Browse Source


root 5 years ago
3 changed files with 222 additions and 139 deletions
  1. +39
  2. +113
  3. +70

+ 39
- 34
Draft/ATT&CK-Stuff/Windows/ View File

@ -1,8 +1,8 @@
## Account Discovery
### Account Discovery
[Account Discovery - ATT&CK](
* Adversaries may attempt to get a listing of local system or domain accounts.
* Example commands that can acquire this information are net user, net group <groupname>, and net localgroup <groupname> using the Net utility or through use of dsquery. If adversaries attempt to identify the primary user, currently logged in user, or set of users that commonly uses a system, System Owner/User Discovery may apply.
@ -21,9 +21,9 @@
## Application Window Discovery
### Application Window Discovery
[Application Window Discovery - ATT&CK](
* Adversaries may attempt to get a listing of open application windows. Window listings could convey information about how the system is used or give context to information collected by a keylogger.
@ -39,9 +39,9 @@
## File and Directory Discovery
### File and Directory Discovery
[File and Directory Discovery - ATT&CK](
[Microsoft DOS tree command](
@ -51,8 +51,11 @@
* Displays a list of a directory's files and subdirectories. If used without parameters, dir displays the disk's volume label and serial number, followed by a list of directories and files on the disk (including their names and the date and time each was last modified). For files, dir displays the name extension and the size in bytes. Dir also displays the total number of files and directories listed, their cumulative size, and the free space (in bytes) remaining on the disk.
## Network Service Scanning
### Network Service Scanning
[Network Service Scanning - ATT&CK](
@ -60,6 +63,8 @@
[ms15-034.nse Script](
#### DNS:
@ -243,9 +248,9 @@ EIGRP and OSPF).
## Network Share Discovery
## Network Share Discovery
[Network Share Discovery - ATT&CK](Network Share Discovery)
@ -284,9 +289,9 @@ get-WmiObject -list | where {$ -match “Printer”}
## Peripheral Device Discovery
## Peripheral Device Discovery
[Peripheral Device Discovery - ATT&CK](
* Adversaries may attempt to gather information about attached peripheral devices and components connected to a computer system. The information may be used to enhance their awareness of the system and network environment or may be used for further actions.
@ -303,9 +308,9 @@ get-WmiObject -list | where {$ -match “Printer”}
## Permission Groups Discovery
## Permission Groups Discovery
[Permission Groups Discovery - ATT&CK](
* Adversaries may attempt to find local system or domain-level groups and permissions settings.
* Examples of commands that can list groups are net group /domain and net localgroup using the Net utility.
@ -324,9 +329,9 @@ get-WmiObject -list | where {$ -match “Printer”}
## Process Discovery
## Process Discovery
[Process Discovery - ATT&CK](
[Get-Process - msdn](
@ -345,9 +350,9 @@ get-WmiObject -list | where {$ -match “Printer”}
## Query Registry
## Query Registry
[Query Registry - ATT&CK](
* Adversaries may interact with the Windows Registry to gather information about the system, configuration, and installed software. The Registry contains a significant amount of information about the operating system, configuration, software, and security.1 Some of the information may help adversaries to further their operation within a network.
@ -370,9 +375,9 @@ get-WmiObject -list | where {$ -match “Printer”}
## Remote System Discovery
## Remote System Discovery
[Remote System Discovery](
* Adversaries will likely attempt to get a listing of other systems by IP address, hostname, or other logical identifier on a network that may be used for Lateral Movement from the current system. Functionality could exist within remote access tools to enable this, but utilities available on the operating system could also be used.
@ -388,16 +393,18 @@ Check .hosts file for mappings ; C:\Windows\System32\Drivers\etc\hosts
* Performs local host and/or domain enumeration for situational awareness
[Network Situational Awareness with Empire](
## Security Software Discovery
[Security Software Discovery - ATT&CK](
* Adversaries may attempt to get a listing of security software, configurations, defensive tools, and sensors that are installed on the system. This may include things such as local firewall rules, anti-virus, and virtualization. These checks may be built into early-stage remote access tools.
