- Introduction
- The Basics
- Recon and Information Gathering Phase
- Vulnerability analysis
- Exploiting
- Post Exploitation
- Spawning Shells
- BloodHound
- Meterpreter for Post-Exploitation
- Privilege Escalation - Linux
- Privilege Escalation - Windows
- Escaping Restricted Shell
- Bypassing antivirus
- Loot and Enumerate
- Persistence
- Cover your tracks
- Cobalt
- MS Advanced Threat Protection and Advanced Threat Analytics Evasion
- FTP fun
- Execute C#
- Vba Macros
- Password Cracking
- Pivoting - Port forwarding - Tunneling
- Network traffic analysis
- Forensics
- Wifi
- Physical access to machine
- Literature
- Cheat Sheets
- Physical
- VM Scaling