├── .gitignore ├── AI_Research ├── AI-Driven_Prompt_Engineering_for_Cybersecurity_Assessments.md ├── Prompt_Engineering.md ├── Python │ ├── 01_threat_hunting.py │ ├── 02_vulnerability.py │ └── 03_rag.py └── ai_security_tools.md ├── Center_for_Internet_Security └── Top_18_Security_Controls.md ├── Cheat_Sheets ├── UFW_cheat_sheet.md ├── access_control_cheatsheet.md ├── linux_metacharacters.md ├── linux_user_management.md ├── msfvenom.md ├── nmap.md └── tshark.md ├── Cloud_Security_Alliance_(CSA) ├── CSA.md └── Cloud_Security_Alliance_(CSA)_Data_Lifecycle_Model.md ├── Cloud_Security_Resources ├── NIST_Cloud_Architecture.md └── README.md ├── Documentation ├── Buffer_Overflow │ └── README.md ├── Business_Continuity_Business_Disaster_Recovery.md ├── Capability_Maturity_Model_Integration_(CMMI).md ├── DevSecOps_Building_Secure_Software_at_Speed.md ├── Hunting │ └── Threat_hunting_network_data.md ├── IT_Security_Awareness_Comprehensive_Program_Organizations.md ├── Implementing_Four_Disciplines_Cybersecurity_Architecture_Practice.md ├── LSM_comparison.md ├── Living_off_the_Land.md ├── MITRE_ATT&CK.md ├── NIST_Computer_Security_Incident_Handling_Guide.md ├── NIST_Defense_in_depth.md ├── Protect_Enterprise_4_Core_Disciplines_Cybersecurity_Architecture.md ├── Security_Architecture_for_Companies.md ├── Software_Bill_of_Materials_SBOM.md ├── Terms_Vulnerability_Analysis.md ├── The_Process_of_Monitoring_in_Cybersecurity.md ├── Threat_Management_by_Microsoft_STRIDE.md ├── Zero_Trust_Architecture.md └── devsecops.md ├── Encryption ├── Cryptographic_algorithms.md ├── cert_openssl.md ├── crypto_frameworks.md └── gpg_how_to.md ├── Ethical_Hacking ├── Definition.md └── The_process_of_the_ethical_hacker │ ├── 01_Planning_and_Reconnaissance │ ├── Intelligence_Gathering.md │ ├── Intro_to_nuclei.md │ ├── OSINT.md │ ├── Reconnaissance.md │ ├── Stealth_nmap.md │ └── Webapp_reconnaissance.md │ ├── 02_Scanning_and_Enumeration │ ├── Kali_autopilot.md │ ├── SMB_enumeration_tips.md │ ├── Simple_scan_automation_with_python.md │ └── ldap_enumeration.md │ ├── 03_Threat_Modelling │ └── Threat_Modelling.md │ ├── 04_Vulnerability_Analysis │ └── Vulnerability_Analysis.md │ ├── 05_Exploitation │ └── Exploitation.md │ ├── 06_Post_Exploitation │ └── Post_Exploitation.md │ └── Definition.md ├── Fundamentals ├── Cyber_Kill_Chain.md ├── Intro_to_threat_hunting.md ├── Linux_commands.md ├── Metasploit_terminology_commands.md ├── PowerShell_commands.md ├── Python.md ├── Securing_code_and_applications.md ├── Social_engineering_countermeasures.md ├── Understanding_information_security_controls.md └── nmap_tutorial.md ├── Images ├── 01_KA.JPG ├── 02_KA.JPG ├── 03_KA.JPG ├── 04_KA.JPG ├── 05_KA.JPG ├── 06_KA.JPG ├── CIS-CAT_Config.png ├── Cyber_Kill_Chain.JPG ├── Ethical.png ├── Incident.jpeg ├── clodsa.jpeg ├── lynis.png ├── mitre_ttps.png └── nist.png ├── LICENSE ├── Links.md ├── OWASP └── Comprehensive_Overview.md ├── Penetration_Testing ├── Contract_Agreement.md ├── Definition.md └── Example_Penetration_Test_Final_Report.md ├── README.md ├── Script_examples ├── Bash │ ├── Enumeration.sh │ └── nmap.sh ├── Links.md ├── PowerShell │ ├── Post_Exploitation_with_PowerShell_CMD.ps1 │ └── System_audit.ps1 └── Python │ ├── Creare_virtual_environment.sh │ ├── Exploitation │ ├── arp_cache_poisoner.py │ ├── arp_cache_poisoner_simple.py │ ├── cookie_stealer.py │ ├── dll_injection_example.py │ └── python_cool_tricks.md │ └── Web_App_Pentesting │ ├── How_to.md │ ├── docker-compose.yml │ ├── requirements.txt │ └── web_app_pen_testing.py └── Security_Configuration_Assessment ├── BIOS_best_practices.md ├── CIS-CAT_Lite.md ├── IT_Security_Assessments.md ├── Lynis.md ├── Selinux_Rocky_Linux_lab.md ├── Understanding_SELinux.md ├── WLAN-Hacking_countermeasure.md ├── iptables_nftables_UFW_and_firewalld.md └── port_knocking_and_spa.md /.gitignore: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/.gitignore -------------------------------------------------------------------------------- /AI_Research/AI-Driven_Prompt_Engineering_for_Cybersecurity_Assessments.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/AI_Research/AI-Driven_Prompt_Engineering_for_Cybersecurity_Assessments.md -------------------------------------------------------------------------------- /AI_Research/Prompt_Engineering.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/AI_Research/Prompt_Engineering.md -------------------------------------------------------------------------------- /AI_Research/Python/01_threat_hunting.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/AI_Research/Python/01_threat_hunting.py -------------------------------------------------------------------------------- /AI_Research/Python/02_vulnerability.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/AI_Research/Python/02_vulnerability.py -------------------------------------------------------------------------------- /AI_Research/Python/03_rag.