⚔️
Pentest CodeX
search
⌘Ctrlk
LinkedInGithub
⚔️
Pentest CodeX
  • 🏠HOME
    • About Me
  • 🛡️PENTESTING
    • RECON
    • SERVICES
    • WEB
    • OPERATIONS
    • PRIVESC
    • ACTIVE DIRECTORY
  • ⚒️COURSES
    • CPTS
      • 01. Enumeration
      • 02. Nmap
      • 03. Active Directory Enumeration & Attacks
      • 04. Attacking Common Services
      • 05. Attacking Common Applications
      • 06. File Inclusion
      • 07. Web Attacks
      • 08. Web Service & API Attacks
      • 09. Server-side Attacks
      • 10. Linux Privilege Escalation
      • 11. Windows Privilege Escalation
      • Broken Authentication
      • Command Injections
      • File Transfer
      • File Upload Attacks
      • Ligolo-ng
      • Login Brute Forcing
      • Password Attacks
      • Password Cracking
      • Pivoting, Tunneling, and Port Forwarding
      • SQL Injection
      • Session Security Guide
      • Discover environmental variables of a system to identify the shell language
      • Upgrading TTY Shell
      • Using the Metasploit Framework
      • XSS
      • Vulnerability Assessment - CPTS
      • Firewall and IDS/IPS Evasion - CPTS
      • cpts-tips
    • OSCP
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
githubEdit
  1. ⚒️COURSES

CPTS

01. Enumerationchevron-right02. Nmapchevron-right03. Active Directory Enumeration & Attackschevron-right04. Attacking Common Serviceschevron-right05. Attacking Common Applicationschevron-right06. File Inclusionchevron-right07. Web Attackschevron-right08. Web Service & API Attackschevron-right09. Server-side Attackschevron-right10. Linux Privilege Escalationchevron-right11. Windows Privilege Escalationchevron-rightBroken Authenticationchevron-rightCommand Injectionschevron-rightFile Transferchevron-rightFile Upload Attackschevron-rightLigolo-ngchevron-rightLogin Brute Forcingchevron-rightPassword Attackschevron-rightPassword Crackingchevron-rightPivoting, Tunneling, and Port Forwardingchevron-rightSQL Injectionchevron-rightSession Security Guidechevron-rightDiscover environmental variables of a system to identify the shell languagechevron-rightUpgrading TTY Shellchevron-rightUsing the Metasploit Frameworkchevron-rightXSSchevron-rightVulnerability Assessment - CPTSchevron-rightFirewall and IDS/IPS Evasion - CPTSchevron-rightcpts-tipschevron-right
PreviousKerberos Time Skew Detection and Fix Guidechevron-leftNext01. Enumerationchevron-right

Last updated 15 hours ago