Skip to content

LifeTimeScriptKiddie/OpenNotes

Repository files navigation

A tester here. Looking forward to connecting and learning from you.

I make notes so that I don't forget.

Goal: 1% Everyday

.-- .-- .-- .-.-.- .-.. .. -. -.- . -.. .. -. .-.-.- -.-. --- -- -..-. .. -. -..-. .-.. .. ..-. . - .. -- . ... -.-. .-. .. .--. - -.- .. -.. -.. .. .

SSBkb24ndCBrbm93IHdoYXQgSSBhbSBkb2luZy4gClNvIGhlbHAgbWUsIEdvZC4=

Month Subjects Schedule
June 2025 RAG Week 25: 0. Readme

Week 23/Week 24: 0. Retrieval-Augmented Generation
1. Text Extraction
2. Text Chunking
3. Embedding Chunks and Storing in Vector DB
4. Querying and Retrieving Relevant Context
5. RAG interface
6. main.py
7. Ollama


https://github.com/LifeTimeScriptKiddie/RAGoLLAMA

May 2025 HTB-Active Directory
Web3
(Pending) - CRTL, MALDEV, (Pending) Cloud - Pwnedalbs.io - GCP/Azure
(Pending) - Maldev
(Pending) - HTB AI
(Pending) - Kubernetes
(Pending) - Home Network upgrade
(Pending) - One speak
Week 22: Cloud
Week 21: Cloud
Week 20:One working beacon
Week 19: One working beacon --> Fuck yeah!!
Week 18:1. Learn Web3 (Using Coinbase) Like Systems Engineers
April 2025 Cloud - pwnedlabs.io / Learn like a SE, Hack like a SK
March 2025 HTBA - Senior Web + Cobalt Strike Payload (CRTL + Maldev) One working Beacon
February 2025 HTBA - Senior Web + Cobalt Strike Payload (CRTL + Maldev) Finished HTB Senior web material
January 2025 HTBA - Senior Web
April 2024 Study for OSWE
October 2023 CISSP Done
September 2023 Switch to CISSP
August 2023 Continue with CBBH
July 2023 Started CBBH
June 2023 CRTO - Passed, New Goals: CISSP / CBBH Done
May 2023 CRTO - projected, Start CISSP (projected)
April 2023 CRTO
March 2023 HTB Academy - AD enumeration → Finally Done! Moving on to API
February 2023 HTB Academy - AD enumeration
January 2023 Worked on AD
December 2022 Worked on AD

April 2025

Work kicked in. Gotta focus on Web and Cloud. Finished Web

Learn Web application like a systems engineer hack attack like a script kiddie

0. Web Architecture 101 1. Attack Web application 2. DNS Security - Defen ding Against Attacks 3. Load Balancer Security- Defending Against Attacks 4. Web Application Server Security- Defending Against Attacks 4a. RCE 5. Databases 6. Web Caching Security- Attacks & Mitigation Strategies 7a. Introduction to Job Queue Security 8. Microservices Security- Protecting APIs & Authentication Mechanisms 8a. JWT 8b. OAuth 8c. SAML 9. Introduction to Data Pipeline Security 10. HTTP Headers 11. Javascript Debugging


March 2025

Goal: Make a CS beacon that can survive the initial drop by the end of this month. What I need: Deep understanding of Binaries and windows system Deep understanding of EDR Deep understanding of Cobalt Strike kits

Resources: CRTO, CRTL, Maldev, chatgpt!

How does a binary work ?

  1. Resources 1. Portable Executable Structure 2. From PE to Memory 3. Flow of System Calls - ntdll.dll, kernel32.dll 4. Win32 API and Windows Native API 4a. NTDLL.DLL - Overview and Functionality 5. Syscalls Flow 5a. Syscalls Deep dive 5b. From Memory - PEB_TEB 6. Execution

How does EDR work? 1. Let's understand EDR like a blue team 2. Let's understand EDR like a red team

How to bypass EDR? 0. Binary creation and insertion 1. Download Prevention & Bypass Techniques 1a. AES, RC4, XOR encryption 1b. XOR-Based Self-Decrypting Payload (With Memory Execution) 1c. RC4-Based Self-Decrypting Payload (C++) 1d. AES-Based Self-Decrypting Payload (C++) 1e. Advanced UPX Methods for Modifying Binary Structure 2. Direct syscalls intro 2a. Direct Syscalls cpp 2b. Indirect Syscalls intro 2c. Indirect Syscalls -Tool 3. API Hooking


Learn Clouds like a systems engineer hack like a script kiddie

0. Clouds 1. Clouds testing Scoping 2. Associate roles and services

Attack Clouds 0. Attack Clouds 1. Search for Credentials - Services 2. Search for Credentials - File

Attack Azure 0. Resources 0. Azure - Readme 1. Azure Blob Container to Initial Access 2. Unlock Access with Azure Key Vault 3. Azure with Bloodhound and Microsoft.Graph 4. Loot Exchange, Teams and SharePoint with GraphRunner 5. Unmask Privileged Access in Azure 6. Azure Recon to Foothold and Profit 8. Execute Azure Credential Shuffle to Achieve Objectives

Attack AWS 0. AWS Resources 1. AWS Cloud Services 2. AWS Enumeration Process AWS -Tools

AWS Practice - flaws.cloud AWS Practice 2 -flaws2.cloud

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages