My structured collection of penetration testing methodology, vulnerability research, lab documentation, and offensive security techniques.
This repository serves as my personal knowledge base and portfolio documenting the tools, workflows, and methodologies I use while developing offensive security and vulnerability research skills.
The goal of this project is to build a continuously evolving reference for ethical hacking practices and penetration testing techniques.
| Section | Description |
|---|---|
| Methodology | High level penetration testing workflows and processes |
| Reconnaissance | OSINT and target discovery techniques |
| Enumeration | Service discovery and system enumeration techniques |
| Web App Testing | Web vulnerability testing methods and examples |
| Privilege Escalation | Linux and Windows escalation techniques |
| Active Directory | AD attack paths and enumeration techniques |
| Vulnerability Research | CVE research notes and disclosure documentation |
| Labs | Practical lab environments and exploitation walkthroughs |
| Cheat Sheets | Quick reference commands and tool usage |
| Templates | Documentation templates for findings and reports |
- Reconnaissance and OSINT
- Network scanning and enumeration
- Web application security testing
- Privilege escalation techniques
- Active Directory attack paths
- Vulnerability research
- Responsible disclosure
- Penetration testing methodology
A typical penetration testing workflow documented in this repository:
Reconnaissance
↓
Target Discovery
↓
Port Scanning
↓
Service Enumeration
↓
Vulnerability Identification
↓
Exploitation
↓
Privilege Escalation
↓
Post Exploitation
↓
Reporting
This repository exists to:
- Document penetration testing methodology
- Track learning progress in offensive security
- Build a structured reference for security testing
- Demonstrate technical documentation skills
- Share reproducible testing workflows
All material in this repository is intended strictly for educational purposes and authorized security testing only.
Testing should only be conducted against systems you own or have explicit permission to assess.
Gregory Dean
Cybersecurity | Offensive Security | Vulnerability Research
GitHub: https://github.com/gregory-dean