TorBT - Torrents and Magnet Links Search Engine

PENTESTING-BIBLE

File Name
Size
1-part-100-article/google/InfoSec_World 2013-W4-Using_Google_to_Find_Vulnerabilities-14Apr2013.pdf
24 MB
7-part-100-article/Postgres SQL Injection Cheat Sheet.pdf
110 kB
7-part-100-article/Organic HTTP File Transfer.pdf
312 kB
7-part-100-article/OSCP Notes by Ash.txt
23 kB
7-part-100-article/Pentesting Cheatsheet2.pdf
241 kB
7-part-100-article/Phishing with PowerPoint .pdf
456 kB
7-part-100-article/malware-analysis-cheat-sheet.pdf
190 kB
7-part-100-article/OSCP Notes – Shells .pdf
137 kB
7-part-100-article/OSCP Notes – Information Gathering .pdf
985 kB
7-part-100-article/Penetration Testing of an FTP Server.pdf
805 kB
7-part-100-article/Pentesting Cheatsheets.pdf
466 kB
7-part-100-article/PowerView-3.0 tips and tricks.pdf
151 kB
7-part-100-article/OWASP_Top_10_-_2017_Release_Candidate1_English.pdf
1.1 MB
7-part-100-article/PHP SSRF Techniques.pdf
3.8 MB
7-part-100-article/PowerUp.pdf
364 kB
7-part-100-article/Privilege Escalation.pdf
64 kB
7-part-100-article/Post Exploitation With Windows Credentials Editor (WCE) .pdf
311 kB
7-part-100-article/PowerPick – A ClickOnce Adjunct.pdf
986 kB
7-part-100-article/Post-Exploitation with PowerShell Empire 2.0.pdf
4.6 MB
7-part-100-article/OSCP-Survival-Guide.pdf
376 kB
7-part-100-article/Phishing with Maldocs.pdf
664 kB
7-part-100-article/new_articles/DNS Enumeration_ Top DNS Recon Tools and Techniques.pdf
736 kB
7-part-100-article/new_articles/Top GitHub Dorks and Tools Used to Scan GitHub Repositories for Sensitive Data.pdf
568 kB
7-part-100-article/new_articles/Extracting the payload from a pcap file using Python.pdf
1.4 MB
7-part-100-article/new_articles/Information Gathering with theHarvester.pdf
7.3 MB
7-part-100-article/new_articles/Microsoft Exchange – ACL .pdf
1.6 MB
7-part-100-article/new_articles/Microsoft Exchange – Domain Escalation .pdf
1.2 MB
7-part-100-article/new_articles/ssrf-open-redirect-cheat-sheet.pdf
1.0 MB
10-part-100-article/Understanding the ELF.pdf
308 kB
10-part-100-article/Windows post-exploitation.pdf
194 kB
10-part-100-article/Web Application Firewall (WAF) Evasion Techniques #2.pdf
2.0 MB
10-part-100-article/Universal Radio Hacker_ investigate wireless protocols like a boss.pdf
874 kB
10-part-100-article/Windows IR Live Forensics Cheat Sheet.pdf
550 kB
10-part-100-article/Wiping Out CSRF.pdf
575 kB
10-part-100-article/Userland API Monitoring and Code Injection Detection.pdf
736 kB
10-part-100-article/Vi Cheat Sheet ∞ .pdf
1.9 MB
10-part-100-article/Using WebDAV features as a covert channel.pdf
920 kB
10-part-100-article/USING A SCF FILE TO GATHER HASHES.pdf
368 kB
10-part-100-article/Windows Active Directory Post Exploitation Cheatsheet.pdf
186 kB
10-part-100-article/Unleashing an Ultimate XSS Polyglot.pdf
221 kB
10-part-100-article/www_slideshare_net_SamNizam_3_google_hacking(1).pdf
367 kB
10-part-100-article/Week in OSINT #2019–14.pdf
671 kB
10-part-100-article/X11 penetration testing.pdf
1.8 MB
10-part-100-article/Various public documents, whitepapers and articles about APT campaigns.pdf
477 kB
10-part-100-article/Webshell to Meterpreter.pdf
1.4 MB
10-part-100-article/XSS_Payloads.pdf
305 kB
10-part-100-article/WINDOWS DEFENDE R ATTACK SURFACE R ED U C TI ON RULES BYPASS.pdf
2.4 MB
10-part-100-article/Unix Linux Cheat Sheet.pdf
224 kB
10-part-100-article/unix-privesc-check.pdf
120 kB
10-part-100-article/Windows 10 UAC Loophole Can Be Used to Infect Systems with Malware.pdf
209 kB
10-part-100-article/USING THE DDE ATTACK WITH POWERSHELL EMPIRE.pdf
1.0 MB
10-part-100-article/Windows Atomic Tests by ATT&CK Tactic & Technique.pdf
248 kB
10-part-100-article/Windows Exploitation Tricks_ Abusing the User-Mode Debugger.pdf
256 kB
10-part-100-article/Working of Traceroute using Wireshark.pdf
3.8 MB
10-part-100-article/VNC tunneling over SSH.pdf
1.2 MB
10-part-100-article/Week in OSINT #2018–35.pdf
393 kB
10-part-100-article/Windows Privilege Abuse_ Auditing, Detection, and Defense.pdf
1.6 MB
10-part-100-article/Web Application Firewall (WAF) Evasion Techniques.pdf
1.8 MB
10-part-100-article/Windows Privilege Escalation Fundamentals.pdf
588 kB
10-part-100-article/Whole Vibratissimo Smart Sex Toy XSS Disclosure Authentication .pdf
1.6 MB
10-part-100-article/Unicode Domains are bad.pdf
2.4 MB
10-part-100-article/XSSer – Automated Framework Tool to Detect and Exploit XSS vulnerabilities.pdf
4.0 MB
10-part-100-article/XSS-Payloads.pdf
157 kB
10-part-100-article/Well, That Escalated Quickly....pdf
749 kB
10-part-100-article/Windows Userland Persistence Fundamentals.pdf
1.3 MB
10-part-100-article/WannaCry & Google Hacking.pdf
366 kB
10-part-100-article/Use Tor. Use Empire. .pdf
629 kB
10-part-100-article/Weak Service Permissions.pdf
1.9 MB
10-part-100-article/Understanding Privilege Escalation.pdf
260 kB
10-part-100-article/Wifi Post Exploitation on Remote PC.pdf
4.6 MB
10-part-100-article/Windows Domains, Pivot & Profit.pdf
4.7 MB
10-part-100-article/VNC Penetration Testing (Port 5901).pdf
2.1 MB
10-part-100-article/v Geist WatchDog Console 3.2.2 XSS XML Injection Insecure Permissions .pdf
2.0 MB
10-part-100-article/xss-payload-list..pdf
445 kB
10-part-100-article/Writing a Custom Shellcode Encoder.pdf
822 kB
10-part-100-article/Understanding Guide to Mimikatz.pdf
2.7 MB
10-part-100-article/Virtually Unlimited Memory_ Escaping the Chrome Sandbox.pdf
394 kB
10-part-100-article/www_slideshare_net_SamNizam_3_google_hacking.pdf
401 kB
10-part-100-article/XSS Filter Evasion Cheat Sheet.pdf
905 kB
10-part-100-article/Using SQL Server for attacking a Forest Trust.pdf
674 kB
10-part-100-article/Web Penetration Testing.pdf
613 kB
10-part-100-article/Use your macOS terminal shell to do awesome things..pdf
562 kB
10-part-100-article/VNC Pivoting through Meterpreter.pdf
1.2 MB
10-part-100-article/xssdb_net_xssdb_txt.pdf
149 kB
10-part-100-article/Web Application Penetration Testing Cheat Sheet ∞ .pdf
3.1 MB
10-part-100-article/Unquoted Service Path.pdf
1.3 MB
10-part-100-article/Windows Post Gather Modules.pdf
235 kB
10-part-100-article/Wiki to collect Red Team infrastructure hardening resources.pdf
2.5 MB
10-part-100-article/Windows Command Prompt cmd Cheat Sheet - The Hackr.pdf
793 kB
10-part-100-article/Windows Privilege Escalation.pdf
200 kB
10-part-100-article/Windows Local Privilege Escalation PowerUp.pdf
246 kB
10-part-100-article/xss-d3adend.org.txt.pdf
120 kB
10-part-100-article/Vulnerability Research Engineering Bookmarks Collection v1.0.txt
4.8 kB
10-part-100-article/us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-Languages.pdf
5.2 MB
10-part-100-article/WSH Injection_ A Case Study.pdf
328 kB
10-part-100-article/Vacuuming Image Metadata from The Wayback Machine.pdf
336 kB
10-part-100-article/xss_payloads_2016.pdf
150 kB
10-part-100-article/WiFi arsenal.pdf
781 kB
10-part-100-article/Windows Kernel Exploits.pdf
951 kB
10-part-100-article/us-17-Lekies-Dont-Trust-The-DOM-Bypassing-XSS-Mitigations-Via-Script-Gadgets.pdf
1.0 MB
10-part-100-article/wordpress_uploadify_dorks_priv8.txt
1.6 kB
10-part-100-article/Ultimate AppLocker ByPass List.pdf
425 kB
10-part-100-article/exploit/Windows Kernel Exploitation Part 3_ Integer Overflow.pdf
662 kB
10-part-100-article/exploit/Windows Reverse Shell Shellcode II..pdf
964 kB
10-part-100-article/exploit/Vulnserver – TRUN command buffer overflow exploit.pdf
1.1 MB
10-part-100-article/exploit/Windows Process Injection_ WordWarping, Hyphentension, AutoCourgette, Streamception, Oleum, ListPlanting, Treepoline.pdf
267 kB
10-part-100-article/exploit/Vulnserver – Fuzzing with Spike.pdf
988 kB
10-part-100-article/exploit/Koadic.pdf
1.5 MB
10-part-100-article/exploit/Part 7_ Return Oriented Programming.pdf
496 kB
10-part-100-article/exploit/Local Linux Enumeration & Privilege Escalation Cheatsheet.pdf
299 kB
10-part-100-article/exploit/Part 5_ Unicode 0x00410041.pdf
574 kB
10-part-100-article/exploit/Windows Exploit Development – Part 6_ SEH Exploits.pdf
4.0 MB
10-part-100-article/exploit/Testing initial access with _Generate-Macro_ in Atomic Red Team.pdf
1.3 MB
10-part-100-article/exploit/Shellcode_ Loading .NET Assemblies From Memory.pdf
528 kB
10-part-100-article/exploit/Dynamic Shellcode Execution.pdf
1.5 MB
10-part-100-article/exploit/Fork Sparta, Join The Legion.pdf
1.2 MB
10-part-100-article/exploit/TCP Bind Shell in Assembly (ARM 32-bit).pdf
620 kB
10-part-100-article/exploit/Offensive SPF_ How to Automate Anti-Phishing Reconnaissance Using Sender Policy Framework.pdf
1.8 MB
10-part-100-article/exploit/Part 1_ Introduction to Linux Exploit Development.pdf
93 kB
10-part-100-article/exploit/Part 3_ Structured Exception Handler (SEH).pdf
504 kB
10-part-100-article/exploit/Fuzzing VulnServer with Peach.pdf
524 kB
10-part-100-article/exploit/Malicious Input_ How Hackers Use Shellcode.pdf
1.0 MB
10-part-100-article/exploit/Shellcode_ In-Memory Execution of JavaScript, VBScript, JScript and XSL.pdf
389 kB
10-part-100-article/exploit/Those Pesky Powershell Shellcode’s And How To Understand Them.pdf
7.7 MB
10-part-100-article/exploit/Hiding with a Linux Rootkit .pdf
182 kB
10-part-100-article/exploit/Writing shellcodes for Windows x64.pdf
626 kB
10-part-100-article/exploit/Shellcode_ In-Memory Execution of DLL.pdf
250 kB
10-part-100-article/exploit/Windows Shellcode – Download and Execute Payload Using MSIEXEC.pdf
604 kB
10-part-100-article/exploit/R A S P B E R RY P I O N Q E M U.pdf
447 kB
10-part-100-article/exploit/How to debug an iOS application with Appmon and LLDB.pdf
442 kB
10-part-100-article/exploit/Windows Process Injection_ Breaking BaDDEr.pdf
