π―Skills47
π―jwt-security-testingπ―Skill
Skill
jwt-security-testing
π―hacking-fundamentalsπ―Skill
Skill
hacking-fundamentals
π―mobile application security testingπ―Skill
Skill
mobile application security testing
π―buffer-overflow-exploitationπ―Skill
Skill
buffer-overflow-exploitation
π―ddos attack testingπ―Skill
Skill
ddos attack testing
π―ethical hacking methodologyπ―Skill
Skill
ethical hacking methodology
π―broken authentication testingπ―Skill
Skill
broken authentication testing
π―html-injection-testingπ―Skill
Skill
html-injection-testing
π―file path traversal testingπ―Skill
Skill
file path traversal testing
π―external network penetration testingπ―Skill
Skill
external network penetration testing
π―linux penetration testing fundamentalsπ―Skill
Skill
linux penetration testing fundamentals
π―security scanning toolsπ―Skill
Skill
security scanning tools
π―cloud penetration testingπ―Skill
Skill
cloud penetration testing
π―metasploit frameworkπ―Skill
Skill
metasploit framework
π―network 101π―Skill
Skill
network 101
π―sql-injection-testingπ―Skill
Skill
sql-injection-testing
π―ssh penetration testingπ―Skill
Skill
ssh penetration testing
π―powershell-scripting-for-securityπ―Skill
Skill
powershell-scripting-for-security
π―linux commands referenceπ―Skill
Skill
linux commands reference
π―oscp penetration testing methodologyπ―Skill
Skill
oscp penetration testing methodology
π―phishing-attacksπ―Skill
Skill
phishing-attacks
π―privilege escalation methodsπ―Skill
Skill
privilege escalation methods
π―networking essentialsπ―Skill
Skill
networking essentials
π―burp suite web application testingπ―Skill
Skill
burp suite web application testing
π―cross-site-scripting-and-html-injection-testingπ―Skill
Skill
cross-site-scripting-and-html-injection-testing
π―red team tools and methodologyπ―Skill
Skill
red team tools and methodology
π―network-ports-referenceπ―Skill
Skill
network-ports-reference
π―ldap-injection-testingπ―Skill
Skill
ldap-injection-testing
π―linux-privilege-escalationπ―Skill
Skill
linux-privilege-escalation
π―smtp penetration testingπ―Skill
Skill
smtp penetration testing
π―pentesting from beginner to advancedπ―Skill
Skill
pentesting from beginner to advanced
π―pentest checklistπ―Skill
Skill
pentest checklist
π―ssh key-based authenticationπ―Skill
Skill
ssh key-based authentication
π―bgp-routing-protocolπ―Skill
Skill
bgp-routing-protocol
π―quick pentest referenceπ―Skill
Skill
quick pentest reference
π―credential-harvesting-lab-setupπ―Skill
Skill
credential-harvesting-lab-setup
π―oscp-cheat-sheetπ―Skill
Skill
oscp-cheat-sheet
π―top-100-web-vulnerabilities-referenceπ―Skill
Skill
top-100-web-vulnerabilities-reference
π―api fuzzing for bug bountyπ―Skill
Skill
api fuzzing for bug bounty
π―pentest-commandsπ―Skill
Skill
pentest-commands
π―wireshark-network-traffic-analysisπ―Skill
Skill
wireshark-network-traffic-analysis
π―aws penetration testingπ―Skill
Skill
aws penetration testing
π―linux-production-shell-scriptsπ―Skill
Skill
linux-production-shell-scripts
π―wordpress penetration testingπ―Skill
Skill
wordpress penetration testing
π―wi-fi-penetration-testingπ―Skill
Skill
wi-fi-penetration-testing
π―active-directory-attacksπ―Skill
Skill
active-directory-attacks
π―oscp-notesπ―Skill
Skill
oscp-notes
