Hacknetics
search
⌘Ctrlk
Hacknetics
  • Hacknetics
  • Active Directory Management
  • Active Directory AD Attacks
  • buffer-overflows
  • c2-frameworks
  • covering-tracks
  • Data Exfiltration
  • Exploit Development
  • file-transfers
  • lateral-movement
  • lin-priv-esc
  • Things I have Pwn'd before
  • persistence
  • recon-enumeration
  • resources
    • resources
    • Youtube / Book List
    • CS/Software Engineer Resources
  • shells
  • tool-guides
  • Web Path
  • Wifi/Bluetooth/ZigBee/SDR/SmartCards
  • Windows
  • firewalls
  • Malware Analysis
  • Infrastructure Development
  • Python3 Reference
  • EDR
  • Host Forensics
  • Cloud
  • OSINT
  • Phishing
  • Random
  • Linux
  • Windows Malware Development
  • Golang
  • Mikrotik
  • Firmware Reversing
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
githubEdit

resources

hashtag
To Do Documentation

  • https://github.com/ice-wzl/DEFCON-31-Syscalls-Workshoparrow-up-right

  • https://github.com/ice-wzl/Taming-Offensive-IronPythonarrow-up-right

  • https://github.com/ice-wzl/Red-Teaming-TTPsarrow-up-right

  • https://github.com/ice-wzl/Win32_Offensive_Cheatsheetarrow-up-right

  • https://github.com/ice-wzl?tab=repositoriesarrow-up-right

  • https://github.com/ice-wzl/nebulaarrow-up-right

  • https://github.com/ice-wzl/Cheat-Sheet---Active-Directoryarrow-up-right

  • https://github.com/ice-wzl/the-book-of-secret-knowledgearrow-up-right

  • https://github.com/ice-wzl/Pentest-Cheat-Sheetsarrow-up-right

PreviousFirebasechevron-leftNextresourceschevron-right

Last updated 12 days ago