# Links

A lot of these were found [here](https://github.com/collections/ctf-cybersec-resources).

## Other notebooks

* [TechNote](https://www.lazenca.net/display/TEC/TechNote) (Korean)
* [Hacktricks](https://book.hacktricks.xyz/)
* [0xFFsec](https://0xffsec.com/handbook/)
* [Kathan19](https://kathan19.gitbook.io/howtohunt/)<br>

## Open services

[Hacktricks](https://book.hacktricks.xyz/) contains a lot of information about pentesting specific protocols, as well as other gems.

## SSTI, SQLI, LFI, RFI, ...

Anywhere user input is accepted, there's a possibility for format trickery.

[PayloadsAllTheThings](https://github.com/swisskyrepo/PayloadsAllTheThings) has excellent lists of *everything* from server-side template injections to file traversal paths, etc. Take one of the intruder files and use it in your own scanning tool to quickly evaluate what's open and what's not.

[This cheat sheet](https://github.com/riramar/Web-Attack-Cheat-Sheet) contains a lot of tools and links.

## Unicode normalization bypass

[This](https://www.hahwul.com/phoenix/ssrf-open-redirect) page is about open redirects, but contains a neat table of unicode replacements that normalize to numbers and letters.

## OSINT

[jivoi](https://github.com/jivoi/awesome-osint)

## Privesc

[m0nad](https://github.com/m0nad/awesome-privilege-escalation)

## Windows and DOS

[Docs and such](http://bytepointer.com/resources/index.htm) for various microsoft platforms