[Use Powershell to quickly find installed Software](
[Netsh AdvFirewall Firewall Commands - technet](
* netsh advfirewall monitor show firewall rule name=all dir=in
@ -418,9 +425,9 @@ Check .hosts file for mappings ; C:\Windows\System32\Drivers\etc\hosts
## System Information Discovery
## System Information Discovery
[System Information Discovery - ATT&CK](
* An adversary may attempt to get detailed information about the operating system and hardware, including version, patches, hotfixes, service packs, and architecture.
@ -445,9 +452,9 @@ Check .hosts file for mappings ; C:\Windows\System32\Drivers\etc\hosts
## System Network Configuration Discovery
## System Network Configuration Discovery
[System Network Configuration Discovery - ATT&CK](
* Adversaries will likely look for details about the network configuration and settings of systems they access or through information discovery of remote systems. Several operating system administration utilities exist that can be used to gather this information. Examples include Arp, ipconfig/ifconfig, nbtstat, and route.
@ -477,9 +484,9 @@ Check .hosts file for mappings ; C:\Windows\System32\Drivers\etc\hosts
## System Network Connections Discovery
## System Network Connections Discovery
[System Network Connections Discovery - ATT&CK](
* Adversaries may attempt to get a listing of network connections to or from the compromised system they are currently accessing or from remote systems by querying for information over the network.
@ -494,9 +501,9 @@ Check .hosts file for mappings ; C:\Windows\System32\Drivers\etc\hosts
## System Owner/User Discovery
## System Owner/User Discovery
[System Owner/User Discovery - ATT&CK](
* Adversaries may attempt to identify the primary user, currently logged in user, set of users that commonly uses a system, or whether a user is actively using the system. They may do this, for example, by retrieving account usernames or by using Credential Dumping. The information may be collected in a number of different ways using other Discovery techniques, because user and username details are prevalent throughout a system and include running process ownership, file/directory ownership, session information, and system logs.
@ -508,9 +515,8 @@ Check .hosts file for mappings ; C:\Windows\System32\Drivers\etc\hosts
## System Service Discovery
## System Service Discovery
[System Service Discovery - ATT&CK](
* Adversaries may try to get information about registered services. Commands that may obtain information about services using operating system utilities are "sc," "tasklist /svc" using Tasklist, and "net start" using Net, but adversaries may also use other tools as well.
@ -526,9 +532,8 @@ Check .hosts file for mappings ; C:\Windows\System32\Drivers\etc\hosts
## System Time Discovery
## System Time Discovery
[System Time Discovery - ATT&CK](
* The system time is set and stored by the Windows Time Service within a domain to maintain time synchronization between systems and services in an enterprise network. An adversary may gather the system time and/or time zone from a local or remote system. This information may be gathered in a number of ways, such as with Net on Windows by performing net time \\hostname to gather the system time on a remote system. The victim's time zone may also be inferred from the current system time or gathered by using w32tm /tz. The information could be useful for performing other techniques, such as executing a file with a Scheduled Task, or to discover locality information based on time zone to assist in victim targeting.

+ 113
- 53
Draft/ATT&CK-Stuff/Windows/ View File

@ -1,16 +1,8 @@
External Remote Services
System Firmware
Valid Accounts
Web Shells
# Windows Persistence
## Accessibility Features
### Accessibility Features
[Accessibility Features - ATT&CK](
* Replace the windows accessibilty applications with desired binary to be ran instead. Sticky-Keys backdoor.
