About the Discussion Category

This is the discussion group for Cybernity

This is a place to talk about the full spectrum of subtopics
within Offensive Security. This can include (but is not limited to):

  • Information Gathering
  • Target Analysis
  • The art of the Exploit
  • Privilege Escalation
  • Persistence Of Exploit
  • Lateral Movement within a target network
  • Data Exflutration
  • Report Generation (generally, please do not make us proof read your reports)
  • Dustoff and Debrief with Blue team.

Also, more generally:

  • Definitions
  • Vectors
  • Tools and Usage