A little bloc-note following my journey in cybersecurity

https://zhou-efr.github.io/dev

Useful links, pages and files

Reminder Pentest

Bash Scripting Fundamental

Usefull link and tab

Reminder Malware Analysis & Triage

PimpMyParrot

<aside> 📦 box generator

</aside>

<aside> 👉 Active Directory Chapter Things always come in threes (Active Directory)

<aside> <img src="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/a55716a4-fe9b-4274-ab10-4e9fab536985/image-removebg-preview.png" alt="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/a55716a4-fe9b-4274-ab10-4e9fab536985/image-removebg-preview.png" width="40px" /> Practical Ethical Hacking - PEH

Pentest Fundamentals

Things always come in threes (Active Directory)

Web Application

Wireless pentesting

Legal Documents and Report Writing

External pentest playbook

</aside>

<aside> 🤖 Hardware Security

Introduction

Electrical engineering for hackers

Initial recon and OSINT

Serial connection and enumeration

Firmware Extraction and Analysis using SPI

Reverse engineering

Extra - VHDL and FPGA

</aside>

<aside> 🔍 OSINT

First steps

Image OSINT

Email / Pwd / Username OSINT

People OSINT

Social Media OSINT

Website OSINT

Businesses Hunting

Wireless OSINT

More resources

Kali for OSINT

Underscore

</aside>

<aside> 🏢 External Pentest Playbook

Introduction

</aside>

<aside> 🪟 Windows privilege escalation

First Steps

Escalation paths

</aside>

<aside> 🏋️ Proving Grounds Write Up

Proving Ground (again)

<aside> 🐧 Linux privilege escalation

Escalation Paths

</aside>

<aside> 🔒 GRC analyst

Getting Started and Cybersecurity Primer

Compliance and audit work

Security Awareness

Cybersecurity Risk

ISO27001 Foundation Training

</aside>

<aside> 💡 Practical Malware Analysis and Triage

Journey ReStart

Basic static analysis

Basic Dynamic Analysis

SikoMode 2

Advanced Analysis

Silly Putty

Specialty Malware Classes

Wanna Cry

Automation

Rule and Repport

</aside>

<aside> 📱 Mobile Application Penetration Testing

Introduction

Android Static Analysis

Android Dynamic Analysis

Android Checklist

</aside>

<aside> <img src="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/c6139fb6-baca-4d72-9558-277abfbd9291/offsec.png" alt="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/c6139fb6-baca-4d72-9558-277abfbd9291/offsec.png" width="40px" /> Pen-200 2023

ssh -o "UserKnownHostsFile=/dev/null" -o "StrictHostKeyChecking=no" [email protected]

Introduction

Gather information

Web Application Attacks

Penetration testing fundamentals

Privilege Escalation

https://drive.google.com/file/d/1tE9-yyPzciy6dzSb0qwJbTzQmo1706zR/view?usp=share_link

</aside>

<aside> ⚗️ Extra

</aside>

<aside> 🥡 Write Up

</aside>

<aside> 💻

</aside>


<aside> 🌏 All boxes write up

Liste des Boites

</aside>