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/AI_Research/Python/03_rag.py -------------------------------------------------------------------------------- /AI_Research/ai_security_tools.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/AI_Research/ai_security_tools.md -------------------------------------------------------------------------------- /Center_for_Internet_Security/Top_18_Security_Controls.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Center_for_Internet_Security/Top_18_Security_Controls.md -------------------------------------------------------------------------------- /Cheat_Sheets/UFW_cheat_sheet.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Cheat_Sheets/UFW_cheat_sheet.md -------------------------------------------------------------------------------- /Cheat_Sheets/access_control_cheatsheet.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Cheat_Sheets/access_control_cheatsheet.md -------------------------------------------------------------------------------- /Cheat_Sheets/linux_metacharacters.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Cheat_Sheets/linux_metacharacters.md -------------------------------------------------------------------------------- /Cheat_Sheets/linux_user_management.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Cheat_Sheets/linux_user_management.md -------------------------------------------------------------------------------- /Cheat_Sheets/msfvenom.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Cheat_Sheets/msfvenom.md -------------------------------------------------------------------------------- /Cheat_Sheets/nmap.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Cheat_Sheets/nmap.md -------------------------------------------------------------------------------- /Cheat_Sheets/tshark.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Cheat_Sheets/tshark.md -------------------------------------------------------------------------------- /Cloud_Security_Alliance_(CSA)/CSA.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Cloud_Security_Alliance_(CSA)/CSA.md -------------------------------------------------------------------------------- /Cloud_Security_Alliance_(CSA)/Cloud_Security_Alliance_(CSA)_Data_Lifecycle_Model.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Cloud_Security_Alliance_(CSA)/Cloud_Security_Alliance_(CSA)_Data_Lifecycle_Model.md -------------------------------------------------------------------------------- /Cloud_Security_Resources/NIST_Cloud_Architecture.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Cloud_Security_Resources/NIST_Cloud_Architecture.md -------------------------------------------------------------------------------- /Cloud_Security_Resources/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Cloud_Security_Resources/README.md -------------------------------------------------------------------------------- /Documentation/Buffer_Overflow/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Documentation/Buffer_Overflow/README.md -------------------------------------------------------------------------------- /Documentation/Business_Continuity_Business_Disaster_Recovery.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Documentation/Business_Continuity_Business_Disaster_Recovery.md -------------------------------------------------------------------------------- /Documentation/Capability_Maturity_Model_Integration_(CMMI).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Documentation/Capability_Maturity_Model_Integration_(CMMI).md -------------------------------------------------------------------------------- /Documentation/DevSecOps_Building_Secure_Software_at_Speed.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Documentation/DevSecOps_Building_Secure_Software_at_Speed.md -------------------------------------------------------------------------------- /Documentation/Hunting/Threat_hunting_network_data.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Documentation/Hunting/Threat_hunting_network_data.md -------------------------------------------------------------------------------- /Documentation/IT_Security_Awareness_Comprehensive_Program_Organizations.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Documentation/IT_Security_Awareness_Comprehensive_Program_Organizations.md -------------------------------------------------------------------------------- /Documentation/Implementing_Four_Disciplines_Cybersecurity_Architecture_Practice.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Documentation/Implementing_Four_Disciplines_Cybersecurity_Architecture_Practice.md -------------------------------------------------------------------------------- /Documentation/LSM_comparison.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Documentation/LSM_comparison.md -------------------------------------------------------------------------------- /Documentation/Living_off_the_Land.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Documentation/Living_off_the_Land.md -------------------------------------------------------------------------------- /Documentation/MITRE_ATT&CK.