Welcome to CSbyGB's Pentips

$ whoami /priv

🏳 Ethical Hacker |πŸ†Award-winning Pentester | Advocate for Cybersecurity Education for All | Board Member | Speaker | Instructor/Trainer πŸ³οΈβ€πŸŒˆ

πŸ‘©β€πŸ’», πŸŽ™οΈ, πŸ”„ Pentester, Cybersecurity Blogger and Advocate for CYBEREDUCATION FOR ALL.

πŸ€“πŸ“… Over 10 years of experience in Information Technology, including 5 years as Pentester

πŸ’» , 🌐, πŸ“–, πŸ€” Passionate about cybersecurity, approaching it in a holistic way encourages me for lifelong learning and sharpens my critical thinking skills.

☺️ ,🌈 ,πŸ‘©β€πŸš€ πŸš€ , ♻️, 🌳 Mindful of everyone's place in society, the promotion of digital security for all and accessibility to digital culture are driving my future.

πŸ™πŸ™ 𝐌𝐲 𝐌𝐚𝐧𝐭𝐫𝐚 : π—”π—–π—§π—œπ—’π—‘ 𝗙𝗒π—₯ π—–π—¬π—•π—˜π—₯π—£π—˜π—”π—–π—˜ πŸ™πŸ™

πŸ‘©β€πŸ’»Training / Education / Freelance πŸ‘©β€πŸ’»

πŸ”Έ Offensive Security consultant, Speaker, Instructor, Trainer, Technical writer … Companies like : Wehackpurple, InCyber…

πŸ”Έ See my LinkedIn here for more info

What is this?

This is a gitbook with my pentest tips and notes from my learning journey as pentester (more than 400 pages to transfer here πŸ˜…). It is a work in progress and it will be filled up asap with my notes and on the go as I learn new things everyday.


βš οΈβ—πŸ”΄βš οΈ This is provided for educational and informational purpose only "Pentesting" or other similar terms refer to legal intrusion tests that aim to identify vulnerabilities and improve cybersecurity, rather than for malicious purposes.

Everything used and mentioned here has to be used for an ETHICAL purpose, do not engage in any illegal activity using these resources βš οΈβ—πŸ”΄βš οΈ

More about CSbyGB


I took these notes while working but also when using different resources. Here is a list :

Last updated