286 kB
10-part-100-article/exploit/How I Found XSS By Searching In Shodan.pdf
756 kB
10-part-100-article/exploit/Windows Kernel Exploitation Part 2_ Type Confusion.pdf
530 kB
10-part-100-article/exploit/How-To_ Find IDOR (Insecure Direct Object Reference) Vulnerabilities for large bounty rewards.pdf
1.8 MB
10-part-100-article/exploit/Vulnserver – KSTET command exploit with egghunter.pdf
1.0 MB
10-part-100-article/exploit/Windows Exploit Development_ A simple buffer overflow example.pdf
1.2 MB
10-part-100-article/exploit/Exploit Mitigation Techniques - Data Execution Prevention (DEP) .pdf
276 kB
10-part-100-article/exploit/Windows Reverse Shell Shellcode I..pdf
966 kB
10-part-100-article/exploit/Egg Hunters.pdf
675 kB
10-part-100-article/exploit/Example of JS Malware .pdf
616 kB
10-part-100-article/exploit/Heap Exploit Development – Case study from an in-the-wild iOS 0-day.pdf
1.2 MB
10-part-100-article/exploit/Part 8_ Spraying the Heap [Chapter 1_ Vanilla EIP] – Putting Needles in the Haystack.pdf
507 kB
10-part-100-article/exploit/Getting started with ARM exploitation.pdf
630 kB
10-part-100-article/exploit/Windows Exploit Development – Part 2_ Intro to Stack Based Overflows.pdf
5.9 MB
10-part-100-article/exploit/Navigating To A Web Site Step By Step.pdf
2.9 MB
10-part-100-article/exploit/Part 9_ Spraying the Heap [Chapter 2_ Use-After-Free] – Finding a needle in a Haystack.pdf
696 kB
10-part-100-article/exploit/Windows Exploit Development – Part 3_ Changing Offsets and Rebased Modules.pdf
1.7 MB
10-part-100-article/exploit/[VulnHub] SmashTheTux - Chapter 0x00 - Basic Buffer Overflow & Ret2libc .pdf
232 kB
10-part-100-article/exploit/Part 1_ Introduction to Exploit Development.pdf
142 kB
10-part-100-article/exploit/Exploiting CVE–2019-1132_ Another NULL Pointer Dereference in Windows Kernel.pdf
403 kB
10-part-100-article/exploit/Vulnserver – GMON command SEH based overflow exploit.pdf
1.2 MB
10-part-100-article/exploit/Windows Kernel Exploitation Part 1_ Stack Buffer Overflows.pdf
829 kB
10-part-100-article/exploit/Exploit Development-Everything You Need to Know .pdf
898 kB
10-part-100-article/exploit/The Better Ettercap... Bettercap!.pdf
2.3 MB
10-part-100-article/exploit/Part 6_ Writing W32 shellcode.pdf
371 kB
10-part-100-article/exploit/Vulnserver – HTER command buffer overflow exploit.pdf
796 kB
10-part-100-article/exploit/Privilege Escalation Cheatsheet (Vulnhub) .pdf
1.7 MB
10-part-100-article/exploit/Weaponized Exploit Writing in GO FUSION0 .pdf
174 kB
10-part-100-article/exploit/Part 2_ Linux Format String Exploitation.pdf
292 kB
10-part-100-article/exploit/PowerShell ExecutionPolicy Bypass.pdf
1.1 MB
10-part-100-article/exploit/Going Phishing with Terraform.pdf
1.5 MB
10-part-100-article/exploit/Windows Exploit Development – Part 5_ Locating Shellcode With Egghunting.pdf
5.1 MB
10-part-100-article/exploit/One-Way Shellcode for firewall evasion using Out Of Band data .pdf
1.3 MB
10-part-100-article/exploit/TCP Reverse Shell in Assembly (ARM 32-bit).pdf
525 kB
10-part-100-article/exploit/Windows Exploit Development – Part 1_ The Basics.pdf
4.4 MB
10-part-100-article/exploit/How Red Teams Bypass AMSI and WLDP for .NET Dynamic Code.pdf
495 kB
10-part-100-article/exploit/Extracting “Stack Strings” from Shellcode .pdf
318 kB
10-part-100-article/exploit/Process Memory and Memory Corruptions.pdf
1.1 MB
10-part-100-article/exploit/Heap Overflows and the iOS Kernel Heap.pdf
615 kB
10-part-100-article/exploit/Part 2_ Saved Return Pointer Overflows.pdf
382 kB
10-part-100-article/exploit/Hyper-V memory internals. Guest OS memory access .pdf
7.2 MB
10-part-100-article/exploit/Exploiting Techniques _000 - ret2libc .pdf
320 kB
10-part-100-article/exploit/Introduction to Writing ARM Shellcode.pdf
416 kB
10-part-100-article/exploit/Shellcode_ Using the Exception Directory to find GetProcAddress.pdf
321 kB
9-part-100-article/The Solution for Web for Pentester-I.pdf
370 kB
9-part-100-article/SQL Injection Cheat Sheet.pdf
537 kB
9-part-100-article/Signal Desktop HTML Tag Injection Variant 2 .pdf
1.7 MB
9-part-100-article/Stealing Signatures and Making One Invalid Signature at a Time.pdf
486 kB
9-part-100-article/Top 3 Open Source SSL Testing Tools.pdf
1.1 MB
9-part-100-article/SQLite3 Injection Cheat Sheet.pdf
99 kB
9-part-100-article/The goal of this repository is to document the most common techniques to bypass AppLocker..pdf
411 kB
9-part-100-article/ssl crt.pdf
234 kB
9-part-100-article/Skeleton Key.pdf
970 kB
9-part-100-article/Secondary Logon Handle.pdf
785 kB
9-part-100-article/sqli_dork_2019.txt
74 kB
9-part-100-article/The Drebin Dataset.pdf
202 kB
9-part-100-article/Smart Google Search Queries To Find Vulnerable Sites – List of 4500+ Google Dorks.pdf
1.4 MB
9-part-100-article/Steganography.pdf
303 kB
9-part-100-article/scanless – A Tool for Perform Anonymous Port Scan on Target Websites.pdf
2.2 MB
9-part-100-article/Malware analysis, my own list of tools and resources.pdf
1.4 MB
9-part-100-article/SQL injection in an UPDATE query - a bug bounty story! .pdf
759 kB
9-part-100-article/stealingthe_network_executing_metasploit_empire_payloads_fro2.pdf
483 kB
2/BugBounty WriteUp — take attention and get Stored XSS.pdf
1.2 MB
2/Demystifying Code Injection Techniques_ Part 1 – Shellcode Injection.pdf
222 kB
2/0x7_ Custom_crypter – Linux-x86.pdf
309 kB
2/awesome-exploit-development.pdf
143 kB
2/0x2_ Shell_Reverse_TCP_IPV6 – Linux-x86.pdf
856 kB
2/0x0 Exploit Tutorial_ Buffer Overflow – Vanilla EIP Overwrite.pdf
3.3 MB
2/0x3_ Shellcode_Egg_Hunter – Linux-x86.pdf
3.7 MB
2/Androguard usage.pdf
162 kB
2/A Beginner’s Guide to Windows Shellcode Execution Techniques.pdf
663 kB
2/0x6_ Polymorphic_Shellcode_Example – Linux-x86.pdf
268 kB
2/Bypass Data Execution Protection (DEP) .pdf
398 kB
2/Atomic Red Team.pdf
1.6 MB
2/A deeper look at Equation Editor CVE-2017-11882 with encoded Shellcode.pdf
3.2 MB
2/autoBOF_ a Journey into Automation, Exploit Development, and Buffer Overflows.pdf
290 kB
2/Analysis of the Frenchy Shellcode .pdf
1.9 MB
2/A look at a bmp file with embedded shellcode.pdf
2.5 MB
2/An Introduction to Printer Exploitation .pdf
297 kB
2/Buffer Overflow Exploitation .pdf
212 kB
2/A nice list of useful coding tutorials.pdf
643 kB
2/7 Tools For Malicious Document Creation.pdf
1.8 MB
2/0x4_ ROT13_XOR_Encoder_MMX_Decoder_Shellcode – Linux-x86.pdf
363 kB
2/A Study in Exploit Development – Part 1_ Setup and Proof of Concept.pdf
6.0 MB
2/0x5_ Dissecting_Metasploit_Shellcode – Linux-x86.pdf
746 kB
2/Bypassing Anti-CSRF with Burp Suite Session Handling.pdf
1.8 MB
1-part-100-article/A curated list of hacking environments where you can train your cyber skills legally and safely.pdf
508 kB
1-part-100-article/6 Ways to Hack SSH Login Password.pdf
1.2 MB
1-part-100-article/221 Admin.txt
3.3 kB
1-part-100-article/10 Tips and Best Practices To Improve PHP Security.pdf
1.6 MB
1-part-100-article/A curated list of the awesome resources about the Vulnerability Research.pdf
496 kB
1-part-100-article/A curated list of awesome malware analysis tools and resources..pdf
477 kB
1-part-100-article/A curated list of awesome reversing resources.pdf
349 kB
1-part-100-article/A curated list of awesome Windows Exploitation resources, and shiny things. Inspired by awesom.pdf
413 kB
1-part-100-article/A bunch of links related to Linux kernel exploitation.pdf
373 kB
1-part-100-article/A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups..pdf
436 kB
1-part-100-article/10k_private_fortnite_dorks.txt
435 kB
1-part-100-article/6 Ways to Hack FTP Login Password.pdf
1.3 MB
1-part-100-article/A curated list of amazingly awesome PHP libraries, resources and shiny things..pdf
555 kB
1-part-100-article/4 ways to SMTP Enumeration.pdf
1.2 MB
1-part-100-article/A curated list of CVE PoCs.pdf
808 kB
1-part-100-article/17k_carding_dorks_2019(1).txt
29 kB
1-part-100-article/A collection of open source and commercial tools that aid in red team operations..pdf
850 kB
1-part-100-article/A collective list of public JSON APIs for use in security..pdf
325 kB
1-part-100-article/A curated list of resources for learning about application security.pdf
405 kB
1-part-100-article/A curated list of resources for learning about vehicle security and car hacking..pdf
490 kB
1-part-100-article/A curated list of CTF frameworks, libraries, resources and softwares.pdf
434 kB
1-part-100-article/A collected list of awesome security talks.pdf
395 kB
1-part-100-article/A curated list of awesome command-line frameworks, toolkits, guides and gizmos. Inspired by awesome-php..pdf
492 kB
1-part-100-article/A collection of sources of indicators of compromise.pdf
312 kB
1-part-100-article/A curated list of awesome YARA rules, tools, and people..pdf
399 kB
1-part-100-article/100_sqli_vulnerable_websites_jun,24,2018.txt
6.1 kB
1-part-100-article/A8-Cross-Site Request Forgery (CSRF).pdf
2.0 MB
1-part-100-article/5 ways to Exploit LFi Vulnerability.pdf
2.5 MB
1-part-100-article/7,000 Dorks for hacking into various sites.txt
314 kB
1-part-100-article/A curated list of Awesome Threat Intelligence resources.pdf
425 kB
1-part-100-article/10000_fresh_sqli_vulnerable_websites_list.txt
221 kB
1-part-100-article/A curated list of tools for incident response.pdf
387 kB
1-part-100-article/ACCESSING CLIPBOAR D FROM THE LOC K SC REEN IN WI NDOWS 10.pdf
2.0 MB
1-part-100-article/abusing phishing.pdf
495 kB
1-part-100-article/A collection of android security related resources.pdf
419 kB
1-part-100-article/A collection of various awesome lists for hackers, pentesters and security researchers.pdf
356 kB
1-part-100-article/5 Ways to Crawl a Website.pdf
