- OSCP
- WriteUps
- Module 1 (General Info)
- Module 2 (Getting Kali)
- Module 3 (CLI)
- Module 4 (Practical Tools)
- Module 5 (Bash Script)
- Module 6 (Passive Info Gathering)
- Module 7 ( Active Info Gathering)
- Module 8 (Vulnerability Scanning)
- Module 9 (Web Application Attacks)
- Module 10 ( Intro Buffer OverFlow)
- Module 11 (Widows Buffer OverFlow)
- Module 12 (Linux Buffer OverFlows)
- Module 13 (Clint Side Attacks)
- Module 14 (Locating Public Exploits)
- Module 15 (FIxing Exploits)
- Module 16 (File Transfers)
- Module 17 (Antivirus Evasion)
- Module 18 (Privllege Escalation)
- Module 19 (Password Attacks)
- Module 20 (Port Redirection and Tunneling)
- Module 21 (Active Directory Attacks)
- Module 22 (Metasploit Framwork)
- Module 23 (Powershell Empire)
- Course Materials
- Red Teaming
- EWAPTX
- PHP Type Juggling
- CSP
- SqlI
- SSTI & CSTI
- XSS_HTML Injection
- CORS Attack
- Clickjacking
- Open redirect
- JSONP
- LFI && LFD && RFI
- HTTP Host header attacks
- CSRF
- XML injection
- XML external entity (XXE) injection
- APIs & JWT attacks
- Insecure Deserialization
- OAUTH 2.0 authentication vulnerabilities
- Host Header Injection
- Insecure Direct Object References (IDOR)
- Internals
- The Art of assembly Language
- Chapter 1: Hello, World of Assembly Languageel
- Chapter 2: Data Representation
- Chapter 3: Memory Access and Organization
- Chapter 4: Constants, Variables, and Data Types
- Chapter 5: Procedures and Units
- Chapter 6: Arithmetic
- Chapter 7: Low-Level Control Structures
- Chapter 8: Advanced Arithmetic
- Chapter 9: Macros and the HLA Compile-Time Language
- Chapter 10: Bit Manipulation
- Chapter 11: The String Instructions
- Chapter 12: Classes and Objects
- Appendix: ASCII Character Set
- Reverse Code Engineering