Hacker's Rest
A collection of notes for Penetration Testers and Ethical Hackers. My journey to OSCP and beyond.
Last updated
A collection of notes for Penetration Testers and Ethical Hackers. My journey to OSCP and beyond.
Last updated
These are my publicly accessible notes from various sources for penetration testing, red-teaming, OSCP, Capture the Flag (CTF) challenges, and my Vulnhub/ Hack the Box machine write-ups.
Warning - These notes are largely unformatted right now. They are based on my way of learning things - by reading, doing, studying, exploring, and taking notes. Cleaning up and formatting comes later.
Do not assume anything from these notes.
Do not expect the notes to be exhaustive, or to cover the techniques or the output they produce in full.
Expect mistakes in the notes.
Feel free to ask questions!
Always consult additional resources. If possible I will try to link to outside resources. If I have shared something of yours and you want credit, please let me know!
If you would like to add to, modify, or improve anything in my notes, PLEASE DO!
If you would like to give suggestions or even commit changes to these pages feel free to head to my GitHub page at:
Create an Issue Request describing your changes/additions.
Fork this repository.
Push some code to your fork.
Come back to this repository and open a pull request.
After reviewing your changes, I will merge your pull request to the master repository.
Make sure to update your Issue Request so that I can credit you! Thank you so much!
Feel free to also open an issue with any questions, help wanted, or requests! Throughout these notes I have put TODO:
notes that indicate that I know a certain section needs work. Focus on these if you can!
The following sub-pages of these notes will explore some of the common offensive and defensive security techniques including gaining shells, code execution, lateral movement, persistence, scripting, tools and much more. I also cover techniques for dealing with CTF-type challenges such as cryptography, reverse engineering, steganography and more.
Hack Responsibly.
Always ensure you have explicit permission to access any computer system before using any of the techniques contained in these documents. You accept full responsibility for your actions by applying any knowledge gained here.
See my list of outside sources!
If you like this content and would like to see more, please consider buying me a coffee!