penbook
Active Directory mappingActive information gatheringArp-spoofing - Sniffing trafficAttacking the userAutomated Vulnerability ScannersBash-scriptingBasicsBasics of linuxBasics of windowsThe Basics of AssemblyBinary exploitsBroken Authentication or Session ManagementBrowser vulnerabilitiesBuffer overflow (BOF)Bypass File Upload FilteringBypassing antivirusphysical_access_to_machinewriteups