Kaldei's Cybersecurity Notes
π Kill Chain
Notes for the different stages of an attack. They're sorted kinda like the "Cyber Kill Chain":Enumeration, Vulnerability Assessment, Gaining Access, Foothold, and Privilege Escalation.
π οΈ Tools
Notes detailing the use of the tools I've encountered (most of them are offensive tools).There is no particular organization here: theses notes are sorted in alphabetical order.
πΊοΈ WSTG Mind Map
Notes on web vulnerabilities in the form of a Mind Map (based on OWASP's WSTG).The Obsidian Canvas is available on my Github: Kaldei/PERSO-Obsidian-WSTGMindMap.