Knowledge Base
Techniques & Methodology
17 articlesStructured learning paths from zero networking knowledge through full-scope offensive operations. Start at the top, or jump to what you need.
Core concepts. Read these first — they underpin everything.
The full attack lifecycle from recon to domain takeover.
Wireless, forensics, evasion, and professional output.
Quick Reference — All 17 Articles
How Networks Actually Work
TCP/IP, OSI, DNS, ARP, and routing — the plumbing under every attack
Linux Fundamentals for Hackers
The command line skills every penetration tester uses every single day
How Authentication Works
Passwords, hashes, tokens, Kerberos, and NTLM — the systems you'll be attacking
Web Fundamentals
HTTP, cookies, sessions, same-origin policy — the foundation for every web attack
How Memory Works
Stack, heap, registers, and why buffer overflows happen — the theory behind exploitation
Reconnaissance
Mapping the attack surface before the first packet is sent
Web Application Analysis
Methodical exploitation of the most common attack surface in modern engagements
Password Attacks
Cracking, spraying, and bypassing authentication
Exploitation
Turning vulnerabilities into access
Post-Exploitation
Maintaining access, escalating privileges, and moving laterally
Active Directory Enumeration
Mapping the domain before you own it — users, groups, ACLs, and trust relationships
Active Directory Exploitation
Kerberoasting, Pass-the-Hash, DCSync, and the path to Domain Admin
Wireless Attacks
Auditing 802.11 networks and Bluetooth targets
Network Traffic Analysis
Reading packet captures, spotting anomalies, and extracting intelligence from the wire
Forensics
Recovering evidence and analysing compromised systems
Evasion & AV Bypass
Getting your tools and payloads past antivirus, EDR, and AMSI
Penetration Test Report Writing
Communicating findings clearly — executive summary, technical findings, and actionable remediation