@ -23,9 +15,9 @@ Unfilled:
[Privilege Escalation via "Sticky" Keys](
## AppInit DLLs
### AppInit DLLs
[AppInit DLLs - ATT&CK](
[Working with the AppInit_DLLs registry value](
@ -37,9 +29,9 @@ Unfilled:
[AppInit DLLs and Secure Boot](
## Application Shimming
### Application Shimming
[Application Shimming - ATT&CK](
[Understanding Shims](
@ -59,9 +51,15 @@ Unfilled:
[Windows 0wn3d By Default - Mark Baggett - Derbycon 2013](
* Description: “In this talk we will discuss API Hooking, Process Execution Redirection, Hiding Registry keys and hiding directories on the hard drive. We must be talking about rootkits, right? Well yes, but not in the way you think. The Windows family of operating systems has all of these capabilities built right in! Using nothing but tools and techniques distributed and documented by Microsoft we can implement all of these rootkit functions. During this exciting talk I will present new attacks against Windows operating system that provide rootkit like functionality with built-in OS tools. In session, we’ll demonstrate how to leverage the Microsoft Application Compatibility Toolkit to help hide an attacker’s presence on your system. The Application Compatibility Toolkit allows you to create application shims that intercept and redirect calls from applications to the operating system. This native rootkit like capability is intended to make the Windows operating system compatible with very old or poorly written applications. Do DEP, ASLR, UAC, and Windows Resource Protection, File system ACLS and other modern OS security measures get it your way? No problem. Turn them off! Do you want to hide files and registry keys and from the user? The Application Compatibility toolkit allows you to create a virtual world for any application and hide resources from view. If someone inspects the registry with regedit they will see exactly what the attacker wants them to see and not what the OS sees when it launches programs. Did they patch your target so your exploit doesn’t work? Guess what, making applications backwards compatible is what this tool is intended to do. Make your favorite applications “old exploit compatible” insuring you can re-exploit the target with this awesome untapped resource. Everything you need to subvert windows applications is built right into the windows kernel. Come learn how to use the application compatibility toolkit to tap this great resource.”
[Shackles, Shims, and Shivs - Understanding Bypass Techniques](
## Authentication Package
### Authentication Package
[Authentication Package - ATT&CK](
* Adversaries can use the autostart mechanism provided by LSA Authentication Packages for persistence by placing a reference to a binary in the Windows Registry location HKLM\SYSTEM\CurrentControlSet\Control\Lsa\ with the key value of "Authentication Packages"=<target binary>. The binary will then be executed by the system when the authentication packages are loaded. (from
@ -69,17 +67,17 @@ Unfilled:
* Authentication packages are contained in dynamic-link libraries. The Local Security Authority (LSA) loads authentication packages by using configuration information stored in the registry. Loaded at OS start.
## Bootkit
### Bootkit
[Bootkit - ATT&CK](
* A bootkit is a malware variant that modifies the boot sectors of a hard drive, including the Master Boot Record (MBR) and Volume Boot Record (VBR).
* Not going to list much here. If you're doing this, you don't need this.
## Change Default File Association
### Change Default File Association
[Change Default File Association - ATT&CK](
* When a file is opened, the default program used to open the file (also called the file association or handler) is checked. File association selections are stored in the Windows Registry and can be edited by users, administrators, or programs that have Registry access.
@ -88,40 +86,50 @@ Unfilled:
* Win 7,8,10: Open Control Panel > Control Panel Home > Default Programs > Set Associations
## Component Firmware
[Component Firmware - ATT&CK](
### Component Firmware
[Component Firmware - ATT&CK](
## Component Object Model Hijacking
## Component Object Model Hijacking
[Component Object Model Hijacking - ATT&CK](
[The Component Object Model](
[COM Object hijacking: the discreet way of persistence](
[Userland Persistence with Scheduled Tasks and COM Handler Hijacking](
## DLL Search Order Hijacking
### DLL Search Order Hijacking
[DLL Search Order Hijacking - ATT&CK](
[Dynamic-Link Library Search Order](
## External Remote Services
### External Remote Services
[External Remote Services - ATT&CK](
* VPN/RDP/Citrix Hijacking
## File System Permissions Weakness
### File System Permissions Weakness
[File System Permissions Weakness - ATT&CK](
* Processes may automatically execute specific binaries as part of their functionality or to perform other actions. If the permissions on the file system directory containing a target binary, or permissions on the binary itself, are improperly set, then the target binary may be overwritten with another binary using user-level permissions and executed by the original process. If the original process and thread are running under a higher permissions level, then the replaced binary will also execute under higher-level permissions, which could include SYSTEM.
