Resources

Initial Access

Execution

Persistence

Privilege Escalation

User Account Control Bypass

Escalation

Defense Evasion

Credential Access

Discovery

Lateral Movement

Collection

Exfiltration

Command and Control

Domain Fronting

Connection Proxy

Web Services

Application Layer Protocol

Infrastructure

Embedded and Peripheral Devices Hacking

Misc

RedTeam Gadgets

Network Implants

Ebooks

Training ( Free )

Certification