Security Knowledge Base
A collection of cybersecurity notes, tools, and reference materials.
Core Concepts
- security basic - Security fundamentals
- architecture - Security architecture
- cissp - CISSP study notes
Identity & Access Management
- iam overview - IAM fundamentals
- iam passwords - Password security
- iam conditional access - Conditional access policies
- iam zero trust - Zero trust architecture
- activedirectory - Active Directory
Offensive Security
Reconnaissance
- 12 01 pentest recon - Reconnaissance techniques
- nmap - Network scanning with Nmap
- owasp osint - OSINT techniques
Exploitation
- 11-01 pentest exploits - Exploitation techniques
- bruteforce - Brute force attacks
- ttp spray and pray - Spray and pray techniques
Privilege Escalation
- 12-03 PrivilegeEscalation - Privilege escalation methods
Malware & Tools
- malware - Malware overview
- malware metasploit - Metasploit framework
- malware mimikatz - Mimikatz
Defensive Security
- incident response - Incident response procedures
- dlp - Data loss prevention
- steganography - Steganography detection
Operating Systems
Windows
- os windows - Windows security
- os win powershell - PowerShell
- os win cmd line - Command line
- os win ads - Alternate data streams
- os win bits - BITS
- os win certutil - Certutil
- os win vss - Volume Shadow Copy
- sysinternals - Sysinternals tools
Linux
- os linux - Linux security
macOS
- 11-01 macos useful - macOS utilities
Networking & Protocols
- networking - Network fundamentals
- dos - Denial of service
- cyb curl - cURL for security
Cryptography & Encoding
- encryption - Encryption algorithms
- encoding - Encoding schemes