Kiosec's repositories
Linux-Exploitation
Audit and pentest methodologies for Linux including internal enumeration, privesc, lateral movement, etc.
Windows-Exploitation
Audit and pentest methodologies for Windows including internal enumeration, privesc, lateral movement, etc.
AD-Exploitation
Audit and pentest methodologies for Active Directory including internal enumeration, privesc, lateral movement, etc.
Web-Exploitation
Tips and methodologies to pentest the most common web services
External-Enumeration
External enumeration methodology for external pentest
Tranfert-Methods
Common file transfert methods
Azure-Exploitation
Audit and pentest methodologies including enumeration, privesc, lateral movement, etc.
Cloud-security
Audit and pentest methodologies for cloud environments including enumeration, privesc, lateral movement, etc.
Database-Exploitation
Pentest tips on databases