Foundations
Scoping, authorisation, rules of engagement, standards, documentation habits, delivery constraints and the business logic behind a real assessment.
HackTheCorePentest // Entry Map
Use this portal when you want the broadest route into research, internal operations, application security, cloud, API, identity, mobile, escalation, tradecraft, AI, cyber-physical work, code review, exploit development and reverse engineering.
Scoping, authorisation, rules of engagement, standards, documentation habits, delivery constraints and the business logic behind a real assessment.
Internal network assessments, password attacks, Active Directory tradecraft, C2, thick clients, persistence and pivoting.
Web testing workflows, OWASP coverage, browser tooling, client trust and application-layer exploitation.
REST, GraphQL, object-level access, OAuth/OIDC, JWT, schema abuse and API fuzzing.
AWS, Azure, GCP, Kubernetes, IaC drift, control-plane abuse and cloud identity.
Android and iOS testing, Frida, pinning bypass, storage, deep links and runtime analysis.
Entra, Okta, SSO, consent abuse, token theft, SCIM drift and conditional-access pressure.
Linux, Windows and macOS privilege escalation with a focus on enumeration, path discovery and practical abuse chains.
Payload staging, AV/EDR pressure, OPSEC, client-side chains, custom tooling and C2 tradecraft.
Git secrets, runner compromise, artifact poisoning, signing, SBOM and build-system trust.
Industrial protocols, PLC/HMI trust, segmentation failures and process-manipulation risk.
Prompt injection, jailbreaks, unsafe agents, retrieval abuse, tool compromise and model API pressure.
Autopilot, MAVLink, ROS, telemetry, companion computers and field-side control trust.
Shellcoding, payload construction, scripting for offensive use, exploit analysis and practical evasion concepts.
x86 and ARM basics, Ghidra, radare2, macOS analysis and memory-corruption-oriented reversing.