π―Skills47
π―jwt-security-testingπ―Skill
Skill
jwt-security-testing
π―hacking-fundamentalsπ―Skill
Skill
hacking-fundamentals
π―mobile application security testingπ―Skill
Skill
mobile application security testing
π―buffer-overflow-exploitationπ―Skill
Skill
buffer-overflow-exploitation
π―html-injection-testingπ―Skill
Skill
html-injection-testing
π―external network penetration testingπ―Skill
Skill
external network penetration testing
π―ddos attack testingπ―Skill
Skill
ddos attack testing
π―ethical hacking methodologyπ―Skill
Skill
ethical hacking methodology
π―file path traversal testingπ―Skill
Skill
file path traversal testing
π―broken authentication testingπ―Skill
Skill
broken authentication testing
π―oscp penetration testing methodologyπ―Skill
Skill
oscp penetration testing methodology
π―phishing-attacksπ―Skill
Skill
phishing-attacks
π―cloud penetration testingπ―Skill
Skill
cloud penetration testing
π―network 101π―Skill
Skill
network 101
π―sql-injection-testingπ―Skill
Skill
sql-injection-testing
π―ssh penetration testingπ―Skill
Skill
ssh penetration testing
π―metasploit frameworkπ―Skill
Skill
metasploit framework
π―security scanning toolsπ―Skill
Skill
security scanning tools
π―network-ports-referenceπ―Skill
Skill
network-ports-reference
π―privilege escalation methodsπ―Skill
Skill
privilege escalation methods
π―ldap-injection-testingπ―Skill
Skill
ldap-injection-testing
π―networking essentialsπ―Skill
Skill
networking essentials
π―linux penetration testing fundamentalsπ―Skill
Skill
linux penetration testing fundamentals
π―burp suite web application testingπ―Skill
Skill
burp suite web application testing
π―cross-site-scripting-and-html-injection-testingπ―Skill
Skill
cross-site-scripting-and-html-injection-testing
π―red team tools and methodologyπ―Skill
Skill
red team tools and methodology
π―powershell-scripting-for-securityπ―Skill
Skill
powershell-scripting-for-security
π―linux commands referenceπ―Skill
Skill
linux commands reference
π―credential-harvesting-lab-setupπ―Skill
Skill
credential-harvesting-lab-setup
π―linux-privilege-escalationπ―Skill
Skill
linux-privilege-escalation
π―top-100-web-vulnerabilities-referenceπ―Skill
Skill
top-100-web-vulnerabilities-reference
π―pentesting from beginner to advancedπ―Skill
Skill
pentesting from beginner to advanced
π―smtp penetration testingπ―Skill
Skill
smtp penetration testing
π―aws penetration testingπ―Skill
Skill
aws penetration testing
π―linux-production-shell-scriptsπ―Skill
Skill
linux-production-shell-scripts
π―pentest checklistπ―Skill
Skill
pentest checklist
π―wordpress penetration testingπ―Skill
Skill
wordpress penetration testing
π―ssh key-based authenticationπ―Skill
Skill
ssh key-based authentication
π―bgp-routing-protocolπ―Skill
Skill
bgp-routing-protocol
π―quick pentest referenceπ―Skill
Skill
quick pentest reference
π―api fuzzing for bug bountyπ―Skill
Skill
api fuzzing for bug bounty
π―pentest-commandsπ―Skill
Skill
pentest-commands
π―wireshark-network-traffic-analysisπ―Skill
Skill
wireshark-network-traffic-analysis
π―oscp-cheat-sheetπ―Skill
Skill
oscp-cheat-sheet
π―active-directory-attacksπ―Skill
Skill
active-directory-attacks
π―oscp-notesπ―Skill
Skill
oscp-notes
π―wi-fi-penetration-testingπ―Skill
Skill
wi-fi-penetration-testing