@ -129,8 +137,11 @@ Unfilled:
## Hidden Files and Directories
## Hidden Files and Directories
[Hidden Files and Directories - ATT&CK](
* Users can mark specific files as hidden by using the attrib.exe binary. Simply do attrib +h filename to mark a file or folder as hidden. Similarly, the “+s” marks a file as a system file and the “+r” flag marks the file as read only. Like most windows binaries, the attrib.exe binary provides the ability to apply these changes recursively “/S”.
@ -138,16 +149,23 @@ Unfilled:
## Hypervisor
### Hypervisor
[Hypervisor - ATT&CK](
[An Introduction to Hardware-Assisted Virtual Machine (HVM) - pdf](
## Local Port Monitor
### Local Port Monitor
[Local Port Monitor - ATT&CK](
* A port monitor can be set through the AddMonitor API call to set a DLL to be loaded at startup. This DLL can be located in C:\Windows\System32 and will be loaded by the print spooler service, spoolsv.exe, on boot. Alternatively, an arbitrary DLL can be loaded if permissions allow writing a fully-qualified pathname for that DLL to HKLM\SYSTEM\CurrentControlSet\Control\Print\Monitors. The spoolsv.exe process also runs under SYSTEM level permissions.
@ -155,8 +173,10 @@ Unfilled:
## Logon Scripts
## Logon Scripts
[Logon Scripts - ATT&CK](
* Windows allows logon scripts to be run whenever a specific user or group of users log into a system.
@ -166,8 +186,11 @@ Unfilled:
## Modify Existing Service
### Modify Existing Service
[Modify Existing Service - ATT&CK](
* Windows service configuration information, including the file path to the service's executable, is stored in the Registry. Service configurations can be modified using utilities such as sc.exe and Reg. Adversaries can modify an existing service to persist malware on a system by using system utilities or by using custom tools to interact with the Windows API. Use of existing services is a type of Masquerading that may make detection analysis more challenging. Modifying existing services may interrupt their functionality or may enable services that are disabled or otherwise not commonly used.
@ -178,8 +201,10 @@ Unfilled:
## Netsh Helper DLL
### Netsh Helper DLL
[Netsh Helper DLL - ATT&CK](
* Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system. It contains functionality to add helper DLLs for extending functionality of the utility. The paths to registered netsh.exe helper DLLs are entered into the Windows Registry at HKLM\SOFTWARE\Microsoft\Netsh. Adversaries can use netsh.exe with helper DLLs to proxy execution of arbitrary code in a persistent manner when netsh.exe is executed automatically with another Persistence technique or if other persistent software is present on the system that executes netsh.exe as part of its normal functionality. Examples include some VPN software that invoke netsh.exe.
@ -189,8 +214,11 @@ Unfilled:
## New Service
### New Service
[New Service - ATT&CK](
* When operating systems boot up, they can start programs or applications called services that perform background system functions. A service's configuration information, including the file path to the service's executable, is stored in the Windows Registry. Adversaries may install a new service that can be configured to execute at startup by using utilities to interact with services or by directly modifying the Registry. The service name may be disguised by using a name from a related operating system or benign software with Masquerading. Services may be created with administrator privileges but are executed under SYSTEM privileges, so an adversary may also use a service to escalate privileges from administrator to SYSTEM. Adversaries may also directly start services through Service Execution.
@ -198,8 +226,13 @@ Unfilled:
## Office Application Startup
### Office Application Startup
[Office Application Startup - ATT&CK](
* Microsoft Office is a fairly common application suite on Windows-based operating systems within an enterprise network. There are multiple mechanisms that can be used with Office for persistence when an Office-based application is started.
@ -217,9 +250,9 @@ Unfilled:
* Add-ins provide optional commands and features for Microsoft Excel. By default, add-ins are not immediately available in Excel, so you must first install and (in some cases) activate these add-ins so that you can use them.
## Path Interception
### Path Interception
[Path Interception - ATT&CK](
* Path interception occurs when an executable is placed in a specific path so that it is executed by an application instead of the intended target.
* There are multiple distinct weaknesses or misconfigurations that adversaries may take advantage of when performing path interception: unquoted paths, path environment variable misconfigurations, and search order hijacking. The first vulnerability deals with full program paths, while the second and third occur when program paths are not specified. These techniques can be used for persistence if executables are called on a regular basis, as well as privilege escalation if intercepted executables are started by a higher privileged process.
