Welcome!

Welcome to my Playbook where I take notes.

Introduction

This playbook compiles various techniques, tools, and methodologies used across different domains of penetration testing, including infrastructure, web applications, mobile, thick client, cloud, WiFi, and more. It is not meant to be used as a definitive guide but rather as a reference since I can make mistakes, and these are just my notes from my CTFs, courses, and real-world engagement experiences.

My Website:

SidThoviti.com

Disclaimer

The content within this playbook may not always be original and sometimes it may be copied. If you are the original author and want any content to be removed, please contact me at admin[at]sidthoviti[dot]com.

Thank you for visiting, and I hope you find this playbook helpful in your security endeavors!

PS: I didn't think I'd ever make this public. This is just an experiment.

Last updated