Welcome to the Resources section — a growing archive of practical material I’ve used in my learning journey. This includes:
- Tools, Walkthroughs, Tutorials & Scripts for Offensive and Defensive security
- Mind maps to visualize techniques and attack paths
- Personal logs that document my progress, attempts, and lessons learned
Basic Pentesting
1. Network Enumeration with Nmap
This focused tutorial introduces Nmap as a core network reconnaissance tool used for host discovery and service enumeration. It covers essential scan types, common flags, and practical techniques for interpreting results in real-world environments, useful for both attackers performing reconnaissance and defenders validating network exposure.
📘 This Tutorial Covers:
- Nmap Basics & Scan Types
- Host Discovery & Port Scanning
- Service and Version Enumeration
- Interpreting Results & Defensive Considerations
👉🏻 Click Here : Nmap
2. Catching 2 Million Attacks with a T-Pot Honeypot
This tutorial will take you through the process of setting up a distributed honeypot network using the T-Pot framework. The tutorial will cover the entire process from creating a cloud virtual machine to setting it live on the open internet. The purpose of this tutorial is to illustrate the current state of internet security threats by demonstrating the capture of over two million attacks in one month
📘 This Tutorial Covers:
- Infrastructure Setup & T-Pot Installation
- Dashboard Navigation (Kibana, Elasticvue, Cyberchef, and Spiderfoot)
- Threat Intelligence Analysis (Live Attack Maps and Triggered Services)
- Investigating Attacker Behaviors, Brute-Force Credentials, and IP Reputations
👉🏻 Click Here : Tpot-Honeypot
Windows Active Directory Exploitation
1. BloodHound Series(/Resources/AD-BloodHound)
This multi-part series dives into how BloodHound reveals privilege relationships in Active Directory environments. It covers enumeration methods, exploitation of misconfigurations, and actionable defense strategies — designed for both attackers mapping paths to Domain Admin and defenders tightening privilege boundaries.
📘 This Series Covers:
- Enumerating AD with BloodHound
- Attacking AD using Privilege Paths
- Detecting and Mitigating BloodHound Activity
👉🏻 Click Here : AD-BloodHound
More categories and tools will be added as I continue exploring and documenting new topics.