# Methodologies & Resources

- [Note Taking & Reporting For OSCP](/notes/methodologies-and-resources/note-taking-and-reporting-for-oscp.md)
- [Brute Force Attacks](/notes/methodologies-and-resources/brute-force-attacks.md)
- [Custom Wordlist Creation](/notes/methodologies-and-resources/brute-force-attacks/custom-wordlist-creation.md)
- [Tricks from  IppSec](/notes/methodologies-and-resources/tricks-from-ippsec.md)
- [Tunneling and Port Forwarding](/notes/methodologies-and-resources/tunneling-and-port-forwarding.md)
- [Port Forwarding on Linux](/notes/methodologies-and-resources/tunneling-and-port-forwarding/port-forwarding-on-linux.md)
- [SSH Tunneling](/notes/methodologies-and-resources/tunneling-and-port-forwarding/ssh-tunneling.md)
- [Port Forwarding with Windows](/notes/methodologies-and-resources/tunneling-and-port-forwarding/port-forwarding-with-windows.md)
- [Tunneling Through Deep Packet Inspection](/notes/methodologies-and-resources/tunneling-and-port-forwarding/tunneling-through-deep-packet-inspection.md)
- [Ligolo-ng](/notes/methodologies-and-resources/tunneling-and-port-forwarding/ligolo-ng.md)
- [Metasploit Framework](/notes/methodologies-and-resources/metasploit-framework.md)
- [Auxiliary Modules](/notes/methodologies-and-resources/metasploit-framework/auxiliary-modules.md)
- [Exploit Modules](/notes/methodologies-and-resources/metasploit-framework/exploit-modules.md)
- [Feroxbuster](/notes/methodologies-and-resources/feroxbuster.md)
- [Upgrading Revshells](/notes/methodologies-and-resources/upgrading-revshells.md)
- [Tricks from Burmat Gitbook](/notes/methodologies-and-resources/tricks-from-burmat-gitbook.md)
- [Creating Username Lists with Username Anarchy](/notes/methodologies-and-resources/creating-username-lists-with-username-anarchy.md)
- [Certificate Files (PFX, PUB, PEM)](/notes/methodologies-and-resources/certificate-files-pfx-pub-pem.md)
