###########################################
#GOLD MINE FOR REAL #
###########################################
#1->linux privilege escaltion
iii.https://gtfobins.github.io/?fbclid=IwAR1bDDxPEW_hCuc7NEIdrOGZQeXGF1d3IowpoSgafYvkSgSGSjuu1bFimPg
v. https://guif.re/linuxeop?fbclid=IwAR1S2fxnHcMyTuOZFYoZb55AJmHQ-MYTuOQpPsJFotW7HvmKRqpf7Ml9wTM
vi. https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/
vii. https://hackingandsecurity.blogspot.com/2017/09/oscp-linux-priviledge-escalation.html?m=
ix. https://www.exploit-db.com/exploits/45175/
#2->windows privilege escalation
iv. https://www.youtube.com/watch?v=9pwMCHlNma4&feature=youtu.be
x. https://hunter2.gitbook.io/darthsidious/privilege-escalation/alpc-bug-0day
xi. https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/
xii. https://speakerdeck.com/heirhabarov/hunting-for-privilege-escalation-in-windows-environment
#windows eploit
#windows active directory
#SQL injection -http://securityidiots.com/Web-Pentest/SQL-Injection/Part-1-Basic-of-SQL-for-SQLi.html?fbclid=IwAR2SxFy1jYBEr0GL_L3p_mSivlka-wFp73u0UOwb98JfPGabeFN9Oj8YjjA -https://www.youtube.com/watch?v=9Rrrm0JsLVw&fbclid=IwAR3sg8BVMXO-3QlTfVp47TnFND_BUYmuEK6o9t62uXRwYT7QUP0demdYKdc -https://gbhackers.com/perform-manual-sql-injection-2/?fbclid=IwAR0ZnkvB51Kka3h837U_o_wTNzfRQLhLcjMhbjoIn82MViIWCr7I67NdJGk -https://gbhackers.com/sqlmap-detecting-exploiting-sql-injection/?fbclid=IwAR35PJlLeYpSOWxuTUhJlzJjDtGkSOkOh4uv0s7plowVkkqNF2ELqa04pc4
#wireless penetration -https://github.com/s0lst1c3/eaphammer/blob/master/README.md?fbclid=IwAR1kP9vP_ROcyQLCDQgIiQTvKXRF_xeMMw7e_xSBYNVlFW-3YrbFaLPF_Vk -https://www.prodefence.org/ht-wps-breaker-high-touch-wps-breaker/?fbclid=IwAR3d4IV6wRHoGuN5e53F7HxpPnuQtS24lDk1ATE71IGSdi3464IhPuJfxu0 -https://www.udemy.com/wifi-hacking-from-a-penetration-testers-perspective/?couponCode=FINAL_FB_GIVEAWAY&fbclid=IwAR0rUXuZiZOGyZEjF1A-MDIZsSLrzmkEzjlBULd2Wkd_bGASx3UiFe9G26c -https://gbhackers.com/wireless-penetration-testing-checklist-a-detailed-cheat-sheet/?fbclid=IwAR37j40vqsPTrsd9EIudKNKrewVFMX-TjR8wNwVu4V9qYt5EfkFMp7WdwbQ -https://www.shellvoide.com/wifi/how-to-perform-automated-wifi-wpa-wpa2-cracking/?fbclid=IwAR27K6O4bO9hZ97lz_8DN6fc3cwddlFYM54Trr5xCzP8usX2lEbUWQ386y4 -https://wpa-sec.stanev.org/?submit&fbclid=IwAR14cLPiAsWfKLj7NLw_5lYHOWn3-lr5lVf6X66DpRsA8ltNBSf45NhzCBk -https://gbhackers.com/wireless-penetration-testing-checklist-a-detailed-cheat-sheet/?fbclid=IwAR0Ezy1Lon0Ef2AfyYH-oZ-WoCAG1KBu2UxSfZVJkD_Usi2QN-cql1MS_iQ
