A cheatsheet for understanding privilege escalation with examples, not for enumeration using Linux Commands.
Between Two DFIRns: DFIR CTF: Precision Widgets of North Dakota Intrusion A cybersecurity challenge where you play the role of an incident response consultant investigating an intrusion at Precision Widgets of North Dakota. Background: Precision Widgets of North Dakota is a manufacturer of high tech precision aircraft and mobility parts primarily for government customers across the globe. PWND owns patents for several processes and designs which are the foundation of their brand and their most precious asset. Your task is to investigate the intrusion and uncover the truth behind the recent contract loss.
A cheatsheet for understanding privilege escalation with examples, not for enumeration using Linux Commands.
A workshop offering resources for local privilege escalation on Windows and Linux systems.
A collection of computer science courses with video lectures covering a wide range of topics.
Collection of recent infosec/hacking videos from conferences.
A comprehensive guide to using Metasploit, including searching for modules, specifying exploits and payloads, and using auxiliary modules.
Research project on bypassing default Falco ruleset with Dockerfile for sshayb/fuber:latest image.