Personal study repository for INE's Junior Penetration Tester (eJPT) certification. Contains organized notes and practical scripts.
ejpt_note/
│
├── 1 Information_Gathering/
│ ├── 1 Passive Information Gathering/
│ │ ├── 1 Reconnaissance & Footprinting.md
│ │ ├── 2 WHOIS_Enumeration.md
│ │ ├── 3 Netcraft Website Footprinting.md
│ │ ├── 4 DNS Recon.md
│ │ ├── 5 WAF Detection.md
│ │ ├── 6 Subdomain Enumeration.md
│ │ ├── 7 Google Dorking.md
│ │ ├── 8 Email Harvesting.md
│ │ └── 9 Leaked password databases.md
│ │
│ └── 2 Active Information Gathering/
│ ├── 1 DNS Zone Transfers.md
│ ├── 2 Host Discovery with Nmap.md
│ └── 3 Port Scanning with Nmap.md
│
├── 2 Scanning_Enumeration/ (coming soon)
├── 3 Vulnerability_Assessment/ (coming soon)
├── 4 Exploitation/ (coming soon)
├── 5 Post_Exploitation/ (coming soon)
├── 6 Web_Application_Testing/ (coming soon)
│
└── scripts/ (automation helpers)
├── recon.sh
├── enum.py
└── ...
Study Notes: Each topic has its own markdown file with:
- Core concepts and definitions
- Practical commands and examples
- Tool usage and syntax
- Tips and common pitfalls
Scripts: Automation tools to speed up repetitive tasks during labs and practice.
Clone the repository:
git clone https://github.com/Aliabdo6/ejpt_note.git
cd ejpt_noteBrowse the notes:
cd "1 Information_Gathering/1 Passive Information Gathering"
cat "2 WHOIS_Enumeration.md"Or open in your editor:
code .- Module 1: Information Gathering
- Passive Information Gathering (9 topics)
- Active Information Gathering (3 topics)
- Module 2: Scanning & Enumeration
- Module 3: Vulnerability Assessment
- Module 4: Exploitation
- Module 5: Post-Exploitation
- Module 6: Web Application Testing
All scripts accept command-line arguments (no hardcoded values):
# Example: Reconnaissance script
./scripts/recon.sh --target 10.10.10.5 --output ./results
# Example: Enumeration helper
python3 scripts/enum.py --target 10.10.10.5 --service httpEach script includes a --help flag for usage instructions.
For educational purposes only.
Only use these materials on systems you own or have explicit permission to test. Unauthorized access is illegal.
MIT License - See LICENSE file for details.
Suggestions and improvements are welcome! Keep notes concise and scripts dynamic (no hardcoded targets).
Status: 🟢 Active Development | Last Updated: October 2025