Knowledge Base

Techniques & Methodology

17 articles

Structured learning paths from zero networking knowledge through full-scope offensive operations. Start at the top, or jump to what you need.

Start Here5 articles

Core concepts. Read these first — they underpin everything.

Offensive7 articles

The full attack lifecycle from recon to domain takeover.

Specialist5 articles

Wireless, forensics, evasion, and professional output.

Quick Reference — All 17 Articles

Networking Fundamentals15m

How Networks Actually Work

TCP/IP, OSI, DNS, ARP, and routing — the plumbing under every attack

Linux Fundamentals18m

Linux Fundamentals for Hackers

The command line skills every penetration tester uses every single day

Authentication13m

How Authentication Works

Passwords, hashes, tokens, Kerberos, and NTLM — the systems you'll be attacking

Web Fundamentals12m

Web Fundamentals

HTTP, cookies, sessions, same-origin policy — the foundation for every web attack

Memory & Binary14m

How Memory Works

Stack, heap, registers, and why buffer overflows happen — the theory behind exploitation

Information Gathering12m

Reconnaissance

Mapping the attack surface before the first packet is sent

Web Application Analysis18m

Web Application Analysis

Methodical exploitation of the most common attack surface in modern engagements

Password Attacks13m

Password Attacks

Cracking, spraying, and bypassing authentication

Exploitation15m

Exploitation

Turning vulnerabilities into access

Post Exploitation14m

Post-Exploitation

Maintaining access, escalating privileges, and moving laterally

Active Directory20m

Active Directory Enumeration

Mapping the domain before you own it — users, groups, ACLs, and trust relationships

Active Directory22m

Active Directory Exploitation

Kerberoasting, Pass-the-Hash, DCSync, and the path to Domain Admin

Wireless Attacks11m

Wireless Attacks

Auditing 802.11 networks and Bluetooth targets

Network Analysis18m

Network Traffic Analysis

Reading packet captures, spotting anomalies, and extracting intelligence from the wire

Forensics13m

Forensics

Recovering evidence and analysing compromised systems

Evasion20m

Evasion & AV Bypass

Getting your tools and payloads past antivirus, EDR, and AMSI

Report Writing14m

Penetration Test Report Writing

Communicating findings clearly — executive summary, technical findings, and actionable remediation