2 Repos · 45+ Articles · Classic Toolset

PT Tools & Techniques

Reference guides for the core penetration testing toolkit — network reconnaissance, web application testing, password attacks, exploitation, Active Directory, and cloud. All tools, all techniques, all authorized lab-verified walkthroughs.

Git Repositories

2 repos
RTSP-brute-force-tool
Python RTSP

Production-grade RTSP security assessment tool: vendor presets for 20+ camera manufacturers (Hikvision, Dahua, Axis, Hanwha, Uniview), multiple path testing, wordlist directories, config files, parallel workers, and a scriptable CLI. Authorized use only.

Passwords Toolkit
Python wordlists

Security testing toolkit: Personal Password Generator (PPG) for custom wordlist creation, phone number generators, and Base64 credential pairs. Designed for authorized password testing and red team credential validation workflows.

Network Reconnaissance

10 articles
Mastering Nmap — Part 1: Core Scanning

Host discovery, port scanning modes, timing templates, and output formats. Nmap fundamentals for structured network reconnaissance.

Nmaprecon
Mastering Nmap — Part 2: Service and OS Detection

Service version detection, OS fingerprinting, banner grabbing, and interpreting ambiguous scan results with confidence.

Nmapfingerprinting
Mastering Nmap — Part 3: Firewall Evasion and Stealth

Fragmentation, decoys, idle scans, timing manipulation, and techniques for scanning through firewalls and IDS/IPS in authorized engagements.

Nmapevasion
Mastering Nmap — Part 4: NSE Scripts

Nmap Scripting Engine: vulnerability detection scripts, service-specific probes, brute-force scripts, and writing custom NSE scripts.

NmapNSE
Essential CLI Tools for Reconnaissance

Practical overview of the core recon toolkit: which tools to use at each stage, how to chain their output, and when to switch between passive and active methods.

reconCLI toolkit
Shodan: How to Find Everything

Shodan search operators, filters, and dork patterns for discovering exposed services, industrial systems, IoT devices, and misconfigured infrastructure.

ShodanOSINT
Censys for Enhanced Cybersecurity Insight

Using Censys for internet-wide asset discovery: certificate transparency, protocol fingerprinting, and building exposure maps for authorized assessments.

CensysOSINT
theHarvester: OSINT and Reconnaissance

Email, subdomain, IP, and employee enumeration with theHarvester — configuring data sources, interpreting results, and feeding output into the attack workflow.

theHarvesterOSINT
SpiderFoot Deep Dive: Installation, Scans, and Practical Use Cases

SpiderFoot OSINT automation: module selection, scan configuration, correlation of cross-source findings, and integrating results into a target profile.

SpiderFootOSINT
OWASP Amass Project Guide

Amass for subdomain enumeration and attack surface mapping: passive and active modes, DNS brute-forcing, graph output, and integrating with other recon tools.

Amasssubdomain

Web Application Testing

10 articles
Web App Pentesting — Stage 1: Reconnaissance

Passive and active recon for web targets: technology fingerprinting, directory enumeration, subdomain discovery, and building an attack surface map before touching the app.

web apprecon
Web App Pentesting — Stage 2: Scanning and Vulnerability Assessment

Automated and manual scanning: Nikto, Burp Scanner, ZAP active scan, and manual verification of findings — separating signal from noise in web vulnerability reports.

web appscanning
Mastering Burp Suite Vulnerability Scanner

Burp Scanner configuration, crawl scope, active scan tuning, issue types, confidence levels, and building a structured pentest report from scanner findings.

Burp Suitescanning
Cracking Web Interfaces with Burp Suite

Using Burp Intruder and Repeater for form-based login brute force, session token analysis, and parameter manipulation in web authentication flows.

Burp Suitebrute force
OWASP ZAP: Web Application Security Testing Guide

Full ZAP workflow: spider, active scanner, fuzzer, AJAX spider, and HUD mode. Setting up ZAP as an intercepting proxy for authenticated application testing.

OWASP ZAP
SQLMap Deep Dive — Part 1: Basic and Wizard Modes

SQLMap fundamentals: detection modes, database enumeration, data extraction, and the wizard for quick assessments against SQL-injectable endpoints.

SQLMapSQL injection
SQLMap Deep Dive — Part 2: Advanced and Custom Setup

Advanced SQLMap: tamper scripts, custom headers, crawling, POST injection, OS command execution, file read/write, and evading WAF detection.

SQLMapadvanced
Nikto: Uncovering Web Server Vulnerabilities

Nikto scan configuration, plugin selection, evasion options, and interpreting output for common web server misconfigurations and outdated software.

Niktoweb server
Mastering DirBuster: Uncovering Hidden Web Assets

Directory and file brute-forcing with DirBuster: wordlist selection, threading, extension bruteforcing, and interpreting 200/301/403 response patterns.

DirBusterenumeration
From Bugs to Breaches: Learning Secure Coding via OWASP Top 10

Attacker-perspective walkthrough of OWASP Top 10 vulnerabilities — understanding each class to test for them effectively and build detection coverage.

OWASP Top 10secure coding

Password Attacks & Credential Testing

15 articles
Mastering Hydra: Network Logon Cracking

Hydra fundamentals and advanced options: protocol selection, wordlist configuration, rate limiting, and service-specific setup for HTTP, FTP, SSH, SMB, and more.

Hydrabrute force
Hashcat: Effective Password Cracking

Hashcat attack modes, GPU optimization, rule files, combinator attacks, and hash type selection — from hash identification to cracked output.

Hashcatpassword cracking
Mastering John the Ripper

John the Ripper across all major attack modes: wordlist, incremental, single, and external. Rule-based mutations, format detection, and cracking complex hashes.