#malware analysis -https://docs.google.com/presentation/d/14nHfy7iEhVd7qA-i4-8kT_mnudT2phKNO7RE34AiEho/present?fbclid=IwAR0DlG5EzpJAVBQK7gMgO9iK_IcbNhTaD24e9srHGmOCbU36DgHFvBWhHCs#slide=id.p -https://gbhackers.com/most-important-tools/ -https://github.com/rshipp/awesome-malware-analysis?fbclid=IwAR1AQzGSV2VaC25mPK9ILlqXLhixJdzFqbnPGfpripf96p9gkJQS7tA5_bE -https://gbhackers.com/malware-analysis-cheat-sheet-and-tools-list/?fbclid=IwAR3giNTn-0LEBnX2lsgIgiVMKeGrJjYfC0fLj_HQn38ZGyyCFCpm_JuJyi0 -https://0x00sec.org/t/anti-forensic-and-file-less-malware/10008?fbclid=IwAR0etAl90lfep0swF4oYFeSYqWS-y1DAl8LOvxoM-ppW01rr69ZpBjycWAY -https://0ffset.net/miscellaneous/how-to-get-started-with-malware-analysis/?fbclid=IwAR3Acz5aPfOboyXjAYy8IWWkX9oeHgyK0lRVen_wjrNkrqSbjS33-ZjNSk4
#burpsuite -https://kalilinuxtutorials.com/burpsuite/?fbcli=IwAR3jFaR1WRAnpqR7ipXdvg7kQRLyCL3wSNnzZK1iPaJsGjLEs5k7hlWTTMs -https://training.peritusinfosec.com/p/burp-suite-mastery/?product_id=715832&coupon_code=BLACKFRI&fbclid=IwAR1t8pRg63tV5DthZk8YFeh2Apd5wmRUXLawyEnYCiamIumqQaTVAr25qv0
#network camera -https://neonsea.uk/blog/2018/08/01/hikvision-keygen.html?fbclid=IwAR3JFE3aShDT-eLQHcX8ArYbJJQG2VG7ANrTv_OBIrqPuPJ1f5d2x4kSBik
#buffer overflow -https://0xrick.github.io/binary-exploitation/bof3/?fbclid=IwAR18BNgHyRfLzgP_Pf-fqkODA9sLmWqcsjN_Z5UZzzzHNO4WdFV2IDj9Cow -https://blog.own.sh/introduction-to-network-protocol-fuzzing-buffer-overflow-exploitation/?fbclid=IwAR07sL_cgaRhj9SELba9ViZNG6YRz2mbELKvmtaNcfJoiIhWIX9X3S3FUEY -https://blog.own.sh/introduction-to-network-protocol-fuzzing-buffer-overflow-exploitation/?fbclid=IwAR07sL_cgaRhj9SELba9ViZNG6YRz2mbELKvmtaNcfJoiIhWIX9X3S3FUEY -https://www.youtube.com/watch?v=e059hzzg3Zo&feature=youtu.be&fbclid=IwAR3--qoCiPqjESBYzSruPL8uFJMYRfRufWye49jogJshoG44g07M-B43ZAM -https://www.youtube.com/watch?v=gJXoqEFNOcs&feature=youtu.be&fbclid=IwAR2uc2Zm7gJmet7N5QzfRQSOBAiKYGqSMtdaBpLdiHnQz3XEfycQunXAJkA -https://www.youtube.com/watch?v=r_ml1j9k-Gk&feature=youtu.be&fbclid=IwAR0O7K7A_wdE6YQDRnNz6jXUTMl-wJlH74NtDyMghKWErokJbHQO6nQWxls -https://www.youtube.com/watch?v=goF472hJYys&feature=youtu.be&fbclid=IwAR2PRBTW4d-ffzFTpOibd1CMbiHKKgTFENS8Pr74AO-HFpifFOtmNJh6dCM -https://www.youtube.com/watch?v=EaZTt7MIrzg&feature=youtu.be&fbclid=IwAR3HtTctQI-fOEw88anFOiwiqPLRaDOlJ4WvVDWdHr0m6L6FXb7v4tpbDps -https://www.youtube.com/watch?v=GZO2XPyAFts&feature=youtu.be&fbclid=IwAR1UgmISIm-LTbn_Z2DtbfzAZRwXZUzxj58nJGl3u7pEm-4WHYCCwRIDNxI -https://www.youtube.com/watch?v=_3fzj3qsLPU&feature=youtu.be&fbclid=IwAR0mdpAEdfJFn0t7wUvntFKh_NSPwcYxfxqPDhrYFc_1kVD4W4Kaca6ld_8 -https://proactivedefender.blogspot.com/?fbclid=IwAR0UYl6UgFYd0BTHXdG5Oo2jJ0A84XoVmCEjPBaj1idsNwmj3Zvfh-7GtVI -https://stacktrac3.co/vulnserver-write-up/?fbclid=IwAR1ytECmHB9QZZTochAt9YVMBKge43ifX1Q9PxlCPahP1dOQEXAU-RnPZgE
