Sasori
Home
Skills
Projects & Labs
Certifications
Write-ups
Contact
Back to Write-ups
Academy
Link to solution
File Inclusion
Metasploit
Stack-Based Buffer Overflows on Windows x86
Footprinting
Information Gathering - Web Edition
Setting up
Attacking Common Services
Linux Fundamentals
Password Attacks
Bug Bounty Hunting Process
Introduction to Red Teaming AI
Linux Privilege Escalation
Cross-Site Scripting (XSS)
Windows Privilege Escalation
Command Injections
SQLMap Essentials
Web Attacks
Introduction to Active Directory
Active Directory Enumeration & Attacks
Login Brute ForcingĀ
Documentation & Reporting
File Upload Attacks
Introduction to Digital Forensics
Introduction to Networking
Network Foundations
Intro to Network Traffic Analysis
Intermediate Network Traffic Analysis
Pivoting, Tunneling, and Port Forwarding
Server-Side Attacks
Introduction to Information Security
Attacking Common Applications