Skip to main content

Attribution Policy

All content published on our site is carefully attributed to its original authors. If you find copy-pasted content without proper sourcing, please let us know so we can rectify the situation. Upon notification, we will take one of the following actions:

  • Remove the offending content
  • Add a link to the original source before the text in question
  • Rewrite the content to include proper attribution and a link to the original source

Additionally, if you are an author whose work has been published on our site without permission, please let us know and we will take immediate action to:

  • Remove any links to your original blog post or other works based on it
  • Delete all related content from our site

We value intellectual property rights and strive to maintain a fair and respectful community. If you have concerns about attribution or copyright infringement, please don't hesitate to contact us.

Image Attributions

Whoami Page | Bee Image | Bee cartoon image designed by Zerinkh at VectorStock.com

Contact Page | Contact Icon | Icon message dialogue box image designed by Mostkingto at VectorStock.com

License Page | License Icon | Letter c water drop logo design image designed by vectorstock at VectorStock.com

Disclaimer Page | Document Icon | 49 letter icons image designed by vectorstock at VectorStock.com

Other Attributions

Website Creation | Docusaurus

Content Attributions

NOTE

Most of the content is based on notes I've taken during courses or from books I have read. I always try my best to give credit where-ever and when-ever it it due, but just like with most knowledge-bases: It's one thing preparing it and putting it together, and a WHOLE other thing, maintaining it.

Docs | COURSE | Certified Ethical Hacker v12 Course

By: EC-Council | CEH Website

Docs | COURSE | PEN-200 | PEN-210 | PEN-300 | SOC-200 | WEB-200 | WEB-300 | EXP-301 | EXP-312

By: OffSec | OffSec Website

Docs | COURSE | Foundational: Linux 101 | Python 101 For Hackers | Python 201 For Hackers

By: TCM Security | TCM Security Website

Docs | COURSE | Red Team: OSINT Fundamentals | Practical Ethical Hacking | Practical Webapp Security and Testing | Linux Privilege Escalation for Beginners | Windows Privilege Escalation for Beginners | Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers

By: TCM Security | TCM Security Website

Docs | COURSE | Blue Team: Practical Windows Forensics

By: TCM Security | TCM Security Website

Docs | COURSE | Certified in Cybersecurity Course

By: ISC2 | ISC2 Website

Docs | COURSE | Cybersecurity Professional

By: Google | Course on Coursera

Docs | COURSE | Red Team Operations with Cobalt Strike

By: Cobalt Strike | Cobalt Strike Website

Docs | COURSE | Complete Wireshark Course For Cybersecurity Beginners - Deep Dive into Wireshark for Security Analysis

By: CWX - Cyberwox Academy | CWX Website

Docs | BOOK: LINUX BASICS FOR HACKERS: Getting Started with Networking, Scripting, and Security in Kali

By: OccupyTheWeb | ISBN-13: 978-1-59327-855-7 | Hackers Arise Website

Docs | BOOK: Learn PowerShell in a Month of Lunches

Authors: James Petty, Travis Plunk, Tyler Leonhardt, Don Jones, Jeffery Hicks | ISBN 9781617296963 | Book Website

Docs | COURSE: SEC599 | Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses

By: SANS | Erik Van Buggenhout, Stephen Sims | SANS Website

Docs | BOOK: RTFM: Red Team Field Manual v2

Authors: Ben Clark, Nick Downer | ISBN: 9781075091834 | The RTFM Website

Docs | BOOK: BTFM: Blue Team Field Manual

Authors: Alan White, Ben Clark | ISBN-13: 978-1541016361 | The RTFM Website

Docs | BOOK: EXTREME PRIVACY: LINUX DEVICES

Author: Michael Bazzell | IntelTechniques Website

Docs | BOOK: EXTREME PRIVACY: MOBILE DEVICES

Author: Michael Bazzell | IntelTechniques Website

Docs | BOOK: OSINT TECHNIQUES: RESOURCES FOR UNCOVERING ONLINE INFORMATION

Author: Michael Bazzell | IntelTechniques Website

Docs | BOOK: Computer Networking | A Top-Down Approach (8th edition)

Author: Jim Kurose and Keith Ross | The Author's Website

Blog | TryHackMe

Blog | HackTheBox

Blog | OverTheWire

Disclaimer | HackTricks

License | HackTricks