#OSCP notes -https://cyb3rsick.com/2019/01/20/oscp-exam-writeups-introduction/?fbclid=IwAR0tq8LrW955079Ac5fXRP792t-MvJGkTlZvjO5j84X6NUCxHQShVRm3vcE -https://github.com/slyth11907/Cheatsheets?fbclid=IwAR0aOTSrCCZZe7q4_m-XNviKnu9o2TkFR50Z2GKFnSSo1rtugtjj0w3UszQ -https://www.jscybersec.io/blogpage/Offensive-Security-Certified-Professional?fbclid=IwAR2gSCcEU1RXflPeus08SBJQlxO4Yn_D8uLg5B7MHRskUdWKxenYAKKBEs0 -https://medium.com/@hakluke/haklukes-ultimate-oscp-guide-part-1-is-oscp-for-you-b57cbcce7440?fbclid=IwAR30YzWzYbZt4FHEzbJbEo9MadarABUez6sLFue2SP3wDT32oXw0evopEdo -https://scund00r.com/all/oscp/2018/02/25/passing-oscp.html?fbclid=IwAR3ASJhuElYv7iw7dpLjiRQEBMV9llYjIwL7YUVEtQLEQo2J9UPspt4Hu4Y#commands -https://github.com/s0wr0b1ndef/OSCP-note?fbclid=IwAR3i01n33Y8rxLrU98oBirsvCqmO_pxIWyBLkoicnYyh7W1aBLFaKkrjCEg -https://github.com/areyou1or0/OSCP?fbclid=IwAR0f-uWoDgs9w-ZlAS4p5yfANz-iNhxEYiqYh8LyvODJLSdglR6YFBkSDiU -https://sushant747.gitbooks.io/total-oscp-guide/privilege_escalation_windows.html?fbclid=IwAR1n1cs1dBadliOVI4iO7po3WmgS8hP4kBBGDXCl-ozy0F7tCOM5QAGOa4M -https://www.secjuice.com/oscp-prep-guidance/?fbclid=IwAR02FTJVI1GRoOv9rxGhk20qczVJeuwgL65Xyg06E03WGQU6MBCy3vSJDK0 -https://acknak.fr/en/articles/oscp-tools/?fbclid=IwAR2ztMPOozEv73yiealZhMOg2SmUCFnrixWwv7HAq5cW6s4yPAGge3-DeCM -http://kunalpachauri.co.in/pathway-to-oscp.html?fbclid=IwAR04ADDHsHdImz1Dyqcr7Mw_5P_bOaniPaJu51MnwfAdjCXuB8wNz5cYiw4 -https://github.com/RustyShackleford221/OSCP-Prep?fbclid=IwAR1hNnWjDxiI-pdsC2HJAtpXJ9-Ks0MTKczxqRbKmm0tjoRAB3dH2N0lrWs -https://www.netsecfocus.com/oscp/2019/03/29/The_Journey_to_Try_Harder-_TJNulls_Preparation_Guide_for_PWK_OSCP.html?fbclid=IwAR2QPj9lOJpR1OeQqhtlYjzyiCHxTtYEvMzea3zKDzgesWTLc6mNyxk0aHQ -http://0xc0ffee.io/blog/OSCP-Goldmine?fbclid=IwAR2--FYsZo77AzCQ_F8EZqROHppPe6RAWUtskZ-pQkRrk-XZhlp7JmeUcEg -https://www.keiththome.com/oscp-course-review/?fbclid=IwAR239djLDCKmGkWpGST2D0WKA7rVeCUSoZoHnN660vwX5RqhbPmNagN1AQk -https://www.netmux.com/blog/purple-rain-attack?fbclid=IwAR1d8hN94aQSQ3ARujn8W3H7NS03phoaFtaKtA3KxtzQhKpbFCeH1uWoVl8 -https://www.vortex.id.au/?fbclid=IwAR2d5W21R85El_4EDPtcIMswHbPLiln82ZsXKy0uo63Z6zoGMB-EEKYJkN4 -https://thor-sec.com/review/oscp/oscp_review/?fbclid=IwAR1Yuzuj_lB7SqYLJ28i-KWGlPssSZpmrKYVsPef_3gXgDnM0717sNzMVZg -https://guif.re/?fbclid=IwAR1-vQsPeD97FJu6h-0gB9x1Gi2UgHhJlWl9rSlJT0zbvsgW7oECyxepCY4 -https://scriptdotsh.com/index.php/2018/04/17/31-days-of-oscp-experience/?fbclid=IwAR2PDO6B7jQXayS0vWr064bXJPcswuuj37VtCf2sHZ_I6Ss-KLouWaAA5r0 -https://paper.dropbox.com/doc/OSCP-Methodology-EnVX7VSiNGZ2K2QxCZD7Q -https://github.com/mohitkhemchandani/OSCP-Complete-Guide?fbclid=IwAR061y9Sn7qFpv0Lyn8NCPfAagxD1xbcq8-zWnj0S7StQk8SNBJiRLKwnHI
