Skip to content
OSCP Cheatsheets, Pentesting Cheathseets, Red Team Attacking Tools and Techniques, Offensive Security Tips
Branch: master
Clone or download
Type Name Latest commit message Commit time
Failed to load latest commit information.
.gitbook/assets GitBook: [master] one page and one asset modified Apr 22, 2019
.vscode first commit Mar 2, 2019
lab first commit Mar 2, 2019
memory-forensics first commit Mar 2, 2019
offensive-security-experiments GitBook: [master] one page modified Apr 18, 2019
offensive-security GitBook: [master] one page and one asset modified Apr 22, 2019
.gitignore first commit Mar 2, 2019 first commit Mar 2, 2019 GitBook: [master] 3 pages modified Apr 21, 2019

About /?

What is this about

This is publicly accessible personal notes at about my pentesting / red teaming experiments in a controlled environment that involve playing with various tools and techniques used by penetration testers, red teams and advanced adversaries.

The following sub-pages of this page will explore some of the common offensive security techniques involving gaining code execution, lateral movement, persistence and more.

The Goal

The goal of this project is simple - read other researchers work, execute some common/uncommon attacking techniques in a lab environment and:

  • understand how the attacks can be performed
  • write code to further the understanding of some of the tools and techniques
  • see what most common artifacts they leave behind
  • try out various industry tools and become more profficient in using them
  • make any notes as a reference for the future

{% hint style="warning" %} These are my personal notes accessible publicly.

Do not take everything or anything for granted nor expect the notes to be very detailed or covering the techniques or the artifacts they produce in full and always consult additional resources. {% endhint %}

Follow me on twitter:

{% embed url="" %}

You can’t perform that action at this time.