsigned binaries
- Automated AV Detection tests for payloads using AMSI
- Living off the land
- Red team techniques