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Documentation/MITRE_ATT&CK.md -------------------------------------------------------------------------------- /Documentation/NIST_Computer_Security_Incident_Handling_Guide.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Documentation/NIST_Computer_Security_Incident_Handling_Guide.md -------------------------------------------------------------------------------- /Documentation/NIST_Defense_in_depth.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Documentation/NIST_Defense_in_depth.md -------------------------------------------------------------------------------- /Documentation/Protect_Enterprise_4_Core_Disciplines_Cybersecurity_Architecture.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Documentation/Protect_Enterprise_4_Core_Disciplines_Cybersecurity_Architecture.md -------------------------------------------------------------------------------- /Documentation/Security_Architecture_for_Companies.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Documentation/Security_Architecture_for_Companies.md -------------------------------------------------------------------------------- /Documentation/Software_Bill_of_Materials_SBOM.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Documentation/Software_Bill_of_Materials_SBOM.md -------------------------------------------------------------------------------- /Documentation/Terms_Vulnerability_Analysis.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Documentation/Terms_Vulnerability_Analysis.md -------------------------------------------------------------------------------- /Documentation/The_Process_of_Monitoring_in_Cybersecurity.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Documentation/The_Process_of_Monitoring_in_Cybersecurity.md -------------------------------------------------------------------------------- /Documentation/Threat_Management_by_Microsoft_STRIDE.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Documentation/Threat_Management_by_Microsoft_STRIDE.md -------------------------------------------------------------------------------- /Documentation/Zero_Trust_Architecture.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Documentation/Zero_Trust_Architecture.md -------------------------------------------------------------------------------- /Documentation/devsecops.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Documentation/devsecops.md -------------------------------------------------------------------------------- /Encryption/Cryptographic_algorithms.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Encryption/Cryptographic_algorithms.md -------------------------------------------------------------------------------- /Encryption/cert_openssl.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Encryption/cert_openssl.md -------------------------------------------------------------------------------- /Encryption/crypto_frameworks.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Encryption/crypto_frameworks.md -------------------------------------------------------------------------------- /Encryption/gpg_how_to.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Encryption/gpg_how_to.md -------------------------------------------------------------------------------- /Ethical_Hacking/Definition.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Ethical_Hacking/Definition.md -------------------------------------------------------------------------------- /Ethical_Hacking/The_process_of_the_ethical_hacker/01_Planning_and_Reconnaissance/Intelligence_Gathering.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Ethical_Hacking/The_process_of_the_ethical_hacker/01_Planning_and_Reconnaissance/Intelligence_Gathering.md -------------------------------------------------------------------------------- /Ethical_Hacking/The_process_of_the_ethical_hacker/01_Planning_and_Reconnaissance/Intro_to_nuclei.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Ethical_Hacking/The_process_of_the_ethical_hacker/01_Planning_and_Reconnaissance/Intro_to_nuclei.md -------------------------------------------------------------------------------- /Ethical_Hacking/The_process_of_the_ethical_hacker/01_Planning_and_Reconnaissance/OSINT.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Ethical_Hacking/The_process_of_the_ethical_hacker/01_Planning_and_Reconnaissance/OSINT.md -------------------------------------------------------------------------------- /Ethical_Hacking/The_process_of_the_ethical_hacker/01_Planning_and_Reconnaissance/Reconnaissance.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Ethical_Hacking/The_process_of_the_ethical_hacker/01_Planning_and_Reconnaissance/Reconnaissance.md -------------------------------------------------------------------------------- /Ethical_Hacking/The_process_of_the_ethical_hacker/01_Planning_and_Reconnaissance/Stealth_nmap.