PENTESTING-BIBLE
File List
- 1-part-100-article/google/InfoSec_World 2013-W4-Using_Google_to_Find_Vulnerabilities-14Apr2013.pdf 23.8 MB
- 2-part-100-article/Keep Calm and Hack The Box - Devel.pdf 22.1 MB
- 8-part-100-article/62_article/Metasploitable 3 and Flags.pdf 17.2 MB
- 2-part-100-article/Finding the Balance Between Speed & Accuracy During an Internet-wide Port Scanning.pdf 13.0 MB
- 2-part-100-article/Hack The Box - LaCasaDePapel Writeup .pdf 12.4 MB
- 2-part-100-article/Open Source Intelligence with Maltego.pdf 12.2 MB
- 5-part-100-article/How To Shot Web.pdf 9.9 MB
- 3-part-100-article/Capture VNC Session of Remote PC using SetToolkit.pdf 7.8 MB
- 10-part-100-article/exploit/Those Pesky Powershell Shellcode’s And How To Understand Them.pdf 7.7 MB
- 2-part-100-article/Open Source Web Reconnaissance with Recon-ng.pdf 7.6 MB
- 3-part-100-article/Designing Active Directory DACL Backdoors.pdf 7.3 MB
- 7-part-100-article/new_articles/Information Gathering with theHarvester.pdf 7.3 MB
- 10-part-100-article/exploit/Hyper-V memory internals. Guest OS memory access .pdf 7.2 MB
- 5-part-100-article/how to bypass sql injection filter manualy.pdf 6.9 MB
- 3-part-100-article/Comprehensive Guide to Sqlmap (Target Options) .pdf 6.9 MB
- 5-part-100-article/Hack Any Android Phone with DroidJack (Beginner’s Guide).pdf 6.6 MB
- 2-part-100-article/Beginner Guide to Website Footprinting.pdf 6.5 MB
- 3-part-100-article/Detect SQL Injection Attack using Snort IDS.pdf 6.3 MB
- 3-part-100-article/hacking/Malware Analysis – Infostealer.Dyre.pdf 6.2 MB
- 2/A Study in Exploit Development – Part 1_ Setup and Proof of Concept.pdf 6.0 MB
- 10-part-100-article/exploit/Windows Exploit Development – Part 2_ Intro to Stack Based Overflows.pdf 5.9 MB
- 4-part-100-article/burp-suiteup-fancy-scanning-mechanisms_3369.pdf 5.6 MB
- 2-part-100-article/Airbnb – When Bypassing JSON Encoding, XSS Filter, WAF, CSP, and Auditor turns into Eight Vulnerabilities.pdf 5.3 MB
- 5-part-100-article/new/searching-instagram.pdf 5.3 MB
- 2-part-100-article/new_articles/Information Gathering with Shodan.pdf 5.2 MB
- 10-part-100-article/us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-Languages.pdf 5.2 MB
- 2-part-100-article/new_articles/Flare-on Challenge 2018 Write-up.pdf 5.2 MB
- 10-part-100-article/exploit/Windows Exploit Development – Part 5_ Locating Shellcode With Egghunting.pdf 5.1 MB
- 3-part-100-article/hacking/GM328A reverse engineering, new firmware and Tetris!.pdf 4.9 MB
- 10-part-100-article/Windows Domains, Pivot & Profit.pdf 4.7 MB
- 7-part-100-article/Post-Exploitation with PowerShell Empire 2.0.pdf 4.6 MB
- 10-part-100-article/Wifi Post Exploitation on Remote PC.pdf 4.6 MB
- 5-part-100-article/new/CVE-2019-12103 – Analysis of a Pre-Auth RCE on the TP-Link M7350, with Ghidra!.pdf 4.5 MB
- 10-part-100-article/exploit/Windows Exploit Development – Part 1_ The Basics.pdf 4.4 MB
- 6-part-100-article/48_article/Using Wireshark_ Exporting Objects from a Pcap.pdf 4.4 MB
- 10-part-100-article/XSSer – Automated Framework Tool to Detect and Exploit XSS vulnerabilities.pdf 4.0 MB
