๐ ๏ธ Tool Docs
โ๏ธ Ansible
- Ansible Configuration Settings (environment variables)
- Jinja Documentation
- Jinja Template Designed Documentation
๐ฆ Vagrant
๐งฐ Packer
- Windows Templates for Packer
- Windows 11, 10, Server 2022/2019/2016, also with Docker
- Debugging Packer
- Contextual Variables (in the build)
- Path Variables
- Template Engine
- Packer Env Vars
๐ณ Docker
๐ Python
- Python3 Docs
- Python3 Default Exceptions
- Python Code Search
- Sphinx (Python3) Docstring
- (eBook) Learn Python the Hard Way
- Selenium w/ Python Docs
- Selenium WebDriver
๐ณ๏ธ PiHole
๐ Cheatsheets / Quick References
- Bash cheatsheet | Bash Colors
- Vim cheatsheet | Vim scripting cheatsheet
- Tmux Cheat Sheet & Quick Reference
- Regex Tester and Debugger (Online)
- SANS Cyber Security Posters/Cheatsheets
Pro Tip: Use these quick references to speed up your workflow!
๐ Good Stuffโข
- BROWSERS: WHICH ONE TO CHOOSE?
- Running Windows 10 on Linux using KVM with VGA Passthrough - Heiko’s Blog
- Arch boot process - ArchWiki
๐ Security
- How to Stay Up-to-Date on Security Trends
- Networking Cheatsheets
- HTML CheatSheet
- Krebs on Security
- NetSec Focus
- Security Week
- KeePassXC Docs
- i3 Docs
- Spaceship-Prompt Options
- neovim (Nvim) Docs
- Transmission Config Files
- Transmission CLI User Guide
- Torrenting Blocklists
- Borg Backup Docs
- GRUB Manual
- Writing a proper GitHub issue
- Searching code - GitHub Docs
๐ก๏ธ PenTest
๐ PenTest Learning
- Cybersecurity Style Guide V1.1 - Bishop-Fox-Cybersecurity-Style-Guide.pdf
- Ghostwriter: The SpecterOps project management and reporting engine
- Windows Post-Exploitation Resources
- (Windows Survey) Eric Zimmerman’s tools
- Pentesting: Tricks for penetration testing
- Awesome tools to exploit Windows!
- Living Off The Land Binaries, Scripts and Libraries
- File Transfers Cheat Sheet by fred
- Public PenTest Report Examples
- MITRE ATT&CKยฎ
- Registry RegRipper
- OSCP-Exam-Report-Template-Markdown
- SecLists: The security tester’s companion
- Other Big References - HackTricks
- A guide for windows penetration testing - Rogue Security
- HackTricks - HackTricks
- Passwords - SkullSecurity
- NTLM: How does the authentication protocol work? - IONOS
- CertCube Labs - Blog On Advance InfoSec Concepts
- Impacket: Python classes for working with network protocols
- PEASS - Privilege Escalation Awesome Scripts SUITE
- Windows Exploit Suggester - Next Generation
- How to convert flat raw disk image to vmdk for virtualbox or vmplayer? - Stack Overflow
- How to extract forensic artifacts from pagefile.sys? | Andrea Fortuna
- windows-binary-tools: Useful binaries for Windows
- Techniques - Enterprise | MITRE ATT&CKยฎ
- Dr Josh Stroschein - YouTube