Courses

Pentesting con Kali En el Taller abordaremos todo lo relacionado a un Pentesting: La distribución Kali Linux, conoceremos el funcionamiento de las herramientas, bajo entornos reales daremos objetivos a ser escaneados y obtención de información.
Metasploit Unleashed
by Offensive Security
The most complete and in-depth Metasploit guide available, with contributions from the authors of the No Starch Press Metasploit Book. We will teach you how to use Metasploit, in a structured and intuitive manner. Additionally, this free online ethical hacking course makes a wonderful quick reference for penetration testers, red teams, and other security professionals.

Privilege Escalation

Windows Privilege Escalation

Windows Privilege Escalation Fundamentals This guide is meant to be a “fundamentals” for Windows privilege escalation.

Linux Privilege Escalation

Basic Linux Privilege Escalation Most cited material about basic linux privilege escalation.
Local Linux Enumeration & Privilege Escalation Cheatsheet List of a few Linux commands that may come in useful when trying to escalate privileges on a target system.
Linux Privilege Escalation Cheat Sheet Linux Priv Esc Cheat Sheet.

BOF - Buffer OverFlow

Simple Buffer Overflows This post will detail how to find a simple buffer overflow, gather the information you need to successfully exploit it and how to eventually get a reverse shell against someone running this program.
Offset DB (Windows) This website provide you a list of useful offset that you can use for your exploit different Windows versions. Useful to find stack pointers.

Meterpreter

Meterpreter Cheat Sheet  
Metasploit Cheat Sheet by SANS