Hacknetics
Ctrlk
  • Hacknetics
  • Active Directory Management
  • Active Directory AD Attacks
  • buffer-overflows
  • c2-frameworks
  • covering-tracks
  • Data Exfiltration
  • Exploit Development
  • file-transfers
  • lateral-movement
  • lin-priv-esc
  • Things I have Pwn'd before
  • persistence
  • recon-enumeration
  • resources
    • resources
    • Youtube / Book List
    • CS/Software Engineer Resources
  • shells
  • tool-guides
  • Web Path
  • Wifi/Bluetooth/ZigBee/SDR/SmartCards
  • Windows
  • firewalls
  • Malware Analysis
  • Infrastructure Development
  • Python3 Reference
  • EDR
  • Host Forensics
  • Cloud
  • OSINT
  • Phishing
  • Random
  • Linux
  • Windows Malware Development
  • Golang
  • Mikrotik
  • Firmware Reversing
Powered by GitBook
On this page
Edit

resources

To Do Documentation

  • https://github.com/ice-wzl/DEFCON-31-Syscalls-Workshop

  • https://github.com/ice-wzl/Taming-Offensive-IronPython

  • https://github.com/ice-wzl/Red-Teaming-TTPs

  • https://github.com/ice-wzl/Win32_Offensive_Cheatsheet

  • https://github.com/ice-wzl?tab=repositories

  • https://github.com/ice-wzl/nebula

  • https://github.com/ice-wzl/Cheat-Sheet---Active-Directory

  • https://github.com/ice-wzl/the-book-of-secret-knowledge

  • https://github.com/ice-wzl/Pentest-Cheat-Sheets

PreviousIIS Short name scanningNextresources

Last updated 8 months ago