John the Ripper
John the Ripper Hash Formats Reference

Comprehensive format reference: identifying which --format flag matches which hash type across Windows, Linux, application, and archive hash families.

John the Ripperreference
2John: Extract Hashes from Common File Types

Using the *2john family (office2john, pdf2john, zip2john, ssh2john, keepass2john) to extract crackable hashes from protected files for John the Ripper.

John the Ripperhash extraction
Personal Pass Generator (PPG): Custom Password Lists

PPG walkthrough: generating target-specific wordlists from known personal details — the strongest attack vector against security-aware users who use "personalized" passwords.

PPGwordlists
Password Cracking: ZIP, PDF, Web, RDP, SSH, Cameras

Consolidated guide covering all major password cracking scenarios in authorized testing: archives, documents, web logins, remote access protocols, and IP cameras.

password crackingmulti-target
WiFi Cracking with Aircrack-ng

WPA/WPA2 capture and offline cracking with Aircrack-ng: monitor mode, deauth injection, 4-way handshake capture, and dictionary/brute-force attacks.

Aircrack-ngWiFi
RDP Cracking with Crowbar and PPG

Authorized RDP credential testing: Crowbar for protocol-correct RDP brute-force, PPG for personalized wordlist generation, and rate-limiting considerations.

CrowbarRDP
Cracking SSH with Metasploit: Exploiting Weak Credentials

SSH credential testing via Metasploit's auxiliary scanner module: target configuration, wordlist setup, threading, and post-exploitation access after successful login.

MetasploitSSH
Cracking Telnet: Weaknesses and Exploitation Techniques

Telnet credential testing and exploitation: default credential attacks, session hijacking risks, and why Telnet remains a viable target in industrial and legacy environments.

Telnetlegacy
Cracking RTSP Security: RTSP Brute Force Tool Guide

Using the RTSP Brute Force Tool for authorized IP camera security assessment: vendor presets, path enumeration, credential testing, and stream access verification.

RTSPcameras
ZIP File Password Cracking — Guide with Real Examples

ZIP archive password recovery: zip2john hash extraction, dictionary and brute-force attack modes, encryption type detection, and authorized recovery scenarios.

password recoveryZIP
PDF File Password Cracking — Guide with Real Examples

PDF owner and user password recovery: pdf2john extraction, encryption version detection, and attack strategy selection for different PDF security levels.

password recoveryPDF
Office File Password Cracking — Guide with Real Examples

DOC, DOCX, PPT password recovery: office2john/msoffice2john extraction, encryption strength detection, and efficient cracking for both legacy and modern Office formats.

password recoveryOffice

Exploitation & Post-Exploitation

6 articles
The Basic Toolkit for Penetration Testing

Essential PT tool selection: which tools to have, why, and how they fit together across reconnaissance, exploitation, credential testing, and post-exploitation phases.

exploitationtoolkit
The Ultimate Guide to Metasploit — Part 1

Metasploit Framework fundamentals: msfconsole navigation, workspace management, database integration, payload types, and the exploit lifecycle from search to shell.

Metasploit
Metasploit Modules Guide: Auxiliary

Auxiliary module reference: scanners, fuzzers, credential testers, and enumeration modules — how to select, configure, and run auxiliary modules effectively.

Metasploitauxiliary
Metasploit Modules Guide: Exploit

Exploit module deep dive: RHOST/LHOST configuration, payload selection, session types, post-exploitation modules, and pivoting through Meterpreter.

Metasploitexploit
Exploiting FTP Vulnerabilities for Penetration Testing

FTP attack vectors: anonymous login, credential brute-force, banner grabbing, directory traversal, and using FTP for post-exploitation file transfer and persistence.

FTPexploitation
Sublist3r: Subdomain Enumeration

Sublist3r for passive subdomain discovery: multi-source aggregation, integration with brute-force modes, and feeding results into the attack surface map.

Sublist3rsubdomain

Advanced Attack Techniques

5 articles — AD, ADCS, Kubernetes, Cloud
Active Directory Penetration Testing

Full AD attack chain: Kerberoasting, AS-REP roasting, ACL abuse, Pass-the-Hash, Pass-the-Ticket, LSASS credential dumping, and DCSync — step-by-step walkthrough.

Active DirectoryWindows
ADCS ESC8 Attack: Certificate-Based Domain Compromise

Complete ESC8 exploitation guide: ADCS misconfiguration discovery, Web Enrollment abuse, certificate request, and leveraging the certificate for domain admin access.

ADCSESC8domain
WhatWeb: Unlocking Web Intelligence

WhatWeb for technology fingerprinting: CMS detection, server identification, framework recognition, and building target technology profiles for vulnerability mapping.

WhatWebfingerprinting
Black-Box Kubernetes Penetration Testing Playbook

Manual K8s PT from zero knowledge: cluster discovery, API server enumeration, RBAC misconfiguration exploitation, container escape, and lateral movement across namespaces.

Kubernetescloud
GCP Penetration Testing: Step-by-Step Attack Guide

GCP attack chain: IAM misconfiguration discovery, service account key abuse, privilege escalation, compute instance access, and data exfiltration from Cloud Storage.

GCPcloud

Security Reference

2 articles
Quick-Start Server Hardening Checklist (All Open-Source)

Practical hardening checklist covering SSH lockdown, firewall rules, fail2ban, auditd, unattended upgrades, and service minimization — all open-source tooling.

hardeningdefensive
Protocol-Level Network Threat Hunting with Wireshark

Wireshark-driven analysis: protocol anomaly detection, C2 pattern identification, DNS tunneling indicators, and SSL/TLS fingerprinting in captured traffic.

Wiresharkthreat hunting