Source content for HackWiki, a free cybersecurity knowledge base.
Markdown files across 14 sections covering offensive security, defensive security, and everything in between.
| # | Section | Topics |
|---|---|---|
| 01 | Fundamentals | Linux, Windows, Networking, MITRE ATT&CK |
| 02 | Reconnaissance | Discovery, Enumeration, Passive Recon, Wireless |
| 03 | Social Engineering | Phishing, Physical, SE Frameworks |
| 04 | Web Testing | Injection, XSS, Auth, File Attacks, API |
| 05 | Post Exploitation | AD, PrivEsc, Lateral Movement, Pivoting, Credentials |
| 06 | Red Teaming | C2, Evasion, Infrastructure, Initial Access |
| 07 | Exploit Dev | Stack, Heap, Shellcode, Protections |
| 08 | AI Security | LLM Attacks, Adversarial ML, Defenses |
| 09 | Mobile Security | Android, iOS, Common Methodology |
| 10 | Malware Analysis | Static, Dynamic, Reverse Engineering |
| 11 | Digital Forensics | Disk, Memory, Network, Windows/Linux |
| 12 | Defensive | Detection, Hardening, IR, Threat Hunting |
| 13 | Programming | Bash, Python, PowerShell |
| 14 | Resources | Cheatsheets, Methodology |
These Markdown files are converted to HTML using Grimoire with the HackWiki template.
See contribute.md for guidelines.
Free to use and modify for personal/educational projects. Must credit HackWiki. Do not redistribute as your own product.