Personal study repository for INE's Junior Penetration Tester (eJPT) certification. Contains organized notes and practical scripts.
ejpt_note/
β
βββ 1 Information_Gathering/
β βββ 1 Passive Information Gathering/
β β βββ 1 Reconnaissance & Footprinting.md
β β βββ 2 WHOIS_Enumeration.md
β β βββ 3 Netcraft Website Footprinting.md
β β βββ 4 DNS Recon.md
β β βββ 5 WAF Detection.md
β β βββ 6 Subdomain Enumeration.md
β β βββ 7 Google Dorking.md
β β βββ 8 Email Harvesting.md
β β βββ 9 Leaked password databases.md
β β
β βββ 2 Active Information Gathering/
β βββ 1 DNS Zone Transfers.md
β βββ 2 Host Discovery with Nmap.md
β βββ 3 Port Scanning with Nmap.md
β
βββ 2 Scanning_Enumeration/ (coming soon)
βββ 3 Vulnerability_Assessment/ (coming soon)
βββ 4 Exploitation/ (coming soon)
βββ 5 Post_Exploitation/ (coming soon)
βββ 6 Web_Application_Testing/ (coming soon)
β
βββ scripts/ (automation helpers)
βββ recon.sh
βββ enum.py
βββ ...
Study Notes: Each topic has its own markdown file with:
- Core concepts and definitions
- Practical commands and examples
- Tool usage and syntax
- Tips and common pitfalls
Scripts: Automation tools to speed up repetitive tasks during labs and practice.
Clone the repository:
git clone https://github.com/Aliabdo6/ejpt_note.git
cd ejpt_noteBrowse the notes:
cd "1 Information_Gathering/1 Passive Information Gathering"
cat "2 WHOIS_Enumeration.md"Or open in your editor:
code .- Module 1: Information Gathering
- Passive Information Gathering (9 topics)
- Active Information Gathering (3 topics)
- Module 2: Scanning & Enumeration
- Module 3: Vulnerability Assessment
- Module 4: Exploitation
- Module 5: Post-Exploitation
- Module 6: Web Application Testing
All scripts accept command-line arguments (no hardcoded values):
# Example: Reconnaissance script
./scripts/recon.sh --target 10.10.10.5 --output ./results
# Example: Enumeration helper
python3 scripts/enum.py --target 10.10.10.5 --service httpEach script includes a --help flag for usage instructions.
For educational purposes only.
Only use these materials on systems you own or have explicit permission to test. Unauthorized access is illegal.
MIT License - See LICENSE file for details.
Suggestions and improvements are welcome! Keep notes concise and scripts dynamic (no hardcoded targets).
Status: π’ Active Development | Last Updated: October 2025