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Ethical_Hacking/The_process_of_the_ethical_hacker/01_Planning_and_Reconnaissance/Stealth_nmap.md -------------------------------------------------------------------------------- /Ethical_Hacking/The_process_of_the_ethical_hacker/01_Planning_and_Reconnaissance/Webapp_reconnaissance.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Ethical_Hacking/The_process_of_the_ethical_hacker/01_Planning_and_Reconnaissance/Webapp_reconnaissance.md -------------------------------------------------------------------------------- /Ethical_Hacking/The_process_of_the_ethical_hacker/02_Scanning_and_Enumeration/Kali_autopilot.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Ethical_Hacking/The_process_of_the_ethical_hacker/02_Scanning_and_Enumeration/Kali_autopilot.md -------------------------------------------------------------------------------- /Ethical_Hacking/The_process_of_the_ethical_hacker/02_Scanning_and_Enumeration/SMB_enumeration_tips.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Ethical_Hacking/The_process_of_the_ethical_hacker/02_Scanning_and_Enumeration/SMB_enumeration_tips.md -------------------------------------------------------------------------------- /Ethical_Hacking/The_process_of_the_ethical_hacker/02_Scanning_and_Enumeration/Simple_scan_automation_with_python.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Ethical_Hacking/The_process_of_the_ethical_hacker/02_Scanning_and_Enumeration/Simple_scan_automation_with_python.md -------------------------------------------------------------------------------- /Ethical_Hacking/The_process_of_the_ethical_hacker/02_Scanning_and_Enumeration/ldap_enumeration.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Ethical_Hacking/The_process_of_the_ethical_hacker/02_Scanning_and_Enumeration/ldap_enumeration.md -------------------------------------------------------------------------------- /Ethical_Hacking/The_process_of_the_ethical_hacker/03_Threat_Modelling/Threat_Modelling.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Ethical_Hacking/The_process_of_the_ethical_hacker/03_Threat_Modelling/Threat_Modelling.md -------------------------------------------------------------------------------- /Ethical_Hacking/The_process_of_the_ethical_hacker/04_Vulnerability_Analysis/Vulnerability_Analysis.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Ethical_Hacking/The_process_of_the_ethical_hacker/04_Vulnerability_Analysis/Vulnerability_Analysis.md -------------------------------------------------------------------------------- /Ethical_Hacking/The_process_of_the_ethical_hacker/05_Exploitation/Exploitation.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Ethical_Hacking/The_process_of_the_ethical_hacker/05_Exploitation/Exploitation.md -------------------------------------------------------------------------------- /Ethical_Hacking/The_process_of_the_ethical_hacker/06_Post_Exploitation/Post_Exploitation.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Ethical_Hacking/The_process_of_the_ethical_hacker/06_Post_Exploitation/Post_Exploitation.md -------------------------------------------------------------------------------- /Ethical_Hacking/The_process_of_the_ethical_hacker/Definition.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Ethical_Hacking/The_process_of_the_ethical_hacker/Definition.md -------------------------------------------------------------------------------- /Fundamentals/Cyber_Kill_Chain.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Fundamentals/Cyber_Kill_Chain.md -------------------------------------------------------------------------------- /Fundamentals/Intro_to_threat_hunting.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Fundamentals/Intro_to_threat_hunting.md -------------------------------------------------------------------------------- /Fundamentals/Linux_commands.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Fundamentals/Linux_commands.md -------------------------------------------------------------------------------- /Fundamentals/Metasploit_terminology_commands.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Fundamentals/Metasploit_terminology_commands.md -------------------------------------------------------------------------------- /Fundamentals/PowerShell_commands.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Fundamentals/PowerShell_commands.md -------------------------------------------------------------------------------- /Fundamentals/Python.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Fundamentals/Python.md -------------------------------------------------------------------------------- /Fundamentals/Securing_code_and_applications.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Fundamentals/Securing_code_and_applications.md -------------------------------------------------------------------------------- /Fundamentals/Social_engineering_countermeasures.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Fundamentals/Social_engineering_countermeasures.md -------------------------------------------------------------------------------- /Fundamentals/Understanding_information_security_controls.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Fundamentals/Understanding_information_security_controls.md -------------------------------------------------------------------------------- /Fundamentals/nmap_tutorial.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Fundamentals/nmap_tutorial.md -------------------------------------------------------------------------------- /Images/01_KA.JPG: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Images/01_KA.JPG -------------------------------------------------------------------------------- /Images/02_KA.JPG: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Images/02_KA.JPG -------------------------------------------------------------------------------- /Images/03_KA.JPG: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Images/03_KA.JPG -------------------------------------------------------------------------------- /Images/04_KA.JPG: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Images/04_KA.JPG -------------------------------------------------------------------------------- /Images/05_KA.JPG: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Images/05_KA.JPG -------------------------------------------------------------------------------- /Images/06_KA.JPG: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Images/06_KA.JPG -------------------------------------------------------------------------------- /Images/CIS-CAT_Config.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Images/CIS-CAT_Config.png -------------------------------------------------------------------------------- /Images/Cyber_Kill_Chain.JPG: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Images/Cyber_Kill_Chain.JPG -------------------------------------------------------------------------------- /Images/Ethical.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Images/Ethical.png -------------------------------------------------------------------------------- /Images/Incident.jpeg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Images/Incident.jpeg -------------------------------------------------------------------------------- /Images/clodsa.jpeg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Images/clodsa.jpeg -------------------------------------------------------------------------------- /Images/lynis.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Images/lynis.png -------------------------------------------------------------------------------- /Images/mitre_ttps.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Images/mitre_ttps.png -------------------------------------------------------------------------------- /Images/nist.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Images/nist.png -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/LICENSE -------------------------------------------------------------------------------- /Links.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Links.md -------------------------------------------------------------------------------- /OWASP/Comprehensive_Overview.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/OWASP/Comprehensive_Overview.md -------------------------------------------------------------------------------- /Penetration_Testing/Contract_Agreement.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Penetration_Testing/Contract_Agreement.md -------------------------------------------------------------------------------- /Penetration_Testing/Definition.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Penetration_Testing/Definition.md -------------------------------------------------------------------------------- /Penetration_Testing/Example_Penetration_Test_Final_Report.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Penetration_Testing/Example_Penetration_Test_Final_Report.md -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/README.md -------------------------------------------------------------------------------- /Script_examples/Bash/Enumeration.sh: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Script_examples/Bash/Enumeration.sh -------------------------------------------------------------------------------- /Script_examples/Bash/nmap.sh: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Script_examples/Bash/nmap.sh -------------------------------------------------------------------------------- /Script_examples/Links.