1.8 MB
1-part-100-article/15k_btc_dorks.txt
479 kB
1-part-100-article/A curated list of awesome Python frameworks, libraries, software and resources.pdf
665 kB
1-part-100-article/5 ways to banner grappng.pdf
1.1 MB
1-part-100-article/5 Ways to Hack SMB Login Password.pdf
1.1 MB
1-part-100-article/650 DORKS CC BY yZeruhh _3 _!.txt
12 kB
1-part-100-article/A curated list of awesome infosec courses and training resources.pdf
444 kB
1-part-100-article/6 Ways to Hack PostgresSQL Login.pdf
1.3 MB
1-part-100-article/A curated list of awesome awesomeness.pdf
368 kB
1-part-100-article/A Course on Intermediate Level Linux Exploitation.pdf
300 kB
1-part-100-article/A collection of hacking penetration testing resources to make you better!.pdf
414 kB
1-part-100-article/A curated list of movies every hacker & cyberpunk must watch..pdf
441 kB
1-part-100-article/A collection of Red Team focused tools, scripts, and notes.pdf
301 kB
1-part-100-article/4 Ways to DNS Enumeration.pdf
1.4 MB
1-part-100-article/A collection of awesome software, libraries, documents, books, resources and cools stuffs about security..pdf
418 kB
1-part-100-article/A curated list of awesome forensic analysis tools and resources.pdf
382 kB
1-part-100-article/8500_sql_dorks.txt
754 B
1-part-100-article/15k btc dorks.pdf
1.5 MB
1-part-100-article/10k_hq_shopping_dorks.txt
345 kB
1-part-100-article/A curated list of amazingly awesome OSINT.pdf
938 kB
1-part-100-article/2019 OSINT Guide.pdf
973 kB
1-part-100-article/8k_carding_dorks__).txt
199 kB
1-part-100-article/A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development.pdf
308 kB
1-part-100-article/A Collection of Hacks in IoT Space so that we can address them (hopefully)..pdf
332 kB
1-part-100-article/A collection of hacking - penetration testing resources to make you better!.pdf
414 kB
1-part-100-article/A curated list of resources related to Industrial Control System (ICS) security..pdf
331 kB
1-part-100-article/A curated list of Web Security materials and resources.pdf
567 kB
1-part-100-article/4500_google_dorks.pdf
265 kB
1-part-100-article/A collection of awesome penetration testing resources, tools and other shiny things.pdf
500 kB
1-part-100-article/4 Ways to Hack Telnet Passsword.pdf
1.1 MB
1-part-100-article/6 Ways to Hack SNMP Password.pdf
1.1 MB
1-part-100-article/6 Ways to Hack VNC Login Password.pdf
1.3 MB
1-part-100-article/10k_btc_dorks.txt
322 kB
1-part-100-article/A curated list of awesome Hacking tutorials, tools and resources.pdf
354 kB
1-part-100-article/10k_hq_gaming_dorks.txt
354 kB
1-part-100-article/A curated list of static analysis tools, linters and code quality checkers for various programming languages.pdf
485 kB
1-part-100-article/5 ways to Banner Grabbing.pdf
1.1 MB
1-part-100-article/A curated list of awesome social engineering resources..pdf
380 kB
1-part-100-article/A curated list of Capture The Flag (CTF) frameworks, libraries, resources and softwares..pdf
401 kB
1-part-100-article/google/2000+ Latest Google And Carding Dorks 2019 (Updated).pdf
809 kB
1-part-100-article/google/CC Dork.pdf
260 kB
1-part-100-article/google/GOOGLE DORKS LIST .pdf
312 kB
1-part-100-article/google/Google Dorks For Hacking CCTV And Security Cameras .pdf
266 kB
1-part-100-article/google/Dork Fresh Carding 2019 4000++ List.pdf
327 kB
1-part-100-article/google/Latest Google Dorks SQL Injection List Collection– SQL Dorks 2017-2019.pdf
627 kB
1-part-100-article/google/Google Dorks – Use Google For Hacking websites and Databases.pdf
661 kB
1-part-100-article/google/intext.pdf
2.3 MB
1-part-100-article/google/Google Dorks List of 2018 for SQL Injection Hacking {NEW}.pdf
257 kB
1-part-100-article/google/Google Hacking (dorks) .pdf
257 kB
1-part-100-article/google/Shodan Queries.txt
7.5 kB
1-part-100-article/google/SharePoint Bing Queries.txt
9.5 kB
1-part-100-article/google/SharePoint Google Queries - 18MAR2012.txt
8.4 kB
1-part-100-article/google/dork-vuln-part2.txt
11 kB
1-part-100-article/google/gist_github_com_zbetcheckin_04e6a5d7f2d5ef8cfa3c298701f47f9c.pdf
121 kB
1-part-100-article/google/dork-vuln-part3.txt
53 kB
1-part-100-article/google/Dork Carding 2018 paypal & Credit Card .pdf
567 kB
1-part-100-article/google/dork-vuln-part1.txt
97 kB
1-part-100-article/google/Complete Google Dorks List in 2019 For Ethical Hacking and Penetration Testing.pdf
1.0 MB
1-part-100-article/google/Google Dorks for 2019 – Finding Insecure Websites.pdf
1.6 MB
1-part-100-article/google/Latest Google Dorks List 2019 [Google Hacking Secret].pdf
1.1 MB
1-part-100-article/google/300 Google Dork SQLi Vuln Fresh 2019.pdf
260 kB
1-part-100-article/google/Google Hacking – For fun and profit – I.pdf
749 kB
1-part-100-article/google/thehackrspace_com_google_hacking_google_dorks.pdf
1.5 MB
1-part-100-article/google/GHDB Reborn Dictionary - NEW ONLY - Exploit-DB.com - 21Sept2011.txt
140 kB
1-part-100-article/google/Using Google Dorks For Hacking.pdf
1.0 MB
1-part-100-article/google/3000+ Google Dorks List 2019 For SQL injection.pdf
225 kB
1-part-100-article/google/Bing Queries.txt
344 kB
1-part-100-article/google/Download Latest Biggest Carding Dorks List 2017 - 2018 .pdf
348 kB
1-part-100-article/google/www_technorelate_com_google_dork_list.pdf
727 kB
1-part-100-article/google/How To Hack With Google Dorks.pdf
562 kB
lista.txt
47 kB
1-part-100-article/google/Google Hacking Master List.pdf
155 kB
1-part-100-article/google/CREDIT CARD HACKING DORK .pdf
762 kB
1-part-100-article/google/How to Hack Website Top Methods to Hack Website in 2019.pdf
552 kB
1-part-100-article/google/Google Dorks, a brief list of resources.pdf
216 kB
1-part-100-article/google/Latest Carding Dorks List for Sql Injection 2019.pdf
324 kB
1-part-100-article/google/Exploring Google Hacking Techniques.pdf
290 kB
1-part-100-article/google/google_dork_adminlist_sguru.txt
4.2 kB
1-part-100-article/google/www_google_dorking_com_search_label_Filetype.pdf
932 kB
1-part-100-article/google/fresh_dorks_carding_2017-2018_by_Toxic Boys Team.txt
36 kB
1-part-100-article/google/GHDB Reborn Dictionary - Exploit-DB.com - 21Sept2011.txt
246 kB
1-part-100-article/google/How to use Google Dorks for Credit Cards Details.pdf
171 kB
1-part-100-article/google/google hacking as dorks mais perigosas.pdf
2.1 MB
6-part-100-article/Linux Privilege Escalation by Exploiting Cronjobs .pdf
2.9 MB
6-part-100-article/Building a Keyword Monitoring Pipeline with Python, Pastebin and Searx.pdf
543 kB
6-part-100-article/JSMVCOMFG - To sternly look at JavaScript MVC and Templating Frameworks .pdf
347 kB
6-part-100-article/ICMP Penetration Testing.pdf
2.3 MB
6-part-100-article/Hybrid Cobalt Strike Redirectors.pdf
244 kB
6-part-100-article/Ingres SQL Injection Cheat Sheet.pdf
110 kB
6-part-100-article/Lateral Movement using Excel.Application and DCOM.pdf
936 kB
6-part-100-article/Gain access to unsecured IP cameras with these Google dorks.txt
1.4 kB
6-part-100-article/Links for Doxing, Personal OSInt, Profiling, Footprinting, Cyberstalking.pdf
162 kB
6-part-100-article/[Kernel Exploitation] 2_ Payloads.pdf
790 kB
6-part-100-article/Insecure Registry Permissions.pdf
666 kB
6-part-100-article/Linux Post Exploitation Command List.pdf
159 kB
6-part-100-article/List Of Vulnerable SQL Injection Sites.pdf
155 kB
6-part-100-article/I Can See You! Open Source Intelligence (OSINT).pdf
286 kB
6-part-100-article/Introducing BloodHound.pdf
945 kB
6-part-100-article/IKARUS anti.virus and its 9 exploitable kernel vulnerabilities.pdf
283 kB
6-part-100-article/John The Ripper Hash Formats.pdf
229 kB
6-part-100-article/linux kerenal exploit.pdf
452 kB
6-part-100-article/Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence (Part 2).pdf
952 kB
6-part-100-article/InternetExplorer.Application for C2.pdf
637 kB
6-part-100-article/Kali Linux Cheat Sheet for Penetration Testers.pdf
1.0 MB
6-part-100-article/Links for the OSINT Team.pdf
481 kB
6-part-100-article/Macroless DOC malware that avoids detection with Yara rule.pdf
671 kB
6-part-100-article/LineageOS 14.1 Blueborne - RCE .pdf
1.7 MB
6-part-100-article/Jenkins Servers Infected With Miner.pdf
365 kB
6-part-100-article/Linux Advanced Privilege Escalation.pdf
105 kB
6-part-100-article/Linux Atomic Tests by ATT&CK Tactic & Technique.pdf
194 kB
6-part-100-article/Linux Essentials_ Curl Fundamentals
370 kB
6-part-100-article/Injecting Metasploit Payloads into Android Applications – Manually .pdf
998 kB
6-part-100-article/Kali Linux Cheat Sheet for Penetration Testerss.pdf
395 kB
6-part-100-article/Lateral Movement – WinRM.pdf
2.1 MB
6-part-100-article/Building an OSINT Reconnaissance Tool from Scratch.pdf
978 kB
6-part-100-article/Links-Mentioned-in-WPTonic-146.pdf
44 kB
6-part-100-article/LINUX PRIVILEGE ESCALATION.pdf
263 kB
6-part-100-article/IDS, IPS AND FIREWALL EVASION USING NMAP .pdf
1.1 MB
6-part-100-article/Intel SYSRET.pdf
502 kB
6-part-100-article/Linux Kernel Exploitation.pdf
374 kB
6-part-100-article/I N T R O D U C T I O N T O A R M A S S E M B LY B A S I C S.pdf
139 kB
6-part-100-article/Bug Hunting Methodology (part-1).pdf
531 kB
6-part-100-article/[Kernel Exploitation] 5_ Integer Overflow.pdf
776 kB
6-part-100-article/InvalidSign.pdf
320 kB
6-part-100-article/LINUX CHEAT SHEET.pdf
227 kB
6-part-100-article/IP Cams from around the world.pdf
299 kB
6-part-100-article/Fun with Metasploit Payloads.pdf
1.2 MB
6-part-100-article/Linux Privilege Escalation Scripts.pdf
93 kB
6-part-100-article/InfoZip UnZip 6.00 and 6.1c22 Buffer Overflow .pdf
1.6 MB
6-part-100-article/Latest hacks.pdf
464 kB
6-part-100-article/Lateral Movement – RDP.pdf
1.2 MB