@ -244,6 +277,9 @@ Unfilled:
[The $env:PATH Less Traveled: Subverting Trust with 3rd-Party Applications - obscuresec](
#### Search Order Hijacking
Search order hijacking occurs when an adversary abuses the order in which Windows searches for programs that are not given a path. The search order differs depending on the method that is used to execute the program. However, it is common for Windows to search in the directory of the initiating program before searching through the Windows system directory. An adversary who finds a program vulnerable to search order hijacking (i.e., a program that does not specify the path to an executable) may take advantage of this vulnerability by creating a program named after the improperly specified program and placing it within the initiating program's directory.
@ -258,15 +294,15 @@ Search order hijacking occurs when an adversary abuses the order in which Window
[Environment Property](
## Redundant Access
* Don't just use one backdoor. Use multiple avenues of exfil. Plan ahead and exepct observation/discovery. Prepare backup solutions ready to go in case SHTF.
### Redundant Access
* Don't just use one backdoor. Use multiple avenues of exfil. Plan ahead and exepct observation/discovery. Prepare backup solutions ready to go in case SHTF.
## Registry Run Key/ Start Folder
### Registry Run Key/ Start Folder
[Registry Run Keys / Start Folder - ATT&CK](
* Adding an entry to the "run keys" in the Registry or startup folder will cause the program referenced to be executed when a user logs in. The program will be executed under the context of the user and will have the account's associated permissions level.
@ -277,9 +313,9 @@ Search order hijacking occurs when an adversary abuses the order in which Window
* Here are the links to all the ‘Beyond good ol’ Run key’ posts so far.
## Scheduled Tasks
### Scheduled Tasks
[Scheduled Tasks - ATT&CK](
* Utilities such as at and schtasks, along with the Windows Task Scheduler, can be used to schedule programs or scripts to be executed at a date and time. The account used to create the task must be in the Administrators group on the local system. A task can also be scheduled on a remote system, provided the proper authentication is met to use RPC and file and printer sharing is turned on.
@ -296,9 +332,9 @@ Search order hijacking occurs when an adversary abuses the order in which Window
## Security Support Provider
### Security Support Provider
[Security Support Provider - ATT&CK](
* Windows Security Support Provider (SSP) DLLs are loaded into the Local Security Authority (LSA) process at system start. Once loaded into the LSA, SSP DLLs have access to encrypted and plaintext passwords that are stored in Windows, such as any logged-on user's Domain password or smart card PINs. The SSP configuration is stored in two Registry keys: HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Security Packages and HKLM\SYSTEM\CurrentControlSet\Control\Lsa\OSConfig\Security Packages. An adversary may modify these Registry keys to add new SSPs, which will be loaded the next time the system boots, or when the AddSecurityPackage Windows API function is called.
@ -309,9 +345,9 @@ Search order hijacking occurs when an adversary abuses the order in which Window
[The Security Support Provider Interface - MSDN](
## Service Registry Permissions Weakness
### Service Registry Permissions Weakness
[Service Registry Permissions Weakness - ATT&CK](
* Windows stores local service configuration information in the Registry under HKLM\SYSTEM\CurrentControlSet\Services. The information stored under a service's Registry keys can be manipulated to modify a service's execution parameters through tools such as the service controller, sc.exe, PowerShell, or Reg. Access to Registry keys is controlled through Access Control Lists and permissions.
* If the permissions for users and groups are not properly set and allow access to the Registry keys for a service, then adversaries can change the service binPath/ImagePath to point to a different executable under their control. When the service starts or is restarted, then the adversary-controlled program will execute, allowing the adversary to gain persistence and/or privilege escalation to the account context the service is set to execute under (local/domain account, SYSTEM, LocalService, or NetworkService).
