Welcome to CSbyGB's Pentips
Last updated
Last updated
š³ Ethical Hacker |šAward-winning Pentester | Advocate for Cybersecurity Education for All | Board Member | Speaker | Instructor/Trainer š³ļøāš
š©āš», šļø, š Pentester, Cybersecurity Blogger and Advocate for CYBEREDUCATION FOR ALL.
š¤š Over 10 years of experience in Information Technology, including 5 years as Pentester
š» , š, š, š¤ Passionate about cybersecurity, approaching it in a holistic way encourages me for lifelong learning and sharpens my critical thinking skills.
āŗļø ,š ,š©āš š , ā»ļø, š³ Mindful of everyone's place in society, the promotion of digital security for all and accessibility to digital culture are driving my future.
šš šš² ššš§šš«š : ššš§šš¢š” šš¢š„ šš¬ššš„š£šššš šš
š©āš»Training / Education / Freelance š©āš»
šø Offensive Security consultant, Speaker, Instructor, Trainer, Technical writer ā¦ Companies like : Wehackpurple, InCyberā¦
šø See my LinkedIn here for more info
This is a gitbook with my pentest tips and notes from my learning journey as pentester (more than 400 pages to transfer here š ). It is a work in progress and it will be filled up asap with my notes and on the go as I learn new things everyday.
ā ļøāš“ā ļø This is provided for educational and informational purpose only "Pentesting" or other similar terms refer to legal intrusion tests that aim to identify vulnerabilities and improve cybersecurity, rather than for malicious purposes.
Everything used and mentioned here has to be used for an ETHICAL purpose, do not engage in any illegal activity using these resources ā ļøāš“ā ļø
I took these notes while working but also when using different resources. Here is a list :