#CTF -https://blog.kartone.ninja/2019/03/25/when-a-reverse-me-ctf-binary-makes-you-loose-that-job/?fbclid=IwAR0BUrBkePDs3vYdtNLALhmmFrfBkoUdBUEtbRmdVvYbjidVfQzqCenZvuY -https://mrt -https://gtfobins.github.io/gtfobins/whois/?fbclid=IwAR2BGMKkGj6FDit8h20UwvybkYMsFOmd17mt9ryB2u7pwQtwiC0L5e7ZzcY -https://github.com/swisskyrepo/PayloadsAllTheThings?fbclid=IwAR0HOZxovFMKbW7eqZvByT_Wh_nqlNIs7b9X4XT7S13kuBniAoBgk1c2lio
#study materials -https://mega.nz/?fbclid=IwAR3gEKJW4BOsIAquls4DBnDO65OW92oRL7tCR7JEuexEr2gV0xajmAlL8FQ#F!NsdFhSYY!z-ecu4lbJkEKI5VVxe9-TA -https://uptusuccess.com/download-paid-udemy-courses-for-free/amp/?fbclid=IwAR0TU4ylkBxpyOtiGTQT3uN25183bAyEkCw_R3QxDhx18Sa_BW5WSE1Fz7Q -https://hackingvision.com/2018/03/15/hacking-books-pdf-collection-2018/?fbclid=IwAR1MIWPL_u9e1UWl2o_T4jgWAoO8xpPdSqGypCLD-8S-qIt43Be-Url-0Es -https://github.com/robertcanare/Study-File -https://comindt.blogspot.com/2019/01/linux-book-4.html?fbclid=IwAR2m-HmW5Nq5nu2wpeg73tTdrOxUPemzJGDO1KUVkWfhsPvOaKHVxn2AY-w -https://mega.nz/?fbclid=IwAR3FVBUitfEV7Kk1YiO4wyiUbVPPv16KjYNRNCD0Bdt8NVFXJX2wuGb4yFw#F!WUg2zIgI!Jrl_0ILGnqkNrC0XP40Ccg #ethical hacking free courses -https://mega.nz/?fbclid=IwAR28CDUlL44S0jKSViOL2A3TTj5XlJxbgrMu25xqN795EHq3J0vHU2VLfFo#F!BtZAjJIR!nek_MMo14Z_3_D_OLT5hsw --https://www.udemy.com/ethical-hacking-beginners-to-expert-level-kali-linux-tutorial/?couponCode=FBFREE001&fbclid=IwAR3B6jvs7saCQqH1SgqeYpN6sRGUzJnPDt3k1uTKPd9c_YS1crI2ZItqbgU -https://www.reddit.com/r/HowToHack/comments/b1486v/zero_to_hero_a_practical_network_pentesting/
#steganography -https://0xrick.github.io/lists/stego/?fbclid=IwAR3YCShRT6XOQSbky1H36XBexeaAncFPtSc0VoMOZOp2JK9YcqPy76tNAy4
#penetration testing -https://github.com/trimstray/the-book-of-secret-knowledge?fbclid=IwAR1n6pErXQ8oGnZu2SRR1lCwtRvaZR04kJADWSgP0L9nAQGBpFfi5jxnYU0 -https://www.linkedin.com/pulse/how-break-penetration-testing-lawrence-munro/?fbclid=IwAR2QTXANG0VhDKwNpdeOtKAPAueHCAg4c-fwrWYTNxGwTgoKAzBjTQDjIKQ -https://github.com/enaqx/awesome-pentest?fbclid=IwAR1q5yN4WfB_5brIldL1LY2fRD0O9iECZ0KEsDotaLtJ5fk9Qx3QyqyopDQ -https://jivoi.github.io/2015/07/01/pentest-tips-and-tricks/?fbclid=IwAR1GLvx8Cr8A7NYwpPRE5CKkSD6vKFLsuNgEUYaPUFSZZVJkrL0rxIxBe94 -https://www.notsosecure.com/pwning-with-responder-a-pentesters-guide/?fbclid=IwAR0QK_U09B1mhNSjpHP56TW8g8ExXRZENGaFqVXLZdzkhaCWhEksCZ6s5x8 -https://www.linkedin.com/pulse/how-perform-external-black-box-penetration-testing-james-ceh-/?fbclid=IwAR3_QK6-ENvfjlv0my17XbD3LTMq14ftV9_Vaa4s-f-iBB7MacXCOypzAu8 -https://github.com/OlivierLaflamme/Cheatsheet-God?fbclid=IwAR3NBv6uO8I0XF3yIcgIM5i39wdhdQ2QJ-2R-Je0hnk5AypZuw4Z3s6rpuQ -https://blog.eccouncil.org/6-ways-to-be-a-better-pen-tester-part-1/ -https://gbhackers.com/hacking-tools-list/?fbclid=IwAR34ItaRUnBH73fCEXVRF4sF3RVYgju3XpfT5Sa3NZC12ksQbMM-cs1xosQ -https://gbhackers.com/hacking-tools-list/?fbclid=IwAR34ItaRUnBH73fCEXVRF4sF3RVYgju3XpfT5Sa3NZC12ksQbMM-cs1xosQ -https://blog.eccouncil.org/6-ways-to-be-a-better-pen-tester-part-1/?fbclid=IwAR0y-g26kcaorSjdMebwmt474uvJJdLRRDEiELUQawCkF6K9jhVf0sqabFI
#windows evasion / bypassing AV -https://github.com/nccgroup/Winpayloads?fbclid=IwAR3tqJ5W3w7R8lSTIU_54riWHecVZy2QXbxQarPL_5JSZbTBaFMjXD2w8ds -https://null-byte.wonderhowto.com/how-to/hacking-windows-10-create-undetectable-payload-part-1-bypassing-antivirus-software-0185055/ -https://gbhackers.com/malicious-payload-evasion-techniques/?fbclid=IwAR09baVu0CZRJCv9HkuPaUTu2wbhL3RZiwGkz667Q66P6fblW2qtlVpb8xM -http://www.powershellempire.com/?page_id=149&fbclid=IwAR2_slvmYwJsiBt6o8zB8GHthCK2178i_5pPlGCkhhQvC272Bcendxc5Alg -https://gbhackers.com/bypassing-an-antivirus/?fbclid=IwAR2k_yi7AQGfDzNlhvHx-azLqueL6RRMVFpmgQYgapvl-92UQcoTIr17LAk
#bug bounty tips -https://forum.bugcrowd.com/t/researcher-resources-how-to-become-a-bug-bounty-hunter/1102?fbclid=IwAR0uFG98i2WUq0vyRs4PEQncxhMmGouL6R-KgxcuCjJlEZ-ee2L-TP9kTH0
#network security -https://www.blackhat.com/presentations/bh-europe-05/BH_EU_05-Berrueta_Andres/BH_EU_05_Berrueta_Andres.pdf?fbclid=IwAR38V0GIvzx46wVcxiD3NZGKvd8XQHPIeRCPv6quPk6U6oLIM0BkuXp4tOA -https://www.kinniyalibrary.com/?fbclid=IwAR3Z9_T9pBA34VuwFvsNedFZnu-LGdIkJzaQf5WvkOYOLqzfGXNjL36BC60
#web application -https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master?fbclid=IwAR3-X7ZjDicl__C2Zq1dIWJ7tQ7lsnWfIGLgc7FAgX0wh4qSnEUeLGDvSjI -https://github.com/minimaxir/big-list-of-naughty-strings?fbclid=IwAR0vAybYceatG1wujdiB9k0-KhCtOAMhDycRb0jTmW-wvvOA3pNEKMksP8k -https://n0where.net/php-webshells?fbclid=IwAR27-1MYEkojrxofzE1DHFCihLeJcgcIUhBRGTQVQV2Jz-rN0cugkvdvaIE -https://gbhackers.com/web-application-penetration-testing-checklist-a-detailed-cheat-sheet/ -https://latesthackingnews.com/2018/08/17/rapidscan-web-vulnerability-scanner-framework/?fbclid=IwAR2p0tYRVGo9CNBzHdo7aS8QCcEBqHDA4Iqu5vFQQySGC7sFZ5ByB-dB-i4 -https://github.com/swisskyrepo/PayloadsAllTheThings?fbclid=IwAR0HOZxovFMKbW7eqZvByT_Wh_nqlNIs7b9X4XT7S13kuBniAoBgk1c2lio -https://github.com/trimstray/htrace.sh?fbclid=IwAR0WNthDD3wSi1zT7xy88WgzK2oEL4CotOtIIdZnZkuhuScPuw_neSRs3UE -https://0x09al.github.io/waf/bypass/ssl/2018/07/02/web-application-firewall-bypass.html?fbclid=IwAR20DePpg-ZMUb3gSozLE-MmQFwyk67NRgMSXthPGzeA81JPdxBdXkUJWmk -https://gbhackers.com/penetration-testing-wordpress-website/?fbclid=IwAR0cxJP-934GybkZQW-26btvrfUuDVjKQhExmyYXW724mfj1LKu7BqizNHs -https://www.hacker101.com/videos?fbclid=IwAR05yhTqVn0EmfDj5QVxnD-RdcC9Z1rmWyo_Qc2IjvVAo-iY_gBWZSFOf50
#reverse shell -https://netsec.ws/?p=331&fbclid=IwAR3D_du_PKB0E0dB_M3BobttN3YzLUV5ae1I1kjpjfbGZlLuF0o2oZN7BnU
#red teaming -https://ired.team/offensive-security-experiments/offensive-security-cheetsheets?fbclid=IwAR2zRgWIEdc59DWQNCehtw3HEEaJyfy9HBFmcJqllaglkHUaD2n6xpScRAk -https://medium.com/@adam.toscher/top-five-ways-the-red-team-breached-the-external-perimeter-262f99dc9d17?fbclid=IwAR0-ynimomdYAUx6MSA293GwRTJfHaYulsfnFlKVmCILeYjHoyVKdP33U1g -https://github.com/yeyintminthuhtut/Awesome-Red-Teaming?fbclid=IwAR1oxHbvqs6E2VwVwJjsMzRn9ln_faA5mJ-KwFYEBlPhhKRBpL7slAkZ1R4 -https://github.com/infosecn1nja/Red-Teaming-Toolkit/blob/master/README.md?fbclid=IwAR3eenVGF-dCquu4WhgM3sQ7Q-MDujEq-CRxw-TsGxu4mlm6tqdFLIhkCaQ -https://www.peerlyst.com/posts/the-red-team-guide-chapter-20-attacking-linux-unix-environments-chiheb-chebbi?utm_source=linkedin&utm_medium=Application_Share&utm_content=peerlyst_post&utm_campaign=peerlyst_shared_post -https://github.com/yeyintminthuhtut/Awesome-Red-Teaming?fbclid=IwAR1XSTFYKQUICzCQcVxNlub4Oq9J93c7JxW6kLy0V-i7dMMOWgK1osOSzcE -https://resources.infosecinstitute.com/red-team-assessment-phases-reconnaissance/?fbclid=IwAR3qVCUYm1Mi_pPjiOykFFW0ocHPWzx6ZydXiovAFnMr_cMZCqAEIa7zf4A
#sysadmin -https://github.com/trimstray/test-your-sysadmin-skills?fbclid=IwAR30T_eIudg7y1kLVftUWEaGNK3M7zNXjDw_OJI-lkNLuXti8wPxt-GBrYs#simple-questions -https://www.udemy.com/draft/1845852/?LSNPUBID=JVFxdTr9V80&ranEAID=JVFxdTr9V80&ranMID=39197&ranSiteID=JVFxdTr9V80-PE6GGymDtqcLyuaic8kqjQ&fbclid=IwAR2XLLOiIEtOFBhVFV8rSUybSDsDFvNkVZDo4tpK0aqScGOxxS26Ma6CcLY
#microsoft macros -https://github.com/mwrlabs/wePWNise?fbclid=IwAR17fns6AhI6QqRPwQJ8dHr7WlkTkNdI9uGjEpC-NISLdRHPMDO2i-DYgFw
#cloud computing -https://gbhackers.com/cloud-computing-penetration-testing-checklist-important-considerations/?fbclid=IwAR3EXRITGAaNNuXJpLtp-ysPk04eRKkdOYmcb8Vfa48OgEdEuQg_meHIz8s
#incident responce -https://gbhackers.com/cyber-incident-response-tools/?fbclid=IwAR2VUKIhalrJ1iCpY8_w64mI-SYZbWLQsK7vJj_xrCQcbZ247XCRbskMwy8
#mobile hacking -https://gbhackers.com/android-penetration-android-checklist/