@ -319,30 +355,54 @@ Search order hijacking occurs when an adversary abuses the order in which Window
[Registry Key Security and Access Rights - MSDN](
## Shortcut Modification
### Shortcut Modification
[Shortcut Modification - ATT&CK](
* Shortcuts or symbolic links are ways of referencing other files or programs that will be opened or executed when the shortcut is clicked or executed by a system startup process. Adversaries could use shortcuts to execute their tools for persistence. They may create a new shortcut as a means of indirection that may use Masquerading to look like a legitimate program. Adversaries could also edit the target path or entirely replace an existing shortcut so their tools will be executed instead of the intended legitimate program.
[How to create shortcuts for apps, files, folders and web pages in Windows](
Creates a .lnk file with unicode chars that reverse the file extension and adds a .txt to the end to make it appear as a textfile. Payload is a powershell webdl and execute
* This is a Python port of lnk-parse-1.0, a tool to parse Windows .lnk files.
* Make Windows LNK file with python (pylnk)
* This tool will allow you to generate LNK payloads. Upon rendering or being run, they will exfiltrate data.
* Library and tools to access the Windows Shortcut File (LNK) format
* MS Windows LNK file parser
## System Firmware
### System Firmware
[System Firmware - ATT&CK](
* The BIOS (Basic Input/Output System) and The Unified Extensible Firmware Interface (UEFI) or Extensible Firmware Interface (EFI) are examples of system firmware that operate as the software interface between the operating system and hardware of a computer.
* System firmware like BIOS and (U)EFI underly the functionality of a computer and may be modified by an adversary to perform or assist in malicious activity. Capabilities exist to overwrite the system firmware, which may give sophisticated adversaries a means to install malicious firmware updates as a means of persistence on a system that may be difficult to detect.
## Valid Accounts
[Valid Accounts - ATT&CK](
### Valid Accounts
[Valid Accounts - ATT&CK](
## Web Shell
### Web Shell
[Web Shell - ATT&CK](
* A Web shell is a Web script that is placed on an openly accessible Web server to allow an adversary to use the Web server as a gateway into a network. A Web shell may provide a set of functions to execute or a command-line interface on the system that hosts the Web server.
@ -382,9 +442,9 @@ Search order hijacking occurs when an adversary abuses the order in which Window
[Use PowerShell to Create a Permanent WMI Event to Launch a VBScript](
## Winlogon Helper DLL
## Winlogon Helper DLL
[Winlogon Helper DLL - ATT&CK](
* Winlogon is a part of some Windows versions that performs actions at logon. In Windows systems prior to Windows Vista, a Registry key can be modified that causes Winlogon to load a DLL on startup. Adversaries may take advantage of this feature to load adversarial code at startup for persistence.
* Winlogon is a part of Windows that performs logon actions. In Windows systems prior to Windows Vista, a registry key can be modified that causes Winlogon to load a DLL on startup. Adversaries may take advantage of this feature to load adversarial code at startup.

+ 70
- 52 View File

@ -8,7 +8,7 @@ An Information Security Reference That Doesn't Suck
* List of techinques, tools and tactics to learn from/reference.
* Something like a "Yellow Pages" in the sense of you know something exists, but what was it called....
* End goal: Rich resource of infosec knowledge for anyone to browse through as a jumping off point for various niches OR as a reference/recall method for stuff.
* Something similar to the [MITRE ATT&CK Framework]( (eventually; As in, "I want to do priv esc on OS X, what methods are there?" or, "I'm studying UAFs, is there any good info I can look at without diving deep?" Focused on performing attacks and how they're done vs how attacks are done with a focus on defense - D3f3ns3 Framework?)
* Something oppposite to the [MITRE ATT&CK Framework]( (eventually; As in, "I want to do priv esc on OS X/windows/linux, what methods are there?" or, "I need to do X under Y situation". Focus is on attacks and how (to)/(they) break through defenses, vs focusing on defending against attacks.
* Always accepting more links/stuff. Feel free to contribue or suggest something.
* Little extra something: ALL LINKS LISTED ARE VALID. They will route to their target page or to Internet Archives most recent archive of that page. All links are validated when I pull from github and host on my site using Daux.
@ -22,114 +22,132 @@ An Information Security Reference That Doesn't Suck
##### This page
* This page is terrible. It should not be used to navigate for info unless you like self harm. Use [](]) instead.
