Skip to content
ZaoDocs
Search
Ctrl
K
Cancel
GitHub
Select theme
Dark
Light
Auto
Home
ASIR Notes
ISO
1. Intro to OSs
2. Intro to Virtualization
FHW
1. Numeritos
2. Computer Architecture
Databases
Design DBs
1. Information Storage
2. DataBases Systems
3. Relational DataBases
4. Relational Models
Lenguajes de Marcas (XML)
📒 Cheatsheets 🎇
🔶 Git
🔐 ssh
🐳 Docker
🦈 WireShark / Tshark
CMS Tools
WPscan (WordPress)
CMSeeK
Joomscan (Joomla)
Droopescan (Drupal)
Magescan (Magento)
DataBases
SQL
MySQL
PostgreSQL
SQLite
MongoDB
Linux-Tools
find
awk
grep
sed
Pentesting
Sqlmap
Metasploit
Aircrack-ng
Nmap
Fuzzing
Wfuzz
Gobuster
fuff
🎯 IT Fundamentals 🔰
🖥 Computer Fundamentals
🧱 COA
🔌 Hardware
🕹 Operating Systems
🐧 Linux
⚙ System
🈺 Scripting
🖼 Windows
⚙ System
#️⃣ Scripting
🌐 Networking (CCNA 200-301)
🛡 IT Sec (CompTIA Sec+-701)
🛢 DataBases 🧨
Introduction to DBs
Design DBs
Programming DBs
SQL
MySQL
PostgreSQL
NOSQL
Interacting with Data (Python)
⛩ Programación 🔰
🎯 Fundamentos
Data Structures
Algorithms
Git && GitHub
Git
Introducción
Configuración Inicial
Básico
Avanzado
GitHub
Introducción
Creación y Configuración de repositorio
Básico
Avanzado
🎲 Lenguajes
Python
C
Golang
Java
🔐 Privacidad && OPSEC 🛑
Privacy
OPSEC
Introduction
Securing the OS (Hardening)
🐧 Linux Hardening 🧨
⏹ Windows Hardening 🧨
🍏 macOS Hardening 🧨
Hardware Spoofing
Encryption
VMs (Qubes, Whonix, etc.)
VPSs, RDP & VPNs
Anonymous Crypto
Using PGP
Anonymous Emails
END
👥 OSINT 🧨
0. OSINT Bookmark
1. Introduction
2. Search Engines
3. Specializad Tools
4. Social Avenues
5. Data Breaches
6. Dark Web
🎭 Social Engineering 🧨
0. Introduction
1. OSINT
2. Profiling/DISC
3. Pretexting
4. Robin Dreeke
5. Robert Cialdini
6.
7.
8.
9.
10.
🌀 General Pentesting 🔰
Pentesting Methodology
Enumeration Fundamentals
Explotation Fundamentals
⚙ OSs Pentesting 🔰
Linux Privesc
Abusing Sudoers Privileges
Abusing SUID Privileges
Detection and exploitation of Cron tasks
PATH Hijacking
Python Library Hijacking
Abuse of incorrectly implemented permissions
Detection and exploitation of Capabilities
Kernel Exploitation
Abuse of special user groups
Abuse of internal system services
Abuse of specific binaries
Hijacking the library of dynamically linked shared objects
Docker Breakout
Windows Privesc
Active Directory
👽 Networking Pentesting 🔰
🕸 Web Pentesting 🔰
Web Vulns
Cross-site-Scripting
File Inclusion/Path Traversal
Remote File Inclusion
Log Poisoning
Cross Site Request Forgery
Server Side Request Forgery
Server Side Template Injection
Client Side Server Injection
Type Jugling Attack
XML External Entity Injection
SQL Injection
NOSQL Injection
Header Injection
LDAP Injection
LaTeX Injection
XPath Injection
File Uploads
Padding Oracle Attack
Deserialization Attacks
Prototype Pollution
Full Zone Transfer Attack
Mass Assignment Attack
Open Redirect
ShellShock Attack
IDOR
CORS
SQL Truncation
Session Puzzling
Race Condition
CSS Injection
API Pentesting
Web Tech Pentesting
📻 Wireless Pentesting
Wifi
0, Introduction
1. Required Wifi Hardware
2. Pre-Requisites
3. Hacking Wifi Networks
4. Unable to hack Wifi
5. Increase the POWER
6. Locating the Access Point
7. WPA3 Networks
Bluetooth 🧨
SDR 🧨
📱 Mobile Pentesting 🧨
🟢 Android
🔵 IOS
🎱 Low Level Pentesting 🧨
Buffer Overflow
Binary Exploitation
Reverse Engineering
Malware Dev
🧩 Others ( Pentesting ) 🧨
Car Pentesting
CI/CD Pentesting
Cloud Pentesting
🔷 Blue Team 🛑
Malware Analysis
🎇 Desarrollo Web 🔰
Frontend
HTML
CSS
PostCSS
TailwindCSS
JavaScript
React
Backend
Node.js (Express)
PHP
Java (Spring)
🎩 English
English for IT
English (General)
GitHub
Select theme
Dark
Light
Auto
Introduction to Operational Security