CyberSecurity ToolKit
  • DoubtfulTurnip's CyberSecurity Toolkit
  • About the Turnip
  • CTF platforms
  • Tools List
    • Security Tools
      • Blue Team
      • Crypto & Cracking
      • Exploit
      • Post-Exploit
      • Forensics
      • ICS/IOT
      • Mobile
      • OSINT
      • POC
      • Red Team
      • Reversing & Binary Exploit
      • Scanning & Recon
    • Security Tool Plugins & Scripts
      • Nmap
      • Wordlists
      • Volatility
    • Privacy Tools
      • Collaboration
      • DNS
      • Email
      • Instant Messaging
      • Password Management
      • Search Engines
      • VPN
      • Web-Browser Privacy
    • Web Based Tools
      • Crypto & Cracking
      • Exploit
      • Forensics
      • OSINT
      • Reporting
      • Reversing & Binary Exploit
      • LOL
    • Misc Tools
      • Productivity
      • Web Browsing Enhancers
  • Guides
    • Cheat Sheets
      • General
      • Crypto & Cracking
      • Exploit
      • Forensics
      • Linux
      • Post-Exploitation
      • Recon
      • Network
      • Windows
      • SANS
    • Specific Techniques
      • Crypto & Cracking
      • Exploit
      • Forensic
      • Post-Exploit
      • Red Team
      • Reversing & Binary Exploit
    • Tool Usage Guides
    • Quick Reference Commands and Code
      • APK analysis
      • Linux Shell
      • LUA
      • Network Forensics
      • Perl
      • PowerShell
      • Python
      • Ruby
      • SSH Port Forwarding
      • Windows Command Prompt
  • Education
    • Educational Resources
      • Kids
      • Training Platform
      • Udemy
      • YouTube
      • Misc
  • CTF Archive
    • Retired CTF Write-ups
    • CSC CTF 2020 Challenges
      • Hack The Game 1 & 2
      • Respond Quickly or the puppy gets it
      • Corrupted File
      • raindoll
      • A Simple Cipher
      • Stop Being Esoteric
      • GrOops Policy
      • Unlocking Secrets
      • Numbers Stations and Locations 1
      • Numbers Stations and Locations 2
      • Numbers Stations and Locations 3
      • Numbers Stations and Locations 4
      • NoScope
      • ... If only we had MFA 1
      • ... If only we had MFA 2
      • ... If only we had MFA 3
      • ... If only we had MFA 4
      • Sometimes Simpler is Better
      • Catch Me If You Can Too
      • Guess What
      • Katz and Their Memory
      • A Bob's life 1
      • A Bob's life 2
      • A Bob's life 3
      • A Bob's life 4
      • A Bob's life 5
      • Hives 1
      • Hives 2
      • Hives 3
      • Hives 4
      • SNMP Shenanigans
      • Certified G
      • Magic Numbers are the best numbers
      • Getting Roasted
      • Remote Users / Getting Roasted 2
      • My Beautiful Research!
      • Find the Droids 1
      • Find the Droids 2
      • Find the Droids 4
      • TotalVirus
      • She sells PowerShells
    • CSC CTF 2020 Write-ups
      • Guess What
      • A Simple Cipher
      • Speed Me Up Scotty
      • Squinty
      • Down the rabbit hole 2
      • Sometimes Simpler is Better
      • Tiny Secrets
      • dota
      • TotalVirus
  • Sources
    • Curated List of Collated Lists
Powered by GitBook
On this page

Was this helpful?

  1. Education
  2. Educational Resources

Udemy

LogoWindows Privilege Escalation for OSCP & Beyond!Udemy
LogoLinux Privilege Escalation Tutorial: Become an Ethical HackerUdemy
LogoOnline Courses - Learn Anything, On Your Schedule | UdemyUdemy
LogoGitHub - EONRaider/violent-python3: Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.GitHub
PreviousTraining PlatformNextYouTube

Last updated 3 years ago

Was this helpful?