Hello and welcome to my pentesting notes!
This is a curated collection of methodologies, and practical exercises from my penetration testing experience. This resource is designed to show not only the tools and techniques used during past pentests and exams but also the critical thinking, problem-solving, and methodical approach required to tackle real-world security challenges.
Each section is organized for clarity, covering topics from reconnaissance and enumeration to exploitation, privilege escalation, and post-exploitation strategies of various frameworks and technologies. These notes show my commitment to understanding the mechanics of cybersecurity testing and serve as both a personal reference and a demonstration of my hands-on pentesting expertise.
Thank you very much for checking out this repo!