Table of contents Hacker's Rest Tools & Cheatsheets Cybersecurity YouTube Channels Hacking Methodology Hands-on Practice Fundamentals Network Fundamentals Computer Fundamentals Unix Unix Fundamentals Hardening & Setup TMUX/Screen Cheatsheet Red Team Notes Enumeration Getting Access Privilege Escalation Pivoting/Lateral Movement Data Exfiltration Persistence Vim Windows Windows Basics PowerShell Hardening & Setup Red Team Notes Enumeration Getting Access Privilege Escalation Pivoting/Lateral Movement Persistence Data Exfiltration Active Directory Enumeration Getting Access Privilege Escalation Persistence Kerberos Impacket MacOS MacOS Basics Hardening & Configuration Red Team Notes Enumeration Getting Access Privilege Escalation Persistence Web Burp Suite DNS Web Notes Enumeration Web Filter Bypass Command Injection Subdomain/Virtual Host Enumeration The Web Application Hacker's Handbook Mobile iOS Android OS Agnostic Basic Enumeration Cryptography & Encryption Network Hardware OS Agnostic OSINT Password Cracking Gathering the Hashes Wordlist Manipulation Cracking the Hashes Pivoting Chisel Plink.exe SSH Sshuttle Socat Reverse Engineering & Binary Exploitation Buffer Overflow Scripting Script Language Syntax SQL SSH & SCP Steganography Wireless Unsorted