52+ guides · All authorized · All hands-on

Guides

Comprehensive security guides across CTI tradecraft, detection engineering, malware analysis, network recon, web app security, password attacks, and AI-driven pentesting.

CTI & Threat Intelligence

7 guides
CTI Analyst Field Manual — Complete Reference

Full tradecraft reference: evidence labeling, source reliability, confidence tiering, attribution methodology, infrastructure pivoting, detection candidate mapping.

CTItradecraft
CTI Kill Chain: An Analyst Guide With Real-World Evidence

Applying kill chain analysis to real adversary behavior; evidence labeling at each stage with worked examples.

CTIkill chain
From Threat Intelligence to Detection: A Practitioner's Guide

End-to-end workflow: actor assessment → TTP extraction → detection candidate → hunting hypothesis → backlog item.

CTIdetection
Applying Sherman Kent's Analytic Discipline to CTI: A Practical Analyst Guide

Structured analytic judgment: words of estimative probability, source critique, and bias mitigation in CTI production.

CTIanalytics
ATT&CK as a Working Tool: Theory and Hands-On Practical Usage

Moving beyond the matrix: technique selection, sub-technique context, Navigator usage, and detection hypothesis construction.

CTIATT&CK
Tools by MITRE ATT&CK Guide

Tool-to-technique mapping reference: which adversary tools map to which ATT&CK techniques and why.

CTIATT&CK
Customer-Driven AI CTI Project Template — Phase-by-Phase Execution Guide

Scoping, collection, analysis, delivery, and feedback loop for a structured client-facing CTI engagement.

CTIAI

Detection & SOC

2 guides
SOC Tier 1: The Complete Onboarding Guide to Security Monitoring and Incident Response

Alert triage, escalation criteria, SIEM query patterns, and analyst workflow for Tier 1 analysts.

SOCSIEM
Detecting Malicious Insider Activity: A Technical Detection Engineering Guide

Behavioral detection: data staging, exfiltration patterns, access anomaly queries, and Sigma rule construction.

detectionSigma

Network Reconnaissance

8 guides
Mastering Nmap: Part 1 — Host Discovery & Port Scanning

Scan types, timing templates, OS detection, and output formats.

Nmaprecon
Mastering Nmap: Part 2 — Service Detection & Version Scanning

Banner grabbing, version detection flags, and service fingerprinting.

Nmaprecon
Mastering Nmap: Part 3 — Firewall Evasion & Spoofing

Fragmentation, decoy scans, timing evasion, and source routing.

Nmapevasion
Mastering Nmap: Part 4 — NSE Scripts

NSE categories, writing scripts, vuln detection, and automation.

NmapNSE
Shodan: Guide to Finding Everything

Shodan search operators, filters, API usage, and OSINT pivoting from exposed services.

ShodanOSINT
SpiderFoot Deep Dive: Installation, Scans, and Practical Use Cases

OSINT automation: module configuration, scan profiles, and result analysis.

SpiderFootOSINT
OWASP Amass Project Guide

Subdomain enumeration, ASN mapping, and infrastructure graphing with Amass.

AmassOSINT
Protocol-Level Network Threat Hunting: A Wireshark-Centric Guide

PCAP-based hunting: protocol anomalies, C2 traffic patterns, beaconing detection, and display filters.

Wiresharkhunting

Web Application Security

3 guides
OWASP ZAP: A Comprehensive Guide to Web Application Security Testing

Spider, active scan, passive scan, authentication handling, and report generation.

ZAPweb
Cracking Web Interfaces with Burp Suite: A Comprehensive Tutorial

Intercepting proxies, intruder brute-force, repeater, and login form attacking.

Burp Suiteweb
SQLMap: A Deep Dive into Automated SQL Injection Testing — Part 2 (Advanced)

Tamper scripts, WAF bypass, blind injection techniques, and database enumeration.

SQLMapSQLi

Password Attacks

9 guides
Mastering Hydra: The Ultimate Guide to Network Logon Cracking

Protocol modules (SSH, FTP, HTTP, SMB), wordlist selection, rate limiting, and success detection.

brute-forceHydra
Mastering John the Ripper: A Complete Guide to Password Cracking

Hash identification, wordlist + rule attacks, incremental mode, and format specification.

crackingJohn
Personal Pass Generator (PPG): The Ultimate Tool for Custom Password Lists

Target-aware wordlist generation using personal data, leet transforms, and pattern rules.

wordlistPPG
Accessing Remote Desktops: A Beginner's Guide to RDP Cracking with Crowbar and PPG

RDP brute-force with Crowbar: target specification, threading, and credential handling.

