This is the discussion group for Cybernity
This is a place to talk about the full spectrum of subtopics
within Offensive Security. This can include (but is not limited to):
- Information Gathering
- Target Analysis
- The art of the Exploit
- Privilege Escalation
- Persistence Of Exploit
- Lateral Movement within a target network
- Data Exflutration
- Report Generation (generally, please do not make us proof read your reports)
- Dustoff and Debrief with Blue team.
Also, more generally:
- Definitions
- Vectors
- Tools and Usage