6-part-100-article/I'll Get Your Credentials ... Later!.pdf
196 kB
6-part-100-article/Getting started in Bug Bounty.pdf
3.1 MB
6-part-100-article/Importance of Black Box Penetration Testing in Application Security.pdf
1.9 MB
6-part-100-article/LFI Cheat Sheet ∞ .pdf
942 kB
6-part-100-article/Investigative tools for finding people online and keeping yourself safe.txt
562 kB
6-part-100-article/48_article/Msfvenom Cheat Sheet.pdf
210 kB
6-part-100-article/48_article/Cloakify-Factory_ A Data Exfiltration Tool Uses Text-Based Steganography.pdf
1.3 MB
6-part-100-article/48_article/A Primer to Windows x64 shellcoding.pdf
710 kB
6-part-100-article/48_article/Captive Portal_The Definitive Guide.pdf
3.3 MB
6-part-100-article/48_article/Bypassing IDS Signatures with Simple Reverse Shells.pdf
445 kB
6-part-100-article/48_article/8 Wireshark Filters Every Wiretapper Uses to Spy on Web Conversations and Surfing Habits .pdf
949 kB
6-part-100-article/48_article/Practical Windows Kernel Exploitation
476 kB
6-part-100-article/48_article/Password Spraying Outlook Web Access_ Remote Shell.pdf
618 kB
6-part-100-article/48_article/Reverse shells.pdf
2.4 MB
6-part-100-article/48_article/OSCP Note - Common use of Netcat(nc) and Ncat.pdf
156 kB
6-part-100-article/48_article/The Journey to Try Harder_ TJnull’s Preparation Guide for PWK-OSCP.pdf
600 kB
6-part-100-article/48_article/XSS Payloads Cheat Sheet.pdf
204 kB
6-part-100-article/48_article/Undetectable C# & C++ Reverse Shells.pdf
3.0 MB
6-part-100-article/48_article/How to Hack WiFi with Rogue Access Point.pdf
1.2 MB
6-part-100-article/48_article/Passing OSCP.pdf
597 kB
6-part-100-article/48_article/MS Excel Weaponization Techniques.pdf
2.1 MB
6-part-100-article/48_article/Penetration Testing in Windows-Active Directory with Crackmapexec.pdf
2.6 MB
6-part-100-article/48_article/Evil Twin Attack_The Definitive Guide.pdf
3.9 MB
6-part-100-article/48_article/WPA2 Cracking Using HashCat.pdf
2.6 MB
6-part-100-article/48_article/How to decrypt WiFi traffic in Wireshark.pdf
1.3 MB
6-part-100-article/48_article/Reverse shell and some magic.pdf
1.7 MB
6-part-100-article/48_article/Using Wireshark_ Exporting Objects from a Pcap.pdf
4.4 MB
6-part-100-article/48_article/Decrypting TLS Browser Traffic With Wireshark – The Easy Way!.pdf
1.0 MB
6-part-100-article/48_article/Yet Another OSCP Exam Blog Post.pdf
148 kB
6-part-100-article/48_article/PEpper_ a python script to perform malware static analysis on Portable Executable format.pdf
367 kB
6-part-100-article/48_article/Setting up a Windows VM lab for kernel debugging.pdf
1.1 MB
6-part-100-article/48_article/-dev-random - Useful WinDbg Resources.pdf
3.2 MB
6-part-100-article/48_article/Tips for Reverse-Engineering Malicious Code.pdf
271 kB
6-part-100-article/48_article/Shells in Github Actions.pdf
201 kB
6-part-100-article/48_article/The Ultimate Fake Access Point [Walkthrough].pdf
1.2 MB
6-part-100-article/48_article/Making it Rain shells in Kubernetes
181 kB
6-part-100-article/48_article/eternalrelayx.py — Non-Admin NTLM Relaying & ETERNALBLUE Exploitation.pdf
898 kB
6-part-100-article/48_article/Using CloudFront to Relay Cobalt Strike Traffic.pdf
1.0 MB
6-part-100-article/48_article/Command and Control & Tunnelling via ICMP.pdf
1.2 MB
6-part-100-article/48_article/Automated WiFi Cracking.pdf
2.3 MB
6-part-100-article/48_article/Reverse Shells and Controlling Webcams.pdf
2.4 MB
6-part-100-article/48_article/Run PowerShell without Powershell.exe — Best tools & techniques.pdf
2.5 MB
6-part-100-article/48_article/new/Docker and Kubernetes Reverse shells
189 kB
6-part-100-article/48_article/new/Malware Traffic Analysis Exercise (July 2019) .pdf
481 kB
6-part-100-article/48_article/new/How to Use Wireshark_ Network Analysis, 2019 Style.pdf
332 kB
6-part-100-article/48_article/new/OSCP-PWK-Notes-Public.pdf
962 kB
5-part-100-article/HTTP to HTTPS WordPress Migration – In-Depth Guide.pdf
1.1 MB
5-part-100-article/how to bypass sql injection filter manualy.pdf
6.9 MB
5-part-100-article/Here is the list of Black Hat Arsenal Europe 2017 Tools List.pdf
920 kB
5-part-100-article/How I found a $5,000 Google Maps XSS (by fiddling with Protobuf).pdf
498 kB
5-part-100-article/Hiding Registry keys with PSRe ect.pdf
267 kB
5-part-100-article/Hacking a Website and Gaining Root Access using Dirty COW Exploit.pdf
568 kB
5-part-100-article/Group Policy Preferences.pdf
1.2 MB
5-part-100-article/Hot Potato.pdf
1.5 MB
5-part-100-article/How I Chained 4 vulnerabilities on GitHub Enterprise, From SSRF Execution Chain to RCE! .pdf
701 kB
5-part-100-article/Gobuster.pdf
237 kB
5-part-100-article/Google Dorking - Tutorial .pdf
181 kB
5-part-100-article/How I Identified 93k Domain-Frontable CloudFront Domains.pdf
519 kB
5-part-100-article/GitHub Enterprise Remote Code Execution.pdf
208 kB
5-part-100-article/HQL for pentesters .pdf
390 kB
5-part-100-article/Good reviews of CT-OSCE .txt
11 kB
5-part-100-article/Google Dorks List 2018.pdf
306 kB
5-part-100-article/How we exploited a remote code execution vulnerability in math.js.pdf
163 kB
5-part-100-article/Hello Hackrs, today i will show you how facebook can be hacked in 2k17..pdf
1.1 MB
5-part-100-article/Hijacking Digital Signatures.pdf
1.2 MB
5-part-100-article/google-dorks
14 kB
5-part-100-article/GitHub Enterprise SQL Injection .pdf
1.1 MB
5-part-100-article/How to Make a Captive Portal of Death.pdf
342 kB
5-part-100-article/Google Dorks For Carding [Huge List] - Part 1.pdf
434 kB
5-part-100-article/Google Dorks for Carding (HUGE LIST) .pdf
460 kB
5-part-100-article/hq_paid_dorks_mixed_gaming_lol_steam_..music_shoping.txt
356 kB
5-part-100-article/How to Enable and Monitor Firewall Log in Windows PC.pdf
2.8 MB
5-part-100-article/hq_fortnite__dorks_list.txt
190 kB
5-part-100-article/Golden Ticket.pdf
1.2 MB
5-part-100-article/How to bypass libinjection in many WAF NGWAF.pdf
139 kB
5-part-100-article/hq_dorks_2017_fresh_dorks!!!!!.txt
1.2 kB
5-part-100-article/Hacker101 is a free class for web security.pdf
300 kB
5-part-100-article/How to Evade Application Whitelisting Using REGSVR32 .pdf
823 kB
5-part-100-article/htmlpurifier_org_live_smoketests_xssAttacks_php.pdf
169 kB
5-part-100-article/Hack Any Android Phone with DroidJack (Beginner’s Guide).pdf
6.6 MB
5-part-100-article/GraphQL NoSQL Injection Through JSON Types.pdf
251 kB
5-part-100-article/github_com_RPISEC_Malware_blob_master_README_md.pdf
1.7 MB
5-part-100-article/googleprojectzero_blogspot_com_2019_04.pdf
256 kB
5-part-100-article/How to Steal the Telegram Desktop Session – Teleshadow.pdf
1.1 MB
5-part-100-article/How to Detect Meterpreter in Your PC.pdf
905 kB
5-part-100-article/How to use Public IP on Kali Linux.pdf
1.5 MB
5-part-100-article/HQ SQLI Google Dorks For Shops-Amazon.txt
11 kB
5-part-100-article/hq_paid_gaming_dorks.txt
354 kB
5-part-100-article/Hacking with JSP Shells.pdf
716 kB
5-part-100-article/How to prepare for PWK-OSCP, a noob-friendly guide .pdf
428 kB
5-part-100-article/How To Shot Web.pdf
9.9 MB
5-part-100-article/Google Hacking.pdf
876 kB
5-part-100-article/Google Dorks.pdf
213 kB
5-part-100-article/Google dorks for growth hackers.pdf
527 kB
5-part-100-article/new/OSINT.pdf
350 kB
5-part-100-article/new/CVE-2019-7286 Part II_ Gaining PC Control.pdf
578 kB
5-part-100-article/new/Vulnhub Write-up —DC-1.pdf
1.7 MB
5-part-100-article/new/HTB_ Unattended.pdf
1.9 MB
5-part-100-article/new/HTB_ Arkham.pdf
2.0 MB
5-part-100-article/new/CTF Series _ Vulnerable Machines.pdf
1.6 MB
5-part-100-article/new/HTB_ Ghoul.pdf
3.2 MB
5-part-100-article/new/Privilege escalation in Windows Domains (3-3).pdf
223 kB
5-part-100-article/new/Privilege escalation in Windows Domains (2-3).pdf
420 kB
5-part-100-article/new/Mobile penetration testing on Android using Drozer.pdf
541 kB
5-part-100-article/new/Open Source Intelligence Tools (OSINT).pdf
278 kB
5-part-100-article/new/Resources.pdf
2.1 MB
5-part-100-article/new/Check List - Mobile Application Testing II.pdf
1.6 MB
5-part-100-article/new/Network Security Monitoring.pdf
1.1 MB
5-part-100-article/new/Analysis and exploitation of Pegasus kernel vulnerabilities (CVE-2016-4655 CVE-2016-4656).pdf
712 kB
5-part-100-article/new/Analysis and Reproduction of iOS-OSX Vulnerability_ CVE-2019-7286.pdf
493 kB
5-part-100-article/new/Getting started of security whether it be pen testing, DFIR, reverse engineering.pdf
278 kB
5-part-100-article/new/[Hacking walkthrough] Another CTF challenge.pdf
655 kB
5-part-100-article/new/Android Malware Analysis _ Dissecting Hydra Dropper.pdf
2.4 MB
5-part-100-article/new/searching-instagram-part-2.pdf
3.3 MB
5-part-100-article/new/Analysis of CVE-2017-11882 Exploit in the Wild.pdf
3.3 MB
5-part-100-article/new/CrackMapExec - Cheatsheet .pdf
2.0 MB
5-part-100-article/new/Responder - CheatSheet .pdf
2.1 MB
5-part-100-article/new/Minimize false positives for WAF.pdf
571 kB
5-part-100-article/new/Pwn2Own 2019_ Microsoft Edge Renderer Exploitation (CVE-2019-0940). Part 1.pdf
369 kB
5-part-100-article/new/28 Essential AWS S3 CLI Command Examples to Manage Buckets and Objects.pdf
354 kB
5-part-100-article/new/Analysis of a CVE-2017-0199 Malicious RTF Document.pdf
1.8 MB
5-part-100-article/new/CVE-2019-12103 – Analysis of a Pre-Auth RCE on the TP-Link M7350, with Ghidra!.pdf
4.5 MB
5-part-100-article/new/Detailed Analysis of macOS Vulnerability CVE-2019-8507.pdf
478 kB
5-part-100-article/new/How to Build Your Own Penetration Testing Drop Box .pdf
979 kB
5-part-100-article/new/The Ultimate List of .NET Dependency Injection Frameworks.pdf
324 kB
5-part-100-article/new/Senstive Information Leak Lead To join any Organisation.pdf
