Skip to content

kristofhracza/hacking_methodology

Repository files navigation

This collection serves as a foundation for penetration testing methodology. Previously, these notes only covered basic enumeration and privilege escalation tips, however, this version will add more nuanced and sophisticated attacks, techniques and so forth. However, please do keep in mind, that not all possibilities are documented for one particular vulnerability, so please refer to the References sections for more information about any given vulnerability. Also, many of the content is taken from and inspired by HackTricks for clarity. I would also like to note and acknowledge that even the layout is nearly the same, but this is what works best for me.

Notes

This is not a finished site. I will keep on adding information that I believe to be useful, and as always these notes and its material are intended to be used for educational and informational purposes only!

Please, also read the articles that are linked in the References sections as they cover each topic in more detail as well as show techniques that I might have missed or deemed to be an edge case to document. Some URLs also link to tools which might save you some headache.

Socials