How the note system works?
Most of us regardless of the field of we work we do need a reference to get back to when we need something that went out of memory. In cyber security, maintaining a list of notes and categorizing them is tremendously important as not everyone is able to remember details such as command line switches.
Over time, I built a huge list of cyber security notes inspired from field work, CTF challenges, self learning or even taken from books I occasionally read.
I organized my notes structure and categorized them into blue team and red team notes. Here is what I mean
As you can see, I try to list concepts and the corresponding command syntax if any to maintain context and easy of use. Obsidian is my preferred program to organize my notes.
Now why I am saying all of this to you? As you know not all of us can keep up and write notes every time you learn or come across something. Additionally, you may not know how to get started that’s why I offer my notes to be accessed online and on-demand for those who want to save their time and have a single cyber security reference of ready and up to date cyber security and penetration testing notes.
After you become a channel member, you will get online access to my notes through Google Drive. Here is what you will see once you get access
As you can see I use the same categorization much like my Obsidian notes.
The notes are in PDF format, you can see example below for Linux privilege escalation notes
The notes are over 200 pages of pdf content. I update the notes every other day as well to keep up with the latest evolvements in the cyber security field.
How do You get the notes?
You can get the notes by subscribing to my YouTube channel membership
Note: To preserve the author copyrights, the notes are only available via online access through Google drive.