Cybersecurity Notes
Comprehensive notes on SOC operations, threat hunting, and incident response
Welcome to Cybersecurity Notes
Select a topic from the sidebar to view detailed notes.
Available Topics:
- Penetration Testing – Pre-engagement, reconnaissance, exploitation, post-exploitation
- Red Team Operations – Adversary emulation, stealth operations, persistence, objective-based attacks
- Blue Team Operations – Detection, monitoring, incident response, containment, recovery
- Cloud Security – AWS, Azure, and GCP security architecture and misconfiguration testing
- System and OS Security – Hardening, Linux, Windows and Active Directory
- Malware Analysis & Development – Payload development, evasion techniques, C2 communication
- Miscellaneous – Powershell, Cmd, Bash, and other security tools