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Script_examples/Links.md -------------------------------------------------------------------------------- /Script_examples/PowerShell/Post_Exploitation_with_PowerShell_CMD.ps1: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Script_examples/PowerShell/Post_Exploitation_with_PowerShell_CMD.ps1 -------------------------------------------------------------------------------- /Script_examples/PowerShell/System_audit.ps1: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Script_examples/PowerShell/System_audit.ps1 -------------------------------------------------------------------------------- /Script_examples/Python/Creare_virtual_environment.sh: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Script_examples/Python/Creare_virtual_environment.sh -------------------------------------------------------------------------------- /Script_examples/Python/Exploitation/arp_cache_poisoner.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Script_examples/Python/Exploitation/arp_cache_poisoner.py -------------------------------------------------------------------------------- /Script_examples/Python/Exploitation/arp_cache_poisoner_simple.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Script_examples/Python/Exploitation/arp_cache_poisoner_simple.py -------------------------------------------------------------------------------- /Script_examples/Python/Exploitation/cookie_stealer.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Script_examples/Python/Exploitation/cookie_stealer.py -------------------------------------------------------------------------------- /Script_examples/Python/Exploitation/dll_injection_example.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Script_examples/Python/Exploitation/dll_injection_example.py -------------------------------------------------------------------------------- /Script_examples/Python/Exploitation/python_cool_tricks.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Script_examples/Python/Exploitation/python_cool_tricks.md -------------------------------------------------------------------------------- /Script_examples/Python/Web_App_Pentesting/How_to.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Script_examples/Python/Web_App_Pentesting/How_to.md -------------------------------------------------------------------------------- /Script_examples/Python/Web_App_Pentesting/docker-compose.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Script_examples/Python/Web_App_Pentesting/docker-compose.yml -------------------------------------------------------------------------------- /Script_examples/Python/Web_App_Pentesting/requirements.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Script_examples/Python/Web_App_Pentesting/requirements.txt -------------------------------------------------------------------------------- /Script_examples/Python/Web_App_Pentesting/web_app_pen_testing.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Script_examples/Python/Web_App_Pentesting/web_app_pen_testing.py -------------------------------------------------------------------------------- /Security_Configuration_Assessment/BIOS_best_practices.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Security_Configuration_Assessment/BIOS_best_practices.md -------------------------------------------------------------------------------- /Security_Configuration_Assessment/CIS-CAT_Lite.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Security_Configuration_Assessment/CIS-CAT_Lite.md -------------------------------------------------------------------------------- /Security_Configuration_Assessment/IT_Security_Assessments.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Security_Configuration_Assessment/IT_Security_Assessments.md -------------------------------------------------------------------------------- /Security_Configuration_Assessment/Lynis.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Security_Configuration_Assessment/Lynis.md -------------------------------------------------------------------------------- /Security_Configuration_Assessment/Selinux_Rocky_Linux_lab.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Security_Configuration_Assessment/Selinux_Rocky_Linux_lab.md -------------------------------------------------------------------------------- /Security_Configuration_Assessment/Understanding_SELinux.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Security_Configuration_Assessment/Understanding_SELinux.md -------------------------------------------------------------------------------- /Security_Configuration_Assessment/WLAN-Hacking_countermeasure.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Security_Configuration_Assessment/WLAN-Hacking_countermeasure.md -------------------------------------------------------------------------------- /Security_Configuration_Assessment/iptables_nftables_UFW_and_firewalld.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Security_Configuration_Assessment/iptables_nftables_UFW_and_firewalld.md -------------------------------------------------------------------------------- /Security_Configuration_Assessment/port_knocking_and_spa.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tomwechsler/Ethical_Hacking_and_Penetration_Testing/HEAD/Security_Configuration_Assessment/port_knocking_and_spa.md --------------------------------------------------------------------------------