Welcome to the Resources section — a growing archive of practical material I’ve used in my learning journey. This includes:
- Tools, Walkthroughs, Tutorials & Scripts for Offensive and Defensive security
- Mind maps to visualize techniques and attack paths
- Personal logs that document my progress, attempts, and lessons learned
Basic Pentesting
1. Network Enumeration with Nmap
This focused tutorial introduces Nmap as a core network reconnaissance tool used for host discovery and service enumeration. It covers essential scan types, common flags, and practical techniques for interpreting results in real-world environments, useful for both attackers performing reconnaissance and defenders validating network exposure.
📘 This Tutorial Covers:
- Nmap Basics & Scan Types
- Host Discovery & Port Scanning
- Service and Version Enumeration
- Interpreting Results & Defensive Considerations
👉🏻 Click Here : Nmap
Windows Active Directory Exploitation
1. BloodHound Series(/Resources/AD-BloodHound)
This multi-part series dives into how BloodHound reveals privilege relationships in Active Directory environments. It covers enumeration methods, exploitation of misconfigurations, and actionable defense strategies — designed for both attackers mapping paths to Domain Admin and defenders tightening privilege boundaries.
📘 This Series Covers:
- Enumerating AD with BloodHound
- Attacking AD using Privilege Paths
- Detecting and Mitigating BloodHound Activity
👉🏻 Click Here : AD-BloodHound
More categories and tools will be added as I continue exploring and documenting new topics.