RDPCrowbar
Cracking SSH with Metasploit: A Step-by-Step Guide to Exploiting Weak Credentials

SSH login scanner module, wordlist configuration, and session handling.

SSHMetasploit
Office File Password Cracking: Guide with Real-Life Examples

hashcat + John workflows for DOC/DOCX/PPT/XLSX with real samples.

crackingOffice
PDF File Password Cracking: Guide with Real-Life Examples

PDF hash extraction (pdf2john) and cracking with rule-based attacks.

crackingPDF
ZIP File Password Cracking: Guide with Real-Life Examples

zip2john, hashcat modes, and practical wordlist strategies for encrypted archives.

crackingZIP
Cracking RTSP Security: A Comprehensive Guide to Using the RTSP Brute Force Tool

IP camera stream brute-forcing with the RTSP-brute-force tool.

RTSPcameras

Exploitation & Metasploit

4 guides
The Ultimate Guide to Metasploit — Part 1

Architecture, db_nmap integration, workspace management, and module selection fundamentals.

Metasploitexploitation
Metasploit Modules Guide — Auxiliary

Scanner, sniffer, and fuzzer auxiliaries: configuration, RHOSTS, THREADS, and output handling.

Metasploitauxiliary
Metasploit Modules Guide — Exploit

Exploit + payload selection, target configuration, check command, and post-exploitation.

Metasploitpayload
Enhancing Penetration Testing with HackerAI: Step-by-Step Guide

AI-assisted recon and exploitation walkthrough against a Metasploitable lab.

AIexploitation

AI-Driven Pentesting

2 guides
The Complete Guide to AI-Driven Penetration Testing: Cursor, MCP, and the Modern PT Workflow

Autonomous PT with Cursor AI + MCP servers: recon → exploitation → reporting workflow.

AIMCPCursor
AI Offensive Security: Practical Attacks Against LLM Agents

Prompt injection, indirect injection, goal hijacking, and exfiltration techniques against real LLM agent architectures.

AI securityLLM attacks

Malware Analysis

5 guides
PE Import Analyzer: A Practical Guide for Malware Analysts and Reverse Engineers

LIEF-based import triage, risk classification workflow, and JSON output integration.

malwarePE analysis
A Practical Guide to String Analyzer

Binary string extraction, IOC identification, entropy filtering, and structured output.

malwarestrings
Unpacker: A Practical Guide to Modular Malware Packer Detection and Unpacking

Packer identification with DIE, unpac.me integration, and de4dot deobfuscation workflow.

malwareunpacking
Android Malware Analysis: A Practical Guide for Security Analysts

APK static analysis: manifest review, permission analysis, DEX inspection, and IOC extraction.

malwareAndroid
Android APK Vulnerability Research Complete Guide

Full APK assessment workflow: static triage → dynamic analysis → YARA → ATT&CK mapping → report.

malwareAndroidYARA

Cloud, Kubernetes & Active Directory

6 guides
GCP Penetration Testing: A Step-by-Step Attack Guide

GCP attack path: service account privilege escalation, metadata server abuse, and CloudTrail detection.

cloudGCP
A Complete Cloud Penetration Testing Walkthrough

End-to-end cloud PT on the vulnerable-cloud-lab: initial access → lateral movement → exfil.

cloudAWSGCP
Kubernetes Logging and Monitoring: Complete Guide

Log collection, audit policy, Fluent Bit pipelines, and detection rule integration for K8s.

Kubernetesdetection
ADCS ESC8 Attack: Certificate-Based Domain Compromise — Complete Guide

NTLM relay to ADCS, ESC8 exploitation, certificate request, and Pass-the-Certificate.

ADADCSESC8
Active Directory Lab for PenTest — Manual Deployment Guide

Step-by-step AD domain setup with GPO misconfigurations, Kerberoasting targets, and AS-REP roasting.

ADKerberos
CVSS v4.0: The Practical Field Guide for Vulnerability Management

CVSS-BTE scoring, environmental modifier impact, CISA KEV integration, and prioritization workflow.

CVSSvuln mgmt