Skip to content

gregory-dean/security-testing-lab

Repository files navigation

Offensive Security Playbook

My structured collection of penetration testing methodology, vulnerability research, lab documentation, and offensive security techniques.

This repository serves as my personal knowledge base and portfolio documenting the tools, workflows, and methodologies I use while developing offensive security and vulnerability research skills.

The goal of this project is to build a continuously evolving reference for ethical hacking practices and penetration testing techniques.


Repository Structure

Section Description
Methodology High level penetration testing workflows and processes
Reconnaissance OSINT and target discovery techniques
Enumeration Service discovery and system enumeration techniques
Web App Testing Web vulnerability testing methods and examples
Privilege Escalation Linux and Windows escalation techniques
Active Directory AD attack paths and enumeration techniques
Vulnerability Research CVE research notes and disclosure documentation
Labs Practical lab environments and exploitation walkthroughs
Cheat Sheets Quick reference commands and tool usage
Templates Documentation templates for findings and reports

Topics Covered

  • Reconnaissance and OSINT
  • Network scanning and enumeration
  • Web application security testing
  • Privilege escalation techniques
  • Active Directory attack paths
  • Vulnerability research
  • Responsible disclosure
  • Penetration testing methodology

Example Workflow

A typical penetration testing workflow documented in this repository:

Reconnaissance
      ↓
Target Discovery
      ↓
Port Scanning
      ↓
Service Enumeration
      ↓
Vulnerability Identification
      ↓
Exploitation
      ↓
Privilege Escalation
      ↓
Post Exploitation
      ↓
Reporting

Purpose

This repository exists to:

  • Document penetration testing methodology
  • Track learning progress in offensive security
  • Build a structured reference for security testing
  • Demonstrate technical documentation skills
  • Share reproducible testing workflows

Ethical Use

All material in this repository is intended strictly for educational purposes and authorized security testing only.

Testing should only be conducted against systems you own or have explicit permission to assess.


Author

Gregory Dean
Cybersecurity | Offensive Security | Vulnerability Research

GitHub: https://github.com/gregory-dean

About

Offensive security methodology, pentesting workflows, vulnerability research notes, and lab documentation.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors