📄️ Network Pivoting
Reference guide for network pivoting methodologies, tools, and techniques used in authorized penetration testing and red team post-exploitation operations.
📄️ Password Cracking
An exhaustive academic reference analyzing password cracking methodologies, brute force techniques, and hash analysis for penetration testing and security research
📄️ PCAP Analysis
Exhaustive reference for packet capture, traffic analysis, and network forensics — tcpdump, Wireshark, tshark, Scapy, Zeek, Binary Refinery, and more.