TurboWindX
  • Welcome
  • Hacking Methodologies
    • Known Tools & Technologies
    • Kill Chain
    • Phyisical and hardware
      • Full Screen Escape
  • Checklist - WebApps
  • Checklist - Windows
  • External Recon
    • Ports & services scanning
    • Web Recon
      • CMS
        • Wordpress
      • Path traversal & LFI/RFI
      • XSS - Cross site scripting
      • XML External Entity - XXE
  • Internal Recon
    • Active Directory
  • Post Exploitation
    • Container/Sandbox Breakout
    • Privilege Escalation
      • Hashing & Cracking
    • Persistence
      • Windows
    • Data Exfiltration
      • Steganography
      • Pivot & Tunneling
  • Shells
  • Protocols
    • FTP
    • SSH
    • DNS
    • IPP
  • Binary Exploitation
    • Linux - Simple reverse & crack
  • Memory Analysis
  • Forensics
  • Android & iOS
  • Database Injection & Exploitation
  • DDoS
  • Kubernetes & Docker
  • Phish
Powered by GitBook
On this page
  • whoami
  • Hacking Methodologies

Was this helpful?

Welcome

Reject weakness, embrace discipline.

NextKnown Tools & Technologies

Last updated 4 months ago

Was this helpful?

The world is your oyster You got a shell And it's up to you to escalate I wish you well

whoami

I am Alexandre, a cybersecurity analyst from Canada and I am.

On the internet, I go by many aliases like many of you but if you are here, you probably know me by my handle TurboWindX. I love to go above and beyond, sometimes discovering new things, sometimes finding myself in another rabbit hole.

Rome was not built in a day but it was taken in a single night.

Hacking Methodologies
OSCE3,OSED,OSEP,OSWE,OSCP, OSWP, and CCDCOE ITSAD/ADL394 certified
Turbo WindexYouTube
Logo