Attribution Policy
All content published on our site is carefully attributed to its original authors. If you find copy-pasted content without proper sourcing, please let us know so we can rectify the situation. Upon notification, we will take one of the following actions:
- Remove the offending content
- Add a link to the original source before the text in question
- Rewrite the content to include proper attribution and a link to the original source
Additionally, if you are an author whose work has been published on our site without permission, please let us know and we will take immediate action to:
- Remove any links to your original blog post or other works based on it
- Delete all related content from our site
We value intellectual property rights and strive to maintain a fair and respectful community. If you have concerns about attribution or copyright infringement, please don't hesitate to contact us.
Graphic Attributions
- Whoami Page | Bee Image | Bee cartoon image designed by Zerinkh at VectorStock.com
- License Page | License Icon | Letter c water drop logo design image designed by vectorstock at VectorStock.com
- Disclaimer Page | Document Icon | 49 letter icons image designed by vectorstock at VectorStock.com
Miscellaneous Credits
- Website Creation | Docusaurus
- Disclaimer Page | HackTricks
- License Page | HackTricks
CTF Resources
- Blog | TryHackMe
- Blog | HackTheBox
- Blog | OverTheWire
Supporting Materials
Most of the content is based on notes I've taken during courses or from books I have read. I always try my best to give credit where-ever and when-ever it it due, but just like with most knowledge-bases: It's one thing preparing it and putting it together, and a WHOLE other thing, maintaining it.
- Docs | COURSE | Certified Ethical Hacker v12 Course
- By: EC-Council | CEH Website
- Docs | COURSE | PEN-200 | PEN-210 | PEN-300 | SOC-200 | WEB-200 | WEB-300 | EXP-301 | EXP-312
- By: OffSec | OffSec Website
- Docs | COURSE | Foundational: Linux 101 | Python 101 For Hackers | Python 201 For Hackers
- By: TCM Security | TCM Security Website
- Docs | COURSE | Red Team: OSINT Fundamentals | Practical Ethical Hacking | Practical Webapp Security and Testing | Linux Privilege Escalation for Beginners | Windows Privilege Escalation for Beginners | Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers
- By: TCM Security | TCM Security Website
- Docs | COURSE | Blue Team: Practical Windows Forensics
- By: TCM Security | TCM Security Website
- Docs | COURSE | Certified in Cybersecurity Course
- By: ISC2 | ISC2 Website
- Docs | COURSE | Cybersecurity Professional
- By: Google | Course on Coursera
- Docs | COURSE | Red Team Operations with Cobalt Strike
- By: Cobalt Strike | Cobalt Strike Website
- Docs | COURSE | Complete Wireshark Course For Cybersecurity Beginners - Deep Dive into Wireshark for Security Analysis
- By: CWX - Cyberwox Academy | CWX Website
- Docs | BOOK: LINUX BASICS FOR HACKERS: Getting Started with Networking, Scripting, and Security in Kali
- By: OccupyTheWeb | ISBN-13: 978-1-59327-855-7 | Hackers Arise Website
- Docs | BOOK: Learn PowerShell in a Month of Lunches
- Authors: James Petty, Travis Plunk, Tyler Leonhardt, Don Jones, Jeffery Hicks | ISBN 9781617296963 | Book Website
- Docs | COURSE: SEC599 | Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses
- By: SANS | Erik Van Buggenhout, Stephen Sims | SANS Website
- Docs | BOOK: RTFM: Red Team Field Manual v2
- Authors: Ben Clark, Nick Downer | ISBN: 9781075091834 | The RTFM Website
- Docs | BOOK: BTFM: Blue Team Field Manual
- Authors: Alan White, Ben Clark | ISBN-13: 978-1541016361 | The RTFM Website
- Docs | BOOK: EXTREME PRIVACY: LINUX DEVICES
- Author: Michael Bazzell | IntelTechniques Website
- Docs | BOOK: EXTREME PRIVACY: MOBILE DEVICES
- Author: Michael Bazzell | IntelTechniques Website
- Docs | BOOK: OSINT TECHNIQUES: RESOURCES FOR UNCOVERING ONLINE INFORMATION
- Author: Michael Bazzell | IntelTechniques Website
- Docs | BOOK: Computer Networking | A Top-Down Approach (8th edition)
- Author: Jim Kurose and Keith Ross | The Author's Website