Skip to content

nodirsafarov/cybersecurity-notes

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Cybersecurity Notes

My personal knowledge base for offensive security — Web Pentesting & Red Team.


About

A second-brain for everything I learn during HackTheBox machines, TryHackMe rooms, PortSwigger Web Security Academy labs, and CTFs — focused on Web Application Penetration Testing and Active Directory / Red Team tradecraft.

Each note here is:

  • Practical — every command shown was run in a real lab, not copy-pasted from a wiki
  • Concise — kept to the essentials I actually reach for during engagements
  • Tested — only what I have validated in my own environment makes it in

This is my own working reference — if it's here, I have actually used it.


Repository Map

Folder What's inside
web-security/ OWASP Top 10 walkthroughs — SQLi, XSS, SSRF, IDOR, SSTI, auth flaws
active-directory/ AD attacks — Kerberoasting, AS-REP, ACL abuse, DCSync, lateral movement
tools/ Tool-specific notes — Burp Suite, Nmap, BloodHound, Impacket, Metasploit
methodology/ OWASP Testing Guide, PTES, Cyber Kill Chain, MITRE ATT&CK mapping
writeups/ HTB / TryHackMe / CTF writeups (after machines retire)
cheatsheets/ Quick-reference one-pagers for engagements
resources/ Curated links — blogs, courses, books, CVE references

Featured Notes

Methodology

Web Security

Active Directory

Cheatsheets

⚠️ Some files above are work in progress — I add a new note after every machine I solve. Watch the repo to follow along.


Methodology I follow

For web targets

  1. Reconnmap -sC -sV -p- target · ffuf · subdomain enumeration · technology fingerprinting
  2. Mapping — Burp Suite passive crawl · gobuster dir · spider authenticated areas
  3. OWASP Top 10 sweep — manual checks against each category
  4. Authenticated testing — IDOR, BAC, business-logic flaws
  5. Documentation — capture every step in Markdown for the report

For Active Directory targets

  1. External reconnmap · service enumeration on 53/88/389/445/636
  2. Initial foothold — null session enumeration · password spraying · phishing simulation
  3. Domain enumeration — BloodHound + SharpHound · ldapsearch · rpcclient
  4. Privilege escalation — Kerberoasting · AS-REP Roasting · ACL abuse · DACL chains
  5. Lateral movement — Pass-the-Hash · Pass-the-Ticket · psexec/wmiexec
  6. Domain dominance — DCSync · Golden/Silver Tickets · NTDS.dit dump
  7. Cleanup & report — log artifacts, write the engagement narrative

Currently Learning

  • Mastering Active Directory attack chains end-to-end (PEH / CRTP path)
  • PortSwigger Web Security Academy — Advanced topics
  • OSCP-style enumeration discipline
  • Custom Python tooling for recon automation
  • Pentest report writing (engagement narrative + technical findings)

Contributions

If you spot something wrong, outdated, or unclear:

  • Found a typo or unclear sentence? → open a PR
  • Have a sharper way to explain a concept? → open a PR
  • Want to add your own writeup? → open a PR with the file in writeups/

PRs of any size welcome.


Stats

This repo grows with every machine I solve. Below is a rough running count of notes added per category — updated as I publish.

web-security/      ████████████░░░░░░░░  pending notes
active-directory/  ██████████░░░░░░░░░░  pending notes
tools/             ████████░░░░░░░░░░░░  pending notes
writeups/          ██████░░░░░░░░░░░░░░  pending notes
cheatsheets/       ████░░░░░░░░░░░░░░░░  pending notes

Resources I rely on


License

Notes are released under Creative Commons BY-SA 4.0 — free to share and adapt with attribution.

Code snippets are MIT.


Maintained by @nodirsafarov — Junior Penetration Tester from Tashkent, Uzbekistan.

About

Personal offensive security knowledge base — PTES web pentest cheatsheet, OWASP Top 10, Active Directory, Red Team

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors