I've worked as a Level 2 Security Analyst, Developer, and DevOps, and this is my contribution to society. I hope you find something useful here!
- Information Gathering:
- Nmap, Google Dorking, Nslookup
- Nmap, Google Dorking, Nslookup
- Vulnerability analysis:
- Nikto, Nmap Scripts, Burp Suite Community, Exploit-DB to search for CVEs.
- Nikto, Nmap Scripts, Burp Suite Community, Exploit-DB to search for CVEs.
- Exploitation:
- Beef, SQLMap, Metasploit Framework, SET Toolkit
- Beef, SQLMap, Metasploit Framework, SET Toolkit
- Post Explotation & Privilege Escalation:
- LinPeass, WinPeass, NetCat
- LinPeass, WinPeass, NetCat
- OSINT Tools:
- OSINTgram, CloudEnum, Google Dorking, The Harvester
- OSINTgram, CloudEnum, Google Dorking, The Harvester
- UFW / IPTables, Azure Sentinel, Cortex XDR, Imperva WAF, IBM QRadar, WireShark
- Understanding Windows API: Learning the intricacies of the Windows API for process and memory management.
- Process Manipulation: Gaining skills in creating, injecting, and modifying processes.
- Memory Management: Studying techniques for accessing and manipulating memory safely and effectively.
- Hardware Access: Exploring methods for interacting with hardware devices (keyboard, mouse, webcam, microphone).
- Hooking Techniques: Implementing hooks to intercept and manipulate system calls for keylogging and other purposes.
- Evasion Techniques: Learning about strategies to evade EDRs (Endpoint Detection and Response) and AV (Antivirus) engines.
- Network Communications: Understanding how to handle unencrypted communications and implement covert channels.
- Creative Obfuscation: Focusing on unique obfuscation techniques for Golang code, particularly for data structures and maps.
- Runtime Generation: Developing functions that generate critical data at runtime, based on dynamic inputs and transformations.
- Zero-Click Exploits: Working towards the goal of creating sophisticated zero-click exploits.