Security
Infrastructure
Development
Playbooks
Cheatsheets
Blue_team
Analyze Microsoft Office Files
Wireshark
Enumeration
Directory Traversal
Network Discovery
Nmap
Subdomains
Web Application
Exploitation
Account Takeover
Active Directory
Bruteforcing
Cobalt Strike
Command Injection
Crlf Injection
Docker
Graphql Injection
Insecure Deserialization
Insecure Direct Object References
Latex Injection
Ldap Injection
Leaked Api Key
No Sql Injection
Oauth
Saml Injection
Server Side Request Forgery
Server Side Template Injection
Sql
Injection
Cassandra
Hql
Mssql
Mysql
Oraclesql
Postgresql
Sqlite
Mssql Server
Sql Injection
Web
Cors
Csrf Injection
Csv Injection
File Upload
Http Parameter Pollution
Jwt
Open Redirect
Springboot
Tabnabbing
Type Juggeling
Web Cache
Web Sockets
Xss Injection
Wifi
Xpath Injection
Xslt Injection
Xxe Injection
General
Aws
Aws S3
Azure
Bash
Hashes And Cyphers
Kubernetes
Post_exploitation
Linux
Persistance
Privilege Escalation
Network Pivoting
Windows
Download And Execute
Koadic
Mimikatz
Using Credentials
Win Privilege Escalation
Reconnaissance
Google Dorks
Insecure Source Management
Phishing
Shodan
Cheatsheets
This is more-or-less curated content from hacktricks, projects on github and my own experience.