544 kB
5-part-100-article/new/Pwn2Own 2019_ Microsoft Edge Sandbox Escape (CVE-2019-0938). Part 2.pdf
326 kB
5-part-100-article/new/Information Security Professional (CISSP Preparation).pdf
530 kB
5-part-100-article/new/Hacking with ZANTI- The mobile pentesting Toolkit 2019 latest update.pdf
3.3 MB
5-part-100-article/new/Infrastructure PenTest Series _ Part 2 - Vulnerability Analysis.pdf
1.4 MB
5-part-100-article/new/HTB_ Luke.pdf
1.1 MB
5-part-100-article/new/CVE-2019-3010 – Local privilege escalation on Solaris 11.x via xscreensaver.pdf
506 kB
5-part-100-article/new/OSCP Fun Guide.pdf
589 kB
5-part-100-article/new/Analyzing Keyboard Firmware Part 1.pdf
793 kB
5-part-100-article/new/6 Days Lab 1.1 Vulnhub.pdf
2.4 MB
5-part-100-article/new/How To Use The AWS API With S3 Buckets In Your Pen Test.pdf
2.5 MB
5-part-100-article/new/Commando VM_ Looking Around.pdf
794 kB
5-part-100-article/new/Analyzing Keyboard Firmware Part 2.pdf
455 kB
5-part-100-article/new/huge list of pentest tookit.pdf
910 kB
5-part-100-article/new/searching-instagram.pdf
5.3 MB
5-part-100-article/new/HTB_ CTF.pdf
1.4 MB
5-part-100-article/new/Images, posts & videos related to _X64dbg_.pdf
650 kB
5-part-100-article/new/Securing Web Applications.pdf
729 kB
5-part-100-article/new/Android Application Penetration Testing Checklist.pdf
866 kB
5-part-100-article/new/CVE-2019-5786_ Analysis & Exploitation of the recently patched Chrome vulnerability.pdf
282 kB
5-part-100-article/new/HTB_ Helpline.pdf
1.1 MB
5-part-100-article/new/Practical guide to NTLM Relaying in 2017 (A.K.A getting a foothold in under 5 minutes).pdf
427 kB
5-part-100-article/new/Mobile app tra ic analysis – For Fun.pdf
261 kB
5-part-100-article/new/Network scanning with nmap.pdf
766 kB
5-part-100-article/new/List of FTP Commands For Linux and Windows with Examples.pdf
533 kB
5-part-100-article/new/Open Source Intelligence (OSINT) Tools & Resources .pdf
392 kB
5-part-100-article/new/Muting the Twitter algorithm and using basic search operators for better OSINT research.pdf
2.6 MB
5-part-100-article/new/Violent Python and Exploit Development.pdf
409 kB
5-part-100-article/new/NetCat CheatSheet .pdf
923 kB
5-part-100-article/new/Python tools for penetration testers.pdf
171 kB
5-part-100-article/new/Web Application Penetration Testing Course.pdf
344 kB
5-part-100-article/new/Practical Malware Analysis.pdf
1.3 MB
5-part-100-article/new/Infrastructure PenTest Series _ Part 1 - Intelligence Gathering.pdf
477 kB
5-part-100-article/new/admin marks - my personal cheatsheet for little managment.pdf
348 kB
5-part-100-article/new/HTB_ Kryptos.pdf
1.3 MB
5-part-100-article/new/Pentesting Cheatsheet.pdf
317 kB
5-part-100-article/new/Art of Anti Detection 1 – Introduction to AV & Detection Techniques.pdf
1024 kB
5-part-100-article/new/HTB_ Holiday.pdf
1.5 MB
5-part-100-article/new/Malware Analysis — Tools And Resources.pdf
3.6 MB
5-part-100-article/new/Reversing obfuscated passwords.pdf
366 kB
5-part-100-article/new/Slurp – Amazon AWS S3 Bucket Enumerator.pdf
518 kB
5-part-100-article/new/Linux kernel exploit cheetsheet.pdf
379 kB
5-part-100-article/new/htb-writeup.pdf
882 kB
5-part-100-article/new/My HackTheBox CTF Methodology - From fresh box to root! .pdf
221 kB
5-part-100-article/new/osint_link_osint_part3.pdf
336 kB
5-part-100-article/new/Malware writing series - Python Malware, part 1.pdf
313 kB
latest_articles/LFI on Netherland Bank.pdf
433 kB
latest_articles/Live SQL Injection Exploitation with SQLMap – A Detailed Guide.pdf
2.4 MB
latest_articles/How I got 5500$ from Yahoo for RCE.pdf
588 kB
latest_articles/LFI to RCE via access_log injection.pdf
1.2 MB
latest_articles/today/Most Important Mobile Application Penetration Testing Cheat sheet with Tools & Resources for Security Professionals .pdf
2.0 MB
latest_articles/today/Hping3 Linux Tutorial.pdf
121 kB
latest_articles/today/Pentest-Cheat-Sheet.pdf
131 kB
latest_articles/today/Exploitation of Windows CVE-2019-0708 (BlueKeep)_ Three Ways to Write Data into the Kernel with RDP PDU.pdf
2.9 MB
latest_articles/today/SQL INJECTION CHEAT SHEET.pdf
153 kB
latest_articles/today/INFO-SEC RELATED CHEAT SHEETS.pdf
1.5 MB
latest_articles/today/Chaining Three Bugs to Get RCE in Microsoft AttackSurfaceAnalyzer.pdf
737 kB
latest_articles/today/windows_privesc .pdf
126 kB
latest_articles/today/How to become a cybersecurity pro_ A cheat sheet.pdf
224 kB
latest_articles/today/DVTA - Part 2 - Cert Pinning and Login Button.pdf
540 kB
latest_articles/today/oscp_links.pdf
145 kB
latest_articles/today/‘ip’ Command cheat sheet (Command Line Reference).pdf
83 kB
latest_articles/today/DVTA - Part 4 - Traffic Tampering with dnSpy.pdf
900 kB
latest_articles/today/DVTA - Part 3 - Network Recon.pdf
668 kB
latest_articles/today/Windows Privilege Escalation Scripts & Techniques.pdf
784 kB
latest_articles/today/On Username Enumeration.pdf
470 kB
latest_articles/today/DVTA - Part 5 - Client-side Storage and DLL Hijacking.pdf
732 kB
latest_articles/today/Cheating at Moonlighter - Part 4 - Defense.pdf
158 kB
latest_articles/today/Auto-sslscan (Automatic SSL Scanning) .pdf
664 kB
latest_articles/today/Detecting WMI Exploitation v1.1.pdf
416 kB
latest_articles/today/Wireless Penetration Testing Cheat Sheet.pdf
142 kB
4-part-100-article/Evilginx - Advanced Phishing with Two-factor Authentication Bypass.pdf
971 kB
4-part-100-article/burp-suiteup-fancy-scanning-mechanisms_3369.pdf
5.6 MB
4-part-100-article/exploit_dorks_for_joomla,fck_and_others_2015_old_but_gold.txt
2.9 kB
4-part-100-article/Exploiting Node.js deserialization bug for Remote Code Execution.pdf
1.6 MB
4-part-100-article/Docker Cheat Sheet.pdf
617 kB
4-part-100-article/FTP Pivoting through RDP.pdf
1.4 MB
4-part-100-article/face-it-compromised-next_6419.pdf
1.3 MB
4-part-100-article/“Fileless” UAC Bypass Using eventvwr.exe and Registry Hijacking.pdf
441 kB
4-part-100-article/Free SMTP Server List - SMTP Servers.pdf
174 kB
4-part-100-article/From Pass-the-Hash to Pass-the-Ticket with No Pain.pdf
1.3 MB
4-part-100-article/ENUMERATION.pdf
950 kB
4-part-100-article/Enabling Remote Desktop.pdf
226 kB
4-part-100-article/Find Details Of any Mobile Number, Email ID, IP Address in the world (Step By Step).pdf
2.5 MB
4-part-100-article/Excel macros with PowerShell.pdf
1022 kB
4-part-100-article/Exploiting System Shield AntiVirus Arbitrary Write Vulnerability using SeTakeOwnershipPrivilege.pdf
554 kB
4-part-100-article/DORKS 2018 .txt
107 kB
4-part-100-article/FIND HACKED EMAIL ADDRESSES.pdf
1.5 MB
4-part-100-article/DNS Tunnelling.pdf
844 kB
4-part-100-article/FLASH_Security.pdf
1.3 MB
4-part-100-article/Download Google Dorks List 2019.pdf
300 kB
4-part-100-article/FOOTPRINTING .pdf
832 kB
4-part-100-article/Building Profiles for a Social Engineering Attack.pdf
1.7 MB
4-part-100-article/Follow the Bitcoin With Python, BlockExplorer and Webhose.io.pdf
257 kB
4-part-100-article/Ethical Google Hacking - Sensitive Doc Dork (Part 2).pdf
305 kB
4-part-100-article/Dumping Clear-Text Credentials.pdf
1.6 MB
4-part-100-article/Dumping Domain Password Hashes .pdf
3.0 MB
4-part-100-article/External C2 (Third-party Command and Control).pdf
624 kB
4-part-100-article/empire_without_powershell_exe.pdf
913 kB
4-part-100-article/File Upload XSS.pdf
267 kB
4-part-100-article/From OSINT to Internal – Gaining Access from outside the perimeter.pdf
788 kB
4-part-100-article/Exploiting CSRF on JSON endpoints with Flash and redirects.pdf
672 kB
4-part-100-article/Expanding Skype Forensics with OSINT_ Email Accounts.pdf
167 kB
4-part-100-article/DOM based AngularJS sandbox escapes.pdf
347 kB
4-part-100-article/firewall bypss.pdf
1.2 MB
4-part-100-article/Dropbox for the Empire.pdf
856 kB
4-part-100-article/BurpSuit + SqlMap = One Love.pdf
488 kB
4-part-100-article/Find Identifying Information from a Phone Number Using OSINT Tools .pdf
1.7 MB
4-part-100-article/Fully undetectable backdooring PE file.pdf
1.9 MB
4-part-100-article/dorks.txt
232 kB
4-part-100-article/Dump LAPS passwords with ldapsearch.pdf
114 kB
4-part-100-article/“Fileless” UAC Bypass using sdclt.exe.pdf
877 kB
4-part-100-article/Enumeration for Linux Privilege Escalation .pdf
358 kB
4-part-100-article/Dummies guide to AWS Penetration Testing.pdf
1.8 MB
4-part-100-article/enum4linux Cheat Sheet ∞ .pdf
791 kB
4-part-100-article/Firebase Databases.pdf
472 kB
4-part-100-article/Empire Tips and Tricks.pdf
1.7 MB
4-part-100-article/dorks_list_fresh_carding_2018.txt
366 kB
4-part-100-article/Free Security and Hacking eBooks.pdf
336 kB
4-part-100-article/Executing Commands and Bypassing AppLocker with PowerShell Diagnostic Scripts.pdf
486 kB
4-part-100-article/Ericsson-LG iPECS NMS A.1Ac - Cleartext Credential Disclosure .pdf
1.3 MB
4-part-100-article/Doing RECON the correct way.pdf
529 kB
4-part-100-article/File System Access Using sqlmap.pdf
1.3 MB
4-part-100-article/Dns Recon Cheatsheet.pdf
176 kB
4-part-100-article/Exploit Office 2016 using CVE-2018-0802 .pdf
332 kB
4-part-100-article/Empire Domain Fronting.pdf
298 kB
4-part-100-article/Evil XML with two encodings .pdf
325 kB
4-part-100-article/Empire 1.5.pdf
85 kB
4-part-100-article/DOM XSS – auth.uber.com.pdf
1.1 MB
4-part-100-article/Free SMTP servers list.pdf
112 kB
4-part-100-article/Excess XSS.pdf
513 kB
4-part-100-article/Finding Target-relevant Domain Fronts.pdf
439 kB
8-part-100-article/Privilege Escalation & Post-Exploitation.pdf
477 kB
8-part-100-article/Reverse engineering and penetration testing on Android apps_ my own list of tools.pdf
442 kB
8-part-100-article/Netcat vs Cryptcat – Remote Shell to Control Kali Linux from Windows machine.pdf
