Skip to content

Commit 611ac2f

Browse files
authored
Add files via upload
1 parent 2ab17f4 commit 611ac2f

File tree

89 files changed

+8946
-6
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

89 files changed

+8946
-6
lines changed

README.md

Lines changed: 117 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,121 @@
1-
# Information-Security-Tasks
2-
This repository is created only for infosec professionals whom work day to day basis to equip ourself with uptodate skillset, We can daily contribute daily one hour for day to day tasks and work on problem statements daily, Please contribute by providing problem statements and solutions
1+
---
2+
cover: .gitbook/assets/1744 (1).gif
3+
coverY: 0
4+
layout: landing
5+
---
36

4-
On day to day basis learners struggle for guidance , This repository is aimed to create a training guidance for students and learners with various information security topics
7+
# ☢️ ../../../../hacking\_methodology
58

6-
if you learnt some technique or wish to give the world a task please add it up here , Either it maybe easy or hard it would help someone to
7-
enlighten their knowledge.
9+
<figure><img src=".gitbook/assets/image (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1).png" alt=""><figcaption><p><a href="https://swizsecurity.com/">Swiz Security LLC</a></p></figcaption></figure>
810

11+
## Introduction
912

10-
<b><h1>PLEASE DONT FORGET TO LOOK AT WEBSITES FOR REFERENCE ,FEEL FREE TO ADD YOUR SITE TO THE CATEGORY</b></h1>
13+
Welcome all, I hope you enjoy your stay!
14+
15+
_<mark style="color:yellow;">Knowledge should be free, accessible to all, and in one place. The security community permitted me to be able to learn all of this, this is just me giving back</mark>._
16+
17+
**This is the main place I will be documenting hacking, research, notes, my methodology, and experiences**. In other words, welcome to my world.
18+
19+
**I cover everything from:**
20+
21+
* <mark style="color:red;">Binary Exploitation</mark>
22+
* <mark style="color:red;">Reverse Engineering</mark>
23+
* <mark style="color:red;">Malware Development</mark>
24+
* <mark style="color:red;">Pentesting/Redteaming Methodologies</mark>
25+
* <mark style="color:red;">Theory</mark>
26+
27+
## Special Thanks
28+
29+
> _**I wanted to give a special thank you to Mr. Eltringham for always believing in me during my college experience. I could not have done it without you. I will forever keep your words of motivation and wisdom in the background with each professional decision I make going forward.**_
30+
31+
> "_**You must have confidence in your competence.**_"
32+
>
33+
> \~ Professor Russell
34+
35+
## Motivation
36+
37+
**These notes are an excellent way for me to convey my knowledge, skill set, and a good way to share what I've learned through my experiences. I believe sharing my notes is a great way to give back to others since I would not be where I am without collaboration efforts from others**.
38+
39+
## What am I currently working on?
40+
41+
**Check this out** :smile:**:**&#x20;
42+
43+
{% content-ref url="binary-exploitation/automating-ret2libc-got-and-plt-w-pwntools.md" %}
44+
[automating-ret2libc-got-and-plt-w-pwntools.md](binary-exploitation/automating-ret2libc-got-and-plt-w-pwntools.md)
45+
{% endcontent-ref %}
46+
47+
{% content-ref url="binary-exploitation/return-oriented-programming-rop/rop-chains-101.md" %}
48+
[rop-chains-101.md](binary-exploitation/return-oriented-programming-rop/rop-chains-101.md)
49+
{% endcontent-ref %}
50+
51+
{% content-ref url="binary-exploitation/ret2libc/" %}
52+
[ret2libc](binary-exploitation/ret2libc/)
53+
{% endcontent-ref %}
54+
55+
_**Within the last year, I made a switch from&#x20;**<mark style="color:yellow;">**Pentesting**</mark>**&#x20;to&#x20;**<mark style="color:yellow;">**Vulnerability Research**</mark>**&#x20;and couldn't be happier!**_&#x20;
56+
57+
**How would I compare the two?**
58+
59+
> _**I went from attacking computers from the view of a satellite to attacking them from the perspective of looking under an electron microscope.**_
60+
61+
**A solid explanation of vulnerability research:**&#x20;
62+
63+
> _**"We're the weapon that no one saw coming**_ :wink:_**".**_
64+
65+
We analyze software and hardware components for vulnerabilities and develop Proof-of-Concept exploits for them.
66+
67+
<figure><img src=".gitbook/assets/Screenshot 2024-06-26 at 3.35.28 PM.png" alt=""><figcaption></figcaption></figure>
68+
69+
### Projects
70+
71+
<mark style="color:yellow;">As of lately</mark>, I am strengthening my C and Python development skills to become a more competent developer. Want to keep track of my maldev progress -- check out my GitHub repo and my [Malware Development](malware-development/) page in my Gitbook!&#x20;
72+
73+
**Here I will be covering a bunch of binary exploitation:**
74+
75+
{% content-ref url="binary-exploitation/binex-methodology-and-notes.md" %}
76+
[binex-methodology-and-notes.md](binary-exploitation/binex-methodology-and-notes.md)
77+
{% endcontent-ref %}
78+
79+
{% embed url="https://github.com/0xXyc/binex" %}
80+
81+
**Check out my walkthroughs for the challenges below and let's learn together:**
82+
83+
{% content-ref url="binary-exploitation/return-oriented-programming-rop/" %}
84+
[return-oriented-programming-rop](binary-exploitation/return-oriented-programming-rop/)
85+
{% endcontent-ref %}
86+
87+
**Also, be sure to check out my latest pwn challenge writeups from Hack The Box (HTB):**
88+
89+
{% content-ref url="binary-exploitation/htb-pwn-challenges/" %}
90+
[htb-pwn-challenges](binary-exploitation/htb-pwn-challenges/)
91+
{% endcontent-ref %}
92+
93+
## Current Industry-Recognized Certifications
94+
95+
### <mark style="color:yellow;">TCM Security Practical Network Penetration Tester (PNPT)</mark>
96+
97+
* A 5-day long assessment where you are tasked with conducting OSINT on a target, breaching a network externally and internally
98+
* The ultimate goal is to become domain admin
99+
* Lastly, you must give a 15 minute debrief to the TCM Security team
100+
101+
<figure><img src=".gitbook/assets/image (1) (9) (1).png" alt="" width="200"><figcaption></figcaption></figure>
102+
103+
### <mark style="color:yellow;">Hack The Box's Dante Pro Labs</mark>
104+
105+
* Interactive environment with 27 flags and 14 hosts to compromise
106+
107+
<figure><img src=".gitbook/assets/image (11) (1) (1) (2).png" alt=""><figcaption></figcaption></figure>
108+
109+
### <mark style="color:yellow;">CompTIA Security+</mark>
110+
111+
<figure><img src=".gitbook/assets/image (13) (4).png" alt=""><figcaption></figcaption></figure>
112+
113+
### <mark style="color:yellow;">eLearn Junior Penetration Tester (eJPT)</mark>
114+
115+
<figure><img src=".gitbook/assets/image (2) (6) (1).png" alt=""><figcaption></figcaption></figure>
116+
117+
## GitHub
118+
119+
{% embed url="https://github.com/0xXyc" %}
120+
121+
## Jumping straight into it:

0 commit comments

Comments
 (0)