| Web Application Security |
OWASP Top 10, SQLi, XSS, SSRF, and web app testing |
| Network Pentesting |
Nmap, Wireshark, service enumeration |
| Privilege Escalation |
Linux and Windows privesc techniques |
| Active Directory |
AD attacks, Kerberoasting, BloodHound, lateral movement |
| OSINT |
Open source intelligence, reconnaissance, dorking |
| Pentesting Methodology |
Basic methodology for pentesters |
| Penetration Testing Reporting |
Comprehensive guide for creating professional pentest reports |
| SOC Analyst Reference |
Essential knowledge for Security Operations Center analysts |
| CTF Jeopardy Guide |
Techniques for solving common CTF challenge categories |
| PJPT Reference Guide |
Common commands and techniques for the PJPT certification |
| CIS 18 Controls |
CIS Critical Security Controls reference |
| Incident Response |
Quick techniques for IR |
| GitHub Commands |
Git and GitHub command reference |
| Command Line Reference |
Cross-platform CLI commands |