2.2 MB
8-part-100-article/Open Source Intelligence Gathering 201 (Covering 12 additional techniques).pdf
1.6 MB
8-part-100-article/Neat tricks to bypass CSRF-protection.pdf
1.3 MB
8-part-100-article/Official Black Hat Arsenal Security Tools Repository.pdf
327 kB
8-part-100-article/Microsoft Windows - UAC Protection Bypass (Via Slui File Handler Hijack) (Metasploit).pdf
126 kB
8-part-100-article/Multi-Platform Macro Phishing Payloads.pdf
2.1 MB
8-part-100-article/Most Important Mobile Application Penetration Testing Cheat sheet with Tools & Resources for Security Professionals.pdf
398 kB
8-part-100-article/Microsoft Windows - Token Process Trust SID Access Check Bypass Privilege Escalation.pdf
102 kB
8-part-100-article/real_carding_dorks.txt
38 kB
8-part-100-article/Reverse Shell Cheat Sheet.pdf
107 kB
8-part-100-article/Research on CMSTP.exe.pdf
3.0 MB
8-part-100-article/Notes for taking the OSCP in 2097. Read in book form on GitBook.pdf
312 kB
8-part-100-article/Mimikatz – Windows Tutorial for Beginner (Part-1).pdf
1.2 MB
8-part-100-article/Most Important Endpoint Security & Threat Intelligence Tools List for Hackers and Security Professionals.pdf
1.9 MB
8-part-100-article/OFFICE 365 SAFE L INKS BYPASS.pdf
1.8 MB
8-part-100-article/Nmap Scans using Hex Value of Flags.pdf
1.3 MB
8-part-100-article/raw_githubusercontent_com_cyberspacekittens_XSS_master_XSS2_.pdf
2.0 MB
8-part-100-article/MySQL SQL Injection Cheat Sheet.pdf
90 kB
8-part-100-article/new_exploit_development_2018.txt
34 kB
8-part-100-article/Online Investigative Tools for Social Media Discovery and Locating People.pdf
503 kB
8-part-100-article/Office 365 Safe links bypass.pdf
1.8 MB
8-part-100-article/Mobile Application Penetration Testing Cheat Sheet2.pdf
367 kB
8-part-100-article/Microsoft Office – NTLM Hashes via Frameset.pdf
970 kB
8-part-100-article/Red Team Tips.pdf
1.0 MB
8-part-100-article/62_article/Android Applications Reversing 101 .pdf
3.1 MB
8-part-100-article/62_article/Docker for Pentesters.pdf
2.8 MB
8-part-100-article/62_article/MySQL Pentesting with Metasploit Framework.pdf
2.8 MB
8-part-100-article/62_article/Bypass HTTPS website…MITM (Man In The Middle Attack).pdf
554 kB
8-part-100-article/62_article/The new Facebook Graph Search – part 1 –.pdf
1.7 MB
8-part-100-article/62_article/Penetration Testing Your WordPress Website.pdf
719 kB
8-part-100-article/62_article/Metasploitable 3 and Flags.pdf
17 MB
8-part-100-article/62_article/A Penetration Testing Cheat Sheet For Windows Machine – Intrusion Detection.pdf
939 kB
8-part-100-article/62_article/Cracking Microsoft Excel Documents using John The Ripper.pdf
362 kB
8-part-100-article/62_article/Wireshark Cheatsheet .pdf
634 kB
8-part-100-article/62_article/OSINT Cheat Sheet.pdf
446 kB
8-part-100-article/62_article/Windows Privilege Escalation — Part 1 (Unquoted Service Path).pdf
3.3 MB
11-part-24-article/TOR Fronting – Utilising Hidden Services for Privacy.pdf
444 kB
11-part-24-article/[XSS] Re ected XSS Bypass Filter.pdf
291 kB
11-part-24-article/XXE OOB exploitation at Java 1.7+.pdf
330 kB
11-part-24-article/Trovebox 4.0.0-rc6 SQL Injection Bypss SSRF .pdf
1.4 MB
11-part-24-article/TP-Link EAP Controller CSRF Hard-Coded Key XSS .pdf
1.5 MB
11-part-24-article/XXE.pdf
314 kB
11-part-24-article/XXE_payloads.pdf
203 kB
11-part-24-article/56_article/GooGle Dorks List .pdf
132 kB
11-part-24-article/56_article/Exfiltration series_ Certexfil.pdf
561 kB
11-part-24-article/56_article/Google Hacking Mini-Guide.pdf
163 kB
11-part-24-article/56_article/How To Find Admin Login Page Of Any Website Using Hacking Tools .pdf
215 kB
11-part-24-article/56_article/Parrot OS on Windows (WSL).pdf
424 kB
11-part-24-article/56_article/Week in OSINT #2019–23.pdf
1.5 MB
11-part-24-article/56_article/Week in OSINT #2019–28.pdf
1.2 MB
11-part-24-article/56_article/Writing NMAP Scripts Like A Super-Hero.pdf
559 kB
11-part-24-article/56_article/Penetration Testing — mehr Komfort mit nmap.pdf
504 kB
11-part-24-article/56_article/Difference between Nmap TCP SYN Scan and TCP Connect Scan.pdf
943 kB
11-part-24-article/56_article/BugBounty @ Linkedln-How I wasable to bypass Open RedirectionProtection.pdf
249 kB
11-part-24-article/56_article/Google Dorks List - For Find Sensitive Data .pdf
467 kB
11-part-24-article/56_article/BugBounty — How I was able tobypass rewall to get RCE and thenwent from server shell to get rootuser account!.pdf
259 kB
11-part-24-article/56_article/Using Powershell to programmatically run nmap scans.pdf
252 kB
11-part-24-article/56_article/A guide to ethical hacking — Understanding Nmap.pdf
498 kB
11-part-24-article/56_article/Trust Direction_ An Enabler for Active Directory Enumeration andTrust Exploitation.pdf
694 kB
11-part-24-article/56_article/#BugBounty — “How I was able toshop for free!”- Payment PriceManipulation.pdf
502 kB
11-part-24-article/56_article/Tracking Users_ From Cookies to DeviceFingerprinting.pdf
320 kB
11-part-24-article/56_article/Bug Bounty Guide2.pdf
606 kB
11-part-24-article/56_article/google-dorks.pdf
196 kB
11-part-24-article/56_article/Google Dorks List “Google Hacking”.pdf
313 kB
11-part-24-article/56_article/#BugBounty — AWS S3 added to my“Bucket” list!.pdf
204 kB
11-part-24-article/56_article/Google Hacking Ethics.pdf
220 kB
11-part-24-article/56_article/#BugBounty — API keys leakage,Source code disclosure in India’slargest e-commerce healthcare company..pdf
314 kB
11-part-24-article/56_article/#BugBounty — Exploiting CRLFInjection can lands into a nice bounty.pdf
427 kB
11-part-24-article/56_article/Find Username, Password & CVV Data Using Google Dorks.pdf
164 kB
11-part-24-article/56_article/BugBounty — Compromising UserAccount- ”How I was able tocompromise user account via HTTPParameter Pollution(HPP)”.pdf
277 kB
11-part-24-article/56_article/#BugBounty — “Let me reset yourpassword and login into your account“-How I was able to Compromise anyUser Account via Reset PasswordFunctionality.pdf
271 kB
11-part-24-article/56_article/Trend Micro Threat Discovery Appliance - Session Generation Authentication Bypass (CVE-2016-8584) .pdf
642 kB
11-part-24-article/56_article/Google hacking (dorking) tutorial #1.pdf
261 kB
11-part-24-article/56_article/Understanding Nmap by using hping.pdf
631 kB
11-part-24-article/56_article/Nmap In The Windows Bash Shell (WSL).pdf
486 kB
11-part-24-article/56_article/#BugBounty — How I was able todownload the Source Code of India’sLargest Telecom Service Providerincluding dozens of more popularwebsites!.pdf
390 kB
11-part-24-article/56_article/Week in OSINT #2019–13.pdf
1.3 MB
11-part-24-article/56_article/Week in OSINT #2019–29.pdf
1.1 MB
11-part-24-article/56_article/XSS without HTML_ Client-Side Template Injection withAngularJS.pdf
402 kB
11-part-24-article/56_article/UAC BYPASS WITH ELEVATED PRIVILEGESWORKS ON ALL WINDOWS VERSIONS.pdf
302 kB
11-part-24-article/56_article/Exfiltration series_ Spotexfil.pdf
667 kB
11-part-24-article/56_article/How to never have a public S3 bucket.pdf
893 kB
11-part-24-article/56_article/#BugBounty — “I don’t need your current password to login into youraccount” - How could I completely takeover any user’s account in anonline classi ed ads company..pdf
314 kB
11-part-24-article/56_article/Detecting and Tracking the Red-Team.pdf
1.5 MB
11-part-24-article/56_article/Week in OSINT #2019–18.pdf
1.2 MB
11-part-24-article/56_article/NMAP How-To.pdf
515 kB
11-part-24-article/56_article/Red-Team_ Java Deserialization — From Discovery to Reverse Shell on Limited Environments.pdf
1.5 MB
11-part-24-article/56_article/google_hacking.pdf
935 kB
11-part-24-article/56_article/#BugBounty — “Journey from LFI toRCE!!!”-How I was able to get thesame in one of the India’s popularproperty buy-sell company..pdf
307 kB
11-part-24-article/56_article/Penetration Testing for Beginners_ Nmap.pdf
256 kB
2-part-100-article/android pentesting sheet .pdf
129 kB
2-part-100-article/best_google_hacking_list_on_the_net.(1).txt
32 kB
2-part-100-article/Airbnb – When Bypassing JSON Encoding, XSS Filter, WAF, CSP, and Auditor turns into Eight Vulnerabilities.pdf
5.3 MB
2-part-100-article/Keep Calm and Hack The Box - Devel.pdf
22 MB
2-part-100-article/Art of Shellcoding_ Basic AES Shellcode Crypter.pdf
1.2 MB
2-part-100-article/Exploiting Metasploitable without Metasploit ___ Samba Exploitation.pdf
1.1 MB
2-part-100-article/Big List Of Google Dorks Hacking..pdf
217 kB
2-part-100-article/billsempf_xss.txt.pdf
168 kB
2-part-100-article/Advanced Cross Site Scripting(XSS) Cheat Sheet.pdf
701 kB
2-part-100-article/ADVANCED CROSS SITE SCRIPTING (XSS) CHEAT SHEET.pdf
1.4 MB
2-part-100-article/Finding the Balance Between Speed & Accuracy During an Internet-wide Port Scanning.pdf
13 MB
2-part-100-article/Beginner Guide to impacket Tool kit.pdf
2.0 MB
2-part-100-article/A More Advanced Recon Automation #1 (Subdomains).pdf
260 kB
2-part-100-article/Beginner Guide to Website Footprinting.pdf
6.5 MB
2-part-100-article/A penetration tester’s guide to sub-domain enumeration.pdf
653 kB
2-part-100-article/Best of Post Exploitation Exploits & Tricks.pdf
844 kB
2-part-100-article/Advisory_ Java-Python FTP Injections Allow for Firewall Bypass.pdf
170 kB
2-part-100-article/$36k Google App Engine RCE .pdf
252 kB
2-part-100-article/0day _In the Wild_.pdf
105 kB
2-part-100-article/blog_kchung_co_reverse_engineering_hid_iclass_master_keys.pdf
1.2 MB
2-part-100-article/analyzing-malicious-document-files.pdf
204 kB
2-part-100-article/Bounty Write-up (HTB).pdf
529 kB
2-part-100-article/blackarch_org_scanner_html.pdf
560 kB
2-part-100-article/Beginners Guide for John the Ripper (Part 1).pdf
