Resources & Guides
- Application Security Cheat Sheet
- AppSecExplained
- Bug Hunter Handbook
- C2 Matrix
- Check Point Research - Evasion Techniques
- CloudSec.Cybr
- Ciphersuite Info
- CyberChef
- DarthSidious
- Digital Forensics & Incident Response
- endoflife.date
- Exploit Notes
- Hacking The Cloud
- HackTricks
- HackTricks Cloud
- Linux Privilege Escalation
- Linux SysOps Handbook
- Nuclei Templates Directory
- Oblivion RedOps
- offsec.tools
- OH SHINT!
- Pentest Book by n3t_hunt3r
- Red Team Notes
- Subdomain Enumeration Guide
- Threat Hunter Playbook
Living of the Land
- ARTToolkit (A Red Team Toolkit)
- Bootloaders
- BYOL (Bring Your Own Land)
- Filesec (File Extensions)
- GTFOBins
- HijackLibs (DLL Hijacking)
- LOFLCAB (Living off the Foreign Land Cmdlets and Binaries)
- LoFP (Living off the False Positive)
- LOLAPPS (Living Off The Land Applications)
- LOLBAS (Living Off The Land Binaries)
- LOLBins CTI-Driven
- LoLCerts (Living Off The Leaked Certificates)
- LOLDrivers (Living Off The Land Drivers)
- LOLOL (Living Off the Living Off the Land - Collection of LOL resources)
- LOOBins (Living Off the Orchard - macOS Binaries)
- LOTHardware (Living Off The Hardware)
- LOTP (Living Off the Pipeline)
- LOTS (Living Off Trusted Sites)
- MalAPI (Windows APIs)
- Persistence-info
- Unprotect Project
- WADComs (Windows/AD Techniques)
- WTFBins