* Use [](]) for a somewhat easier look(supports mobile).
* For latest content updates, check here: [Things added since last update](
* This will have all links added to the other pages sorted according to topic, making it easier to see new stuff.
* More content is within the Draft folder. The below is broken(probably).
* All links on this page should work. Last tested 9/3
### Index - Table of Contents
* [Anonymity/OpSec/Privacy]()
#### ATT&CK(Def3nse?) Stuff
* [Windows Collection](
* [Windows Command and Control](
* [Windows Credential Access](
* [Windows Defense Evasion](
* [Windows Discovery](
* [Windows Exection](
* [Windows Exfiltration](
* [Windows Lateral Movement](
* [Windows Persistence](
* [Windows Privilege Escalation](
* [Attacking / Defending iOS]()
* [Building a PenTest Lab]()
* [Basic Security Information]()
#### Normal Categories
* [BIOS/UEFI/Firmware Attacks/Defense]()
* [Anonymity/OpSec/Privacy](
* [Cheat Sheets]()
* [Basic Security Information](
* [CTFs & Wargames]()
* [BIOS/UEFI/Firmware Attacks/Defense](
* [Conference Recordings]()
* [Building a PenTest Lab](
* [Counter Surveillance]()
* [Car hacking](
* [Courses & Training]()
* [Cheat Sheets](
* [Cryptography & Encryption]()
* [CTFs & Wargames](
* [CryptoCurrencies]()
* [Conferences/Recordings](
* [Darknets]()
* [Counter Surveillance](
* [Data Anaylsis & Visualization]()
* [Courses & Training](
* [Disclosure]()
* [Cryptography & Encryption](
* [Disinformation]()
* [CryptoCurrencies](
* [Documentation & Reporting]()
* [Darknets](
* [Embedded Device Security]()
* [Data Anaylsis & Visualization](
* [Exfiltration]()
* [Disclosure](
* [Exploit Development]()
* [Disinformation](
* [Forensics & Incident Response]()
* [Documentation & Reporting](
* [Fuzzing]()
* [Embedded Device Security](
* [Home Security]()
* [Exfiltration](
* [Honeypots]()
* [Exploit Development](
* [Interesting Things & Useful Information]()
* [Forensics & Incident Response](
* [Malware]()
* [Fuzzing & Bug Hunting](
* [Network Attacks & Defense]()
* [Gamma Group Hack Writeup](
* [Open Source Intelligence Gathering - OSINT]()
* [Hacking Team Writeup](
* [Passwords]()
* [Home Security](
* [Programming Stuff]()
* [Honeypots](
* [Privilege Escalation and Post-Exploitation]()
* [Interesting Things & Useful Information](
* [Red Teaming]()
* [Malware](
* [Reverse Engineering]()
* [Network Attacks & Defense](
* [REMATH Reverse Engineering]()
* [Network Security Monitoring & Logging](
* [Rootkits]()
* [Open Source Intelligence Gathering - OSINT](
* [Social Engineering]()
* [Opsec Rant #1 - alpraking](
* [System Internals (Linux/Windows) - NOT THE TOOLSET]()
* [Opsec rant #2 - nachash](
* [Threat Modeling]()
* [Passwords](
* [Threat Hunting]()
* [UI/UX Design]()
* [Web]()
* [Wireless Networks and RF Devices]()
* [Insurance Data Security Model Law]( |
* [NIST Cyber Security Framework 02/12/2014]( |
* [PCI-DSS V3.2](|
* [Phishing](
* [Physical Security](
* [Privilege Escalation and Post-Exploitation](
* [Programming Stuff](
* [Red Teaming](
* [Reverse Engineering](
* [REMATH Reverse Engineering](
* [Rootkits](
* [Social Engineering](
* [System Internals (Linux/Windows) - NOT THE TOOLSET](
* [Threat Modeling](
* [Threat Hunting](
* [UI/UX Design](
* [Web](
* [Wireless Networks and RF Devices](
* [Insurance Data Security Model Law]( |
* [NIST Cyber Security Framework 02/12/2014]( |
* [PCI-DSS V3.2](|