3.6 MB
2-part-100-article/Amazon’s customer service backdoor.pdf
395 kB
2-part-100-article/Aircrack-ng Cheatsheet.pdf
149 kB
2-part-100-article/Application Introspection & Hooking With Frida.pdf
852 kB
2-part-100-article/blog_fosec_vn_dns_data_exfiltration_what_is_this_and_how_to_.pdf
185 kB
2-part-100-article/adsecurity_org_p_3164.pdf
1.9 MB
2-part-100-article/BUG BOUNTY HUNTING (METHODOLOGY , TOOLKIT , TIPS & TRICKS , Blogs).pdf
610 kB
2-part-100-article/Alibaba CDN Domain Fronting.pdf
906 kB
2-part-100-article/A database of common, interesting or useful commands, in one handy referable form.pdf
357 kB
2-part-100-article/admin_login_dorks.txt
4.3 kB
2-part-100-article/Advance Passenger Information.pdf
383 kB
2-part-100-article/An authoritative list of awesome devsecops tools with the help from community experiments and contributions..pdf
361 kB
2-part-100-article/Analyzing CVE-2018-6376 – Joomla!, Second Order SQL Injection.pdf
2.7 MB
2-part-100-article/Beginner Guide to IPtables.pdf
1.1 MB
2-part-100-article/Hack The Box - LaCasaDePapel Writeup .pdf
12 MB
2-part-100-article/AppLocker Bypass – Regsvr32 .pdf
687 kB
2-part-100-article/Open Source Web Reconnaissance with Recon-ng.pdf
7.6 MB
2-part-100-article/Android Reverse Engineering 101 – Part 1.pdf
1.7 MB
2-part-100-article/Black Hat 2018 tools list.pdf
253 kB
2-part-100-article/An Information Security Reference That Doesn't Suck.pdf
414 kB
2-part-100-article/blackarch_org_social_html.pdf
416 kB
2-part-100-article/A list of web application security.pdf
349 kB
2-part-100-article/Android Security Bulletins.pdf
172 kB
2-part-100-article/Advanced ATM Penetration Testing Methods.pdf
2.2 MB
2-part-100-article/Anatomy of UAC Attacks.pdf
481 kB
2-part-100-article/Apache mod_python for red teams.pdf
537 kB
2-part-100-article/Open Source Intelligence with Maltego.pdf
12 MB
2-part-100-article/An A-Z Index of the Windows CMD command line.pdf
158 kB
2-part-100-article/Application whitelist bypass using XLL and embedded shellcode.pdf
96 kB
2-part-100-article/A NDROID M ALWARE G ENOME P ROJECT.pdf
290 kB
2-part-100-article/Android Secure Coding Standard.pdf
194 kB
2-part-100-article/bitrot_sh_cheatsheet.pdf
144 kB
2-part-100-article/an awesome list of honeypot resources.pdf
400 kB
2-part-100-article/Automating your reconnaissance workflow with 'meg'.pdf
1.5 MB
2-part-100-article/3k_dorks_shopping_by_rusev_-_hack-ar.com.txt
110 kB
2-part-100-article/Awesome.pdf
472 kB
2-part-100-article/Awesome XSS stuff.pdf
330 kB
2-part-100-article/A Red Teamer's guide to pivoting.pdf
344 kB
2-part-100-article/A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.pdf
317 kB
2-part-100-article/A list of useful payloads and bypass for Web Application Security and Pentest-CTF.pdf
340 kB
2-part-100-article/A Guide to Attacking Domain Trusts.pdf
1.1 MB
2-part-100-article/blog_nviso_be_2017_01_11_a_practical_guide_to_rfid_badge_cop.pdf
965 kB
2-part-100-article/android pentesting sheet 2.pdf
122 kB
2-part-100-article/A View of Persistence .pdf
3.6 MB
2-part-100-article/blackarch_org_webapp_html.pdf
506 kB
2-part-100-article/[BBP系列二] Uber XSS via Cookie .pdf
902 kB
2-part-100-article/Always Install Elevated.pdf
982 kB
2-part-100-article/And I did OSCP!.pdf
547 kB
2-part-100-article/Android App Security Checklist.pdf
405 kB
2-part-100-article/androguard_readthedocs_io_en_latest_tools_androaxml_html.pdf
72 kB
2-part-100-article/AWS changes its PenTesting permission requirement, Appsecco found out exactly what is allowed and what is not.pdf
928 kB
2-part-100-article/Android Bluetooth - BNEP bnep_data_ind() Remote Heap Disclosure .pdf
2.3 MB
2-part-100-article/Adversarial Tactics, Techniques & Common Knowledge.pdf
236 kB
2-part-100-article/bb/Container Escaper.pdf
1.8 MB
2-part-100-article/bb/CVE-2019-7315_ Genie Access WIP3BVAF IP Camera Directory Traversal .pdf
768 kB
2-part-100-article/bb/Beginner Tips to Own Boxes at HackTheBox !.pdf
1.2 MB
2-part-100-article/bb/Defining an Enterprise Penetration Test.pdf
3.4 MB
2-part-100-article/bb/Awesome Malware Analysis.pdf
324 kB
2-part-100-article/bb/Bug-Hunting-Day-5.pdf
80 kB
2-part-100-article/bb/Analysis of the JSE malware .pdf
843 kB
2-part-100-article/bb/Attack Simulation_ from No Access to Domain Admin.pdf
658 kB
2-part-100-article/bb/Beating Windows Defender. Analysis of Metasploit's new evasion modules..pdf
1.8 MB
2-part-100-article/bb/Detecting malicious downloads with Osquery, Rsyslog, Kafka, Python3, and VirusTotal .pdf
1.4 MB
2-part-100-article/bb/300+ Powerful Termux Hacking Tools For Hackers .pdf
374 kB
2-part-100-article/bb/Code Injection with Python .pdf
284 kB
2-part-100-article/bb/Bug-Hunting-Day-7.pdf
190 kB
2-part-100-article/bb/Bug-Hunting-Day-6.pdf
200 kB
2-part-100-article/bb/Analysis of a Trojan downloader.pdf
3.3 MB
2-part-100-article/bb/Bypassing 2FA For Fun With Evilginx2.pdf
912 kB
2-part-100-article/bb/Analyzing the TRITON industrial malware.pdf
405 kB
2-part-100-article/bb/Android-security.pdf
346 kB
2-part-100-article/bb/Career Cheatsheet.pdf
66 kB
2-part-100-article/bb/Awesome Penetration Testing.pdf
359 kB
2-part-100-article/bb/Bug-Hunting-Tips+Tricks.pdf
1.7 MB
2-part-100-article/bb/Bug-Bounty-Bookmarks.pdf
182 kB
2-part-100-article/bb/CVE-2019-0708 aka BlueKeep Blueteam cheatsheet[EN.pdf
186 kB
2-part-100-article/bb/Asset Enumeration_ Expanding a Target's Attack Surface.pdf
511 kB
2-part-100-article/new_articles/From unauthenticated to root on a supervision appliance.pdf
470 kB
2-part-100-article/new_articles/OSINT_Toolkit.pdf
106 kB
2-part-100-article/new_articles/Offensive Security___s CTP & OSCE Review.pdf
418 kB
2-part-100-article/new_articles/Mitre STEM CTF Cyber Challenge 2018_ Write-up.pdf
1.4 MB
2-part-100-article/new_articles/Hack The Box Write-up - Dropzone.pdf
99 kB
2-part-100-article/new_articles/How a double-free bug in WhatsApp turns to RCE .pdf
401 kB
2-part-100-article/new_articles/iOS Pentesting - Reversing Jailbreak.pdf
730 kB
2-part-100-article/new_articles/Linux-Unix-IT Tips and Tricks #2.pdf
289 kB
2-part-100-article/new_articles/Linux Notes + Cheatsheet.pdf
133 kB
2-part-100-article/new_articles/Linux-Unix-IT Tips and Tricks #3.pdf
297 kB
2-part-100-article/new_articles/Nmap Anonymization with Proxychains.pdf
273 kB
2-part-100-article/new_articles/Pentest Tips and Tricks #1.pdf
341 kB
2-part-100-article/new_articles/HacktheBox Writeup_ Jerry.pdf
930 kB
2-part-100-article/new_articles/i18 Challenge - Part 2.pdf
1.4 MB
2-part-100-article/new_articles/How to red team_ Domain fronting with Powershell Empire and CloudFront .pdf
1.9 MB
2-part-100-article/new_articles/PentesterLab -- Web for Pentester - SQL Injection.pdf
1.1 MB
2-part-100-article/new_articles/Linux-Unix-IT Tips and Tricks #1.pdf
278 kB
2-part-100-article/new_articles/Windows.pdf
1.4 MB
2-part-100-article/new_articles/Introduction to Computer Security.pdf
147 kB
2-part-100-article/new_articles/XSS Exploitation in DVWA (Bypass All Security).pdf
2.5 MB
2-part-100-article/new_articles/Windows - WPAD poisoning using Responder.pdf
1.4 MB
2-part-100-article/new_articles/iOS Pentesting Tools.pdf
138 kB
2-part-100-article/new_articles/Information Gathering with Shodan.pdf
5.2 MB
2-part-100-article/new_articles/NSA Cybersecurity publications.pdf
899 kB
2-part-100-article/new_articles/WordPress 5.0.0 Remote Code Execution.pdf
501 kB
2-part-100-article/new_articles/GoLang dropper with a Gravity RAT.pdf
121 kB
2-part-100-article/new_articles/Hack The Box Write-up - Calamity.pdf
131 kB
2-part-100-article/new_articles/trailofbits_github_io_ctf_forensics.pdf
269 kB
2-part-100-article/new_articles/Pentest_ Domo arigato mr. Roboto .pdf
264 kB
2-part-100-article/new_articles/Writing Malware Traffic Decrypters for ISFB-Ursnif .pdf
2.1 MB
2-part-100-article/new_articles/Pentest tools - Metasploit.pdf
1.4 MB
2-part-100-article/new_articles/OSCP+CTF Scripts.pdf
337 kB
2-part-100-article/new_articles/Hack The Box Write-up - DevOops.pdf
95 kB
2-part-100-article/new_articles/Write a Reverse TCP Shell in Go.pdf
667 kB
2-part-100-article/new_articles/[Hackthebox] Web challenge ___ HDC.pdf
878 kB
2-part-100-article/new_articles/Macro Malware Analysis.pdf
972 kB
2-part-100-article/new_articles/Hack The Box ___ Curling.pdf
3.2 MB
2-part-100-article/new_articles/Hack The Box Write-up - Access.pdf
215 kB
2-part-100-article/new_articles/Linux-Unix-IT Tips and Tricks #4.pdf
231 kB
2-part-100-article/new_articles/No Mercy.pdf
650 kB
2-part-100-article/new_articles/Pentest Tips and Tricks #2.pdf
270 kB
2-part-100-article/new_articles/Hack The Box Write-up - Active.pdf
109 kB
2-part-100-article/new_articles/Pentest_ Lazy Sys Admin .pdf
221 kB
2-part-100-article/new_articles/XXE.pdf
330 kB
2-part-100-article/new_articles/How to bypass AMSI and execute ANY malicious Powershell code.pdf
398 kB
2-part-100-article/new_articles/How I Found the Honeypot_ Dark Web OSINT and Image Processing .pdf
876 kB
2-part-100-article/new_articles/Pentest-Tools.pdf
316 kB
2-part-100-article/new_articles/Information gathering.pdf
500 kB
2-part-100-article/new_articles/Information Gathering With Cobalt Strike.pdf
1.3 MB
2-part-100-article/new_articles/Mr Robot Vulnhub Walkthrough.pdf
2.0 MB
2-part-100-article/new_articles/VulnHub ___Mr.Robot 1___ - CTF.pdf
979 kB
2-part-100-article/new_articles/Information Gathering with Google Search Engine.pdf
596 kB
2-part-100-article/new_articles/Hack The Box - Unattended.pdf
1.4 MB
2-part-100-article/new_articles/Links ___ start hacking.pdf
65 kB
2-part-100-article/new_articles/OSINT TOOLS A List of Open Source Verification and Investigation Tools and Methods .pdf
