Skip to content
Info-Sec Docs
Resources
Initializing search
_azumi/docs.gitlab.io
Intro
Active Directory
DevSecOps
Forensic
Pentesting
Red Team
System
Web
Info-Sec Docs
_azumi/docs.gitlab.io
Intro
Active Directory
Active Directory
Basics
Breaching Active Directory
Credentials Harvesting
Enumerating Active Directory
Exploiting Active Directory
Lateral Movement and Pivoting
Persisting Active Directory
DevSecOps
DevSecOps
Gitlab
Gitlab
Cheatsheet
Programming
Programming
Powershell
Resources
Vault
Vault
Cheatsheet
Forensic
Forensic
Tools
Pentesting
Pentesting
Fundamentals
Metasploit
Network Security
Privilege escalation
Resources
Resources
Table of contents
VLAN Attacks
Vulnerability research
Cheatsheets
Cheatsheets
Hydra Cheatsheet
OSINT Cheatsheet
Enumeration
Enumeration
DNS Cheatsheet
Nmap Cheatsheet
SMB Cheatsheet
SNMP Cheatsheet
Pivoting
Pivoting
Cheatsheet
Red Team
Red Team
Fundamentals
Fundamentals
Intro to C2
Red Team Engagements
Red Team Fundamentals
Red Team OPSEC
Red Team Recon
Red Team Threat Intel
Host Evasions
Host Evasions
AV Evasion Shellcode
Abusing Windows Internals
Bypassing UAC
Evading Logging and Monitoring
Introduction to Antivirus
Introduction to Windows API
Living Off the Land
Obfuscation Principles
Runtime Detection Evasion
Signature Evasion
Windows Internals
Initial access
Initial access
Password Attacks
Phishing
Weaponization
Network Security Evasion
Network Security Evasion
Firewalls
Network Security Solutions
Sandbox Evasion
Post Compromise
Post Compromise
Data Exfiltration
Enumeration
The Lay of The Land
Windows Local Persistence
System
System
Buffer Overflow
Buffer Overflow
Documentation
Exploitation
Web
Web
Cheatsheet
Documentation
Table of contents
VLAN Attacks
Resources
VLAN Attacks
https://www.kitploit.com/2022/08/vlanpwn-vlan-attacks-toolkit.html