Skip to main content

Technical Notes & Guides

Edwin Tok | Shiro
Author
Edwin Tok | Shiro
「 ✦ OwO ✦ 」
Table of Contents

My Notes Collection
#

This is where I keep all my security testing notes - compiled from courses, blog posts, documentation, and too many hours of Googling. These aren’t original research, just my personal reference library that I’ve organized in a way that makes sense to me.

Disclaimer: These notes have been compiled from multiple sources across the internet with the goal of helping me (and hopefully you) learn. The credit for all techniques, tools, and methodologies belongs to their original authors and researchers. I’ve simply aggregated and organized them for easy reference. Use responsibly and only on systems you own or have explicit permission to test.

- Shiro


Core Penetration Testing
#

VAPT Notes (9 Parts)
#

Penetration testing fundamentals - everything from recon to privilege escalation.


Advanced Red Teaming
#

Red Team Notes (6 Parts)
#

Red team operations and adversary simulation tactics.


Command & Control Frameworks
#

Cobalt Strike Notes (5 Parts)
#

Cobalt Strike usage for red team engagements.

Sliver C2 Notes
#

Modern C2 framework - the open-source alternative


Web Application Security
#

Web Hacking & Bug Bounties (6 Parts)
#

Web app vulnerabilities and exploitation techniques.


Cloud Security
#

Cloud VAPT Notes
#

Security testing for AWS, Azure, and GCP.


Mobile Security
#

Mobile VAPT Notes
#

Android and iOS application security testing.

Android Security
#

iOS Security
#


Related