Skip to main content

Attribution Policy

All content published on our site is carefully attributed to its original authors. If you find copy-pasted content without proper sourcing, please let us know so we can rectify the situation. Upon notification, we will take one of the following actions:

  • Remove the offending content
  • Add a link to the original source before the text in question
  • Rewrite the content to include proper attribution and a link to the original source

Additionally, if you are an author whose work has been published on our site without permission, please let us know and we will take immediate action to:

  • Remove any links to your original blog post or other works based on it
  • Delete all related content from our site

We value intellectual property rights and strive to maintain a fair and respectful community. If you have concerns about attribution or copyright infringement, please don't hesitate to contact us.


Graphic Attributions

Miscellaneous Credits

CTF Resources

Supporting Materials

NOTE

Most of the content is based on notes I've taken during courses or from books I have read. I always try my best to give credit where-ever and when-ever it it due, but just like with most knowledge-bases: It's one thing preparing it and putting it together, and a WHOLE other thing, maintaining it.

  • Docs | COURSE | Certified Ethical Hacker v12 Course
  • Docs | COURSE | PEN-200 | PEN-210 | PEN-300 | SOC-200 | WEB-200 | WEB-300 | EXP-301 | EXP-312
  • Docs | COURSE | Foundational: Linux 101 | Python 101 For Hackers | Python 201 For Hackers
  • Docs | COURSE | Red Team: OSINT Fundamentals | Practical Ethical Hacking | Practical Webapp Security and Testing | Linux Privilege Escalation for Beginners | Windows Privilege Escalation for Beginners | Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers
  • Docs | COURSE | Blue Team: Practical Windows Forensics
  • Docs | COURSE | Certified in Cybersecurity Course
  • Docs | COURSE | Cybersecurity Professional
  • Docs | COURSE | Red Team Operations with Cobalt Strike
  • Docs | COURSE | Complete Wireshark Course For Cybersecurity Beginners - Deep Dive into Wireshark for Security Analysis
  • Docs | BOOK: LINUX BASICS FOR HACKERS: Getting Started with Networking, Scripting, and Security in Kali
  • Docs | BOOK: Learn PowerShell in a Month of Lunches
    • Authors: James Petty, Travis Plunk, Tyler Leonhardt, Don Jones, Jeffery Hicks | ISBN 9781617296963 | Book Website
  • Docs | COURSE: SEC599 | Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses
    • By: SANS | Erik Van Buggenhout, Stephen Sims | SANS Website
  • Docs | BOOK: RTFM: Red Team Field Manual v2
  • Docs | BOOK: BTFM: Blue Team Field Manual
  • Docs | BOOK: EXTREME PRIVACY: LINUX DEVICES
  • Docs | BOOK: EXTREME PRIVACY: MOBILE DEVICES
  • Docs | BOOK: OSINT TECHNIQUES: RESOURCES FOR UNCOVERING ONLINE INFORMATION
  • Docs | BOOK: Computer Networking | A Top-Down Approach (8th edition)