- π‘ Network Services
- π‘ Network Devices
- π‘ MITM & Poisoning
- π‘ Wireless Attacks
- π‘ Sniffing
- π‘ Denial of Service
- π΄ Windows
- β Security Concepts
- β Physical Attack
- β Enumeration
- β Privilege Escalation
- β Credential Dumping
- β Persistence
- π΄ Active Directory
- π΄ Linux
- β Physical Attacks
- β Enumeration
- β Privilege Escalation
- β Lateral Movement
- β Credential Dumping
- β Persistence
- Startup User File Backdoor
- PHP Backdoor
- Apache mod_rootme
- Startup Service Backdoor
- xdg Backdoor
- rootbash SUID
- apt Backdoor
- Driver Backdoor
- Core Pattern
- dash Backdoor
- Creating an SUID Binary
- Systemd netcat bind shell
- Xinetd UDP portnock
- openSSL reverse shell
- motd Backdoor
- Auth Log Backdoor
- RSYSLOG Backdoor
- sshd Backdoor
- VIM Config Backdoor
- .bashrc Backdoor
- Adding a Root user
- Crontab Reverse Shell
- SSH persistence password-less
- β Covering Tracks
- π΄ Command & Control (C2)
- π΄ Shells and Payloads
- π΄ Payload Delivery
- π΄ Pivoting
- π΄ Exfiltration / File Transfer
- π΄ Password Attacks
- π΄ Defense Evasion
- β Evasion Concepts Primer
- β Shellcode Placement
- β Shellcode Encoding & Encryption
- β Code Obfuscation
- π΅ Threat Modeling / Hunting / Intelligence
- π΅ Linux Hardening
- π΅ Security Architecture
- π C Programming
- πΈ Basic Structure
- πΈ GCC Compiler
- πΈ Preprocessors
- πΈ Data Types
- πΈ Type Qualifiers
- πΈ Pointers
- πΈ Dynamic Memory Allocation
- πΈ Loops
- πΈ Conditional Statements
- πΈ Functions
- πΈ Input / Output
- πΈ Macros
- πΈ Files
- πΈ Strings Manipulation
- πΈ Bit Manipulation
- πΈ Data Structures
- πΈ Abstract Data Types
- πΈ Libraries & Linking
- πΈ Error Recovery
- π§ Assembly ( NASM )