Welcome to the Resources section — a growing archive of practical material I’ve used in my learning journey. This includes:

  • Tools, Walkthroughs, Tutorials & Scripts for Offensive and Defensive security
  • Mind maps to visualize techniques and attack paths
  • Personal logs that document my progress, attempts, and lessons learned

Basic Pentesting

1. Network Enumeration with Nmap

This focused tutorial introduces Nmap as a core network reconnaissance tool used for host discovery and service enumeration. It covers essential scan types, common flags, and practical techniques for interpreting results in real-world environments, useful for both attackers performing reconnaissance and defenders validating network exposure.

📘 This Tutorial Covers:

  1. Nmap Basics & Scan Types
  2. Host Discovery & Port Scanning
  3. Service and Version Enumeration
  4. Interpreting Results & Defensive Considerations

👉🏻 Click Here : Nmap


Windows Active Directory Exploitation

1. BloodHound Series(/Resources/AD-BloodHound)

This multi-part series dives into how BloodHound reveals privilege relationships in Active Directory environments. It covers enumeration methods, exploitation of misconfigurations, and actionable defense strategies — designed for both attackers mapping paths to Domain Admin and defenders tightening privilege boundaries.

📘 This Series Covers:

  1. Enumerating AD with BloodHound
  2. Attacking AD using Privilege Paths
  3. Detecting and Mitigating BloodHound Activity

👉🏻 Click Here : AD-BloodHound


More categories and tools will be added as I continue exploring and documenting new topics.

2 items under this folder.