785 kB
2-part-100-article/new_articles/Write-up_ solution to a RE crackme.pdf
1.0 MB
2-part-100-article/new_articles/Security Resources Part - 2.pdf
154 kB
2-part-100-article/new_articles/MiKey - A Linux keylogger.pdf
323 kB
2-part-100-article/new_articles/Hack The Box Write-up - Carrier.pdf
147 kB
2-part-100-article/new_articles/i18 Challenge - Part 1.pdf
552 kB
2-part-100-article/new_articles/Writeup_ TRAFFIC ANALYSIS EXERCISE.pdf
276 kB
2-part-100-article/new_articles/[HTB] Bastion Walkthrough.pdf
2.4 MB
2-part-100-article/new_articles/Infrastructure PenTest Series _ Part 5 - Reporting.pdf
146 kB
2-part-100-article/new_articles/PicoCTF 2018 Writeup_ Forensics .pdf
572 kB
2-part-100-article/new_articles/WPA+WPA2-ENTERPRISE Best Practice Guide.pdf
36 kB
2-part-100-article/new_articles/Windows Notes + Cheatsheet.pdf
437 kB
2-part-100-article/new_articles/How to Learn Penetration Testing_ A Beginners Tutorial .pdf
1.0 MB
2-part-100-article/new_articles/Pentest lab - pWnOS.pdf
454 kB
2-part-100-article/new_articles/Flare-on Challenge 2018 Write-up.pdf
5.2 MB
2-part-100-article/new_articles/Port Scanning with Nmap.pdf
674 kB
2-part-100-article/new_articles/Malware on Steroids ___ Part 2_ Evading Antivirus in a Simulated Organizational Environment.pdf
3.6 MB
2-part-100-article/new_articles/Metasploit payloads evasion against Linux AV.pdf
2.1 MB
2-part-100-article/new_articles/iOS Pentesting - Static analysis.pdf
313 kB
2-part-100-article/new_articles/Hack The Box walkthrough_ Netmon.pdf
507 kB
2-part-100-article/new_articles/Petya-NotPetya Ransomware Analysis.pdf
1.3 MB
2-part-100-article/new_articles/Infrastructure PenTest Series _ Part 4 - Post Exploitation.pdf
483 kB
2-part-100-article/new_articles/HTB_ Hackback.pdf
3.8 MB
2-part-100-article/new_articles/Pentest_ owning Zico2 .pdf
239 kB
2-part-100-article/new_articles/Pentesting.pdf
116 kB
2-part-100-article/new_articles/Pond. Analoguepond.pdf
858 kB
2-part-100-article/new_articles/WiFi.pdf
463 kB
2-part-100-article/new_articles/Pentesting tools.pdf
361 kB
3-part-100-article/Bypass SSH Restriction by Port Relay.pdf
944 kB
3-part-100-article/Command and Control – Web Interface .pdf
848 kB
3-part-100-article/codewhitesec_blogspot_com_2018_05_poor_richfaces_html.pdf
422 kB
3-part-100-article/Defeating Windows User Account Control.pdf
364 kB
3-part-100-article/Detect SQL Injection Attack using Snort IDS.pdf
6.3 MB
3-part-100-article/Command and Control – Website .pdf
649 kB
3-part-100-article/Command and Control – Twitter.pdf
855 kB
3-part-100-article/Command and Control – DropBox.pdf
1.4 MB
3-part-100-article/camera_dorks.txt
4.2 kB
3-part-100-article/Collection of the cheat sheets useful for pentesting.pdf
330 kB
3-part-100-article/DEFENSE-IN-DEPTH WRIT E-UP.pdf
1.9 MB
3-part-100-article/Cross-site scripting .pdf
79 kB
3-part-100-article/Command and Control – Browser.pdf
737 kB
3-part-100-article/Discovery Scan.pdf
332 kB
3-part-100-article/Command and Control – Website Keyword.pdf
572 kB
3-part-100-article/Command and Control – Images .pdf
801 kB
3-part-100-article/Bypassing AMSI via COM Server Hijacking.pdf
769 kB
3-part-100-article/DB2 SQL Injection Cheat Sheet.pdf
86 kB
3-part-100-article/Command Line Cheat Sheet.pdf
388 kB
3-part-100-article/Bypassing Application Whitelisting By Using rcsi.exe.pdf
162 kB
3-part-100-article/Capcom Rootkit Proof-Of-Concept.pdf
947 kB
3-part-100-article/cofense_com_powerpoint_and_custom_actions.pdf
2.3 MB
3-part-100-article/Comprehensive Guide to SSH Tunnelling.pdf
3.2 MB
3-part-100-article/carding_dorks_2019.txt
82 kB
3-part-100-article/Command and Control – PowerShell.pdf
484 kB
3-part-100-article/Command and Control – WebDAV .pdf
879 kB
3-part-100-article/Checking for maliciousness in Acroform objects on PDF files.pdf
476 kB
3-part-100-article/Command and Control – HTTPS .pdf
923 kB
3-part-100-article/CSP bypassing form-action with reflected XSS.pdf
378 kB
3-part-100-article/Command and Control – Images.pdf
801 kB
3-part-100-article/Command and Control – ICMP.pdf
772 kB
3-part-100-article/Command and Control – JavaScript.pdf
1.0 MB
3-part-100-article/Designing Active Directory DACL Backdoors.pdf
7.3 MB
3-part-100-article/Comprehensive Guide to Crunch Tool.pdf
1.4 MB
3-part-100-article/Command and Control – Windows COM.pdf
1.2 MB
3-part-100-article/DLL Injection.pdf
996 kB
3-part-100-article/Cisco Auditing Tool & Cisco Global Exploiter to Exploit 14 Vulnerabilities in Cisco Switches and Routers.pdf
2.1 MB
3-part-100-article/Bypassing UAC using App Paths.pdf
691 kB
3-part-100-article/digital_forensics_sans_org_community_cheat_sheets.pdf
346 kB
3-part-100-article/code_google_com_archive_p_androguard_wikis_DatabaseAndroidMa.pdf
238 kB
3-part-100-article/CA Workload Automation AE CA Workload Control Center SQL Injection Code Execution .pdf
1.7 MB
3-part-100-article/Capture VNC Session of Remote PC using SetToolkit.pdf
7.8 MB
3-part-100-article/Decrypted content of eqgrp-auction-file.tar.xz.pdf
351 kB
3-part-100-article/CEH Module 1_ Introduction to Ethical Hacking .pdf
440 kB
3-part-100-article/byt3bl33d3r_github_io_getting_the_goods_with_crackmapexec_pa.pdf
118 kB
3-part-100-article/cracking-active-directory-passwords-how-cook-ad-crack_8697.pdf
736 kB
3-part-100-article/BYPASSING APPLICAT ION WHITELIS TI NG WI TH B GI NF O.pdf
2.5 MB
3-part-100-article/Compromising Jenkins and extracting credentials.pdf
574 kB
3-part-100-article/Cross Site Scripting ( XSS ) Vulnerability Payload List.pdf
636 kB
3-part-100-article/Command and Control – JavaScript .pdf
1.0 MB
3-part-100-article/Cross-Site Scripting (XSS) Payloads.pdf
304 kB
3-part-100-article/Check Meltdown Vulnerability in CPU.pdf
964 kB
3-part-100-article/byt3bl33d3r_github_io_getting_the_goods_with_crackmapexec_pa2.pdf
170 kB
3-part-100-article/Command and Control – WebSocket.pdf
750 kB
3-part-100-article/Command and Control – DNS .pdf
1.2 MB
3-part-100-article/Digging Through Someones Past Using OSINT.pdf
421 kB
3-part-100-article/DCShadow.pdf
596 kB
3-part-100-article/Command and Control – Gmail.pdf
1.3 MB
3-part-100-article/Bypassing Application Whitelisting By Using dnx.exe.pdf
226 kB
3-part-100-article/CloudFront Hijacking.pdf
1022 kB
3-part-100-article/Comprehensive Guide to Sqlmap (Target Options) .pdf
6.9 MB
3-part-100-article/BYPASSING DEVICE GUAR D UMCI USI NG CHM – CVE-20 17- 8 625.pdf
1.7 MB
3-part-100-article/Command and Control – WMI .pdf
900 kB
3-part-100-article/CloudFlare for Command and Control.pdf
593 kB
3-part-100-article/DLL Hijacking.pdf
803 kB
3-part-100-article/Command and Control – Kernel.pdf
1.0 MB
3-part-100-article/Crack WPA-WPA2 Wi-Fi Routers with Airodump-ng and Aircrack-ng-Hashcat 🖧.pdf
383 kB
3-part-100-article/CSRF Exploitation using XSS.pdf
1.2 MB
3-part-100-article/Dark Web OSINT Part Four_ Using Scikit-Learn to Find Hidden Service Clones.pdf
192 kB
3-part-100-article/Detecting Malicious Microsoft Office Macro Documents.pdf
776 kB
3-part-100-article/BYPASSING UAC ON WINDOWS 10 USING DISK CLEANUP.pdf
683 kB
3-part-100-article/hacking/Reverse engineering and penetration testing on Android apps_ my own list of tools.pdf
2.4 MB
3-part-100-article/hacking/How to make a “Ultra-Geek” Linux Workstation.pdf
244 kB
3-part-100-article/hacking/Android Apk reverse engineering using Apktool and Frida.pdf
900 kB
3-part-100-article/hacking/WinDbg Malware Analysis Cheat Sheet.pdf
2.0 MB
3-part-100-article/hacking/Building a Malware Analysis Lab_ Become a Malware Analysis Hunter in 2019.pdf
1.6 MB
3-part-100-article/hacking/Malware Analysis – Infostealer.Dyre.pdf
6.2 MB
3-part-100-article/hacking/malware-traffic-analysis.net.pdf
115 kB
3-part-100-article/hacking/Magento 2.3.1_ Unauthenticated Stored XSS to RCE.pdf
500 kB
3-part-100-article/hacking/GM328A reverse engineering, new firmware and Tetris!.pdf
4.9 MB
3-part-100-article/hacking/Windows Kernel Logic Bug Class_ Access Mode Mismatch in IO Manager .pdf
480 kB
3-part-100-article/hacking/Here Be Dragons_ Reverse Engineering with Ghidra - Part 0 [Main Windows & CrackMe].pdf
1.6 MB
3-part-100-article/hacking/Malware Analysis – Illusion Bot.pdf
2.7 MB
3-part-100-article/hacking/Android APK Reverse Engineering_ What’s in an APK.pdf
742 kB
3-part-100-article/hacking/Reverse engineering and penetration testing on iOS apps_ my own list of tools.pdf
2.7 MB
3-part-100-article/hacking/In-the-wild iOS Exploit Chain 2 .pdf
637 kB
3-part-100-article/hacking/In-the-wild iOS Exploit Chain 4 .pdf
596 kB
3-part-100-article/hacking/The Fully Remote Attack Surface of the iPhone .pdf
308 kB
3-part-100-article/hacking/#bugbountytip.pdf
343 kB
3-part-100-article/hacking/Reverse engineering 'Black Desert Online' (1. Preface).pdf
264 kB
3-part-100-article/hacking/In-the-wild iOS Exploit Chain 3 .pdf
705 kB
3-part-100-article/hacking/NetCat attack (CVE-2019-11184)_ steal encrypted SSH keystrokes exploiting DDIO.pdf
1000 kB
3-part-100-article/hacking/WordPress 5.1 CSRF to Remote Code Execution.pdf
419 kB
3-part-100-article/hacking/How to Get and Set Up a Free Windows VM for Malware Analysis.pdf
1.1 MB
3-part-100-article/hacking/Analyzing Malicious Documents Cheat Sheet.pdf
282 kB
3-part-100-article/hacking/The Many Possibilities of CVE-2019-8646 .pdf
419 kB
3-part-100-article/hacking/CVE-2019–10864_ Wp-Statistics Stored XSS.pdf
436 kB
3-part-100-article/hacking/In-the-wild iOS Exploit Chain 1 .pdf
686 kB
3-part-100-article/hacking/In-the-wild iOS Exploit Chain 5 .pdf
580 kB
3-part-100-article/hacking/Chaining Cache Poisoning To Stored XSS.pdf
598 kB
3-part-100-article/hacking/Reverse Engineering Resources for 2019.pdf
63 kB