Appearance
π CyberBook
Cheatsheets Β· Notebook Β· Playbook | Red Team Ops
Cryptography
Encryption, hashing, PKI, and crypto attacks cheatsheets.
Linux
Privesc, commands, persistence, and kernel exploits.
Network
Protocols, pivoting, scanning, and traffic analysis.
Pentest Basic
Methodologies, reconnaissance, and exploitation basics.
Web
OWASP top 10, API pentesting, and client-side attacks.
Windows
Active Directory, PowerShell, and Windows internals.