- 10-part-100-article/exploit/Windows Exploit Development – Part 6_ SEH Exploits.pdf 4.0 MB
- 6-part-100-article/48_article/Evil Twin Attack_The Definitive Guide.pdf 3.9 MB
- 10-part-100-article/Working of Traceroute using Wireshark.pdf 3.8 MB
- 2-part-100-article/new_articles/HTB_ Hackback.pdf 3.8 MB
- 7-part-100-article/PHP SSRF Techniques.pdf 3.8 MB
- 2/0x3_ Shellcode_Egg_Hunter – Linux-x86.pdf 3.7 MB
- 2-part-100-article/new_articles/Malware on Steroids ___ Part 2_ Evading Antivirus in a Simulated Organizational Environment.pdf 3.6 MB
- 2-part-100-article/A View of Persistence .pdf 3.6 MB
- 2-part-100-article/Beginners Guide for John the Ripper (Part 1).pdf 3.6 MB
- 5-part-100-article/new/Malware Analysis — Tools And Resources.pdf 3.6 MB
- 2-part-100-article/bb/Defining an Enterprise Penetration Test.pdf 3.4 MB
- 5-part-100-article/new/searching-instagram-part-2.pdf 3.3 MB
- 5-part-100-article/new/Analysis of CVE-2017-11882 Exploit in the Wild.pdf 3.3 MB
- 2/0x0 Exploit Tutorial_ Buffer Overflow – Vanilla EIP Overwrite.pdf 3.3 MB
- 8-part-100-article/62_article/Windows Privilege Escalation — Part 1 (Unquoted Service Path).pdf 3.3 MB
- 5-part-100-article/new/Hacking with ZANTI- The mobile pentesting Toolkit 2019 latest update.pdf 3.3 MB
- 2-part-100-article/bb/Analysis of a Trojan downloader.pdf 3.3 MB
- 6-part-100-article/48_article/Captive Portal_The Definitive Guide.pdf 3.3 MB
- 3-part-100-article/Comprehensive Guide to SSH Tunnelling.pdf 3.2 MB
- 2/A deeper look at Equation Editor CVE-2017-11882 with encoded Shellcode.pdf 3.2 MB
- 5-part-100-article/new/HTB_ Ghoul.pdf 3.2 MB
- 6-part-100-article/48_article/-dev-random - Useful WinDbg Resources.pdf 3.2 MB
- 2-part-100-article/new_articles/Hack The Box ___ Curling.pdf 3.2 MB
- 10-part-100-article/Web Application Penetration Testing Cheat Sheet ∞ .pdf 3.1 MB
- 8-part-100-article/62_article/Android Applications Reversing 101 .pdf 3.1 MB
- 6-part-100-article/Getting started in Bug Bounty.pdf 3.1 MB
- 4-part-100-article/Dumping Domain Password Hashes .pdf 3.0 MB
- 8-part-100-article/Research on CMSTP.exe.pdf 3.0 MB
- 6-part-100-article/48_article/Undetectable C# & C++ Reverse Shells.pdf 3.0 MB
- 6-part-100-article/Linux Privilege Escalation by Exploiting Cronjobs .pdf 2.9 MB
- latest_articles/today/Exploitation of Windows CVE-2019-0708 (BlueKeep)_ Three Ways to Write Data into the Kernel with RDP PDU.pdf 2.9 MB
- 10-part-100-article/exploit/Navigating To A Web Site Step By Step.pdf 2.9 MB
- 8-part-100-article/62_article/Docker for Pentesters.pdf 2.8 MB
- 8-part-100-article/62_article/MySQL Pentesting with Metasploit Framework.pdf 2.8 MB
- 5-part-100-article/How to Enable and Monitor Firewall Log in Windows PC.pdf 2.8 MB
- 3-part-100-article/hacking/Malware Analysis – Illusion Bot.pdf 2.7 MB
- 2-part-100-article/Analyzing CVE-2018-6376 – Joomla!, Second Order SQL Injection.pdf 2.7 MB
- 10-part-100-article/Understanding Guide to Mimikatz.pdf 2.7 MB
- 3-part-100-article/hacking/Reverse engineering and penetration testing on iOS apps_ my own list of tools.pdf 2.7 MB
- 6-part-100-article/48_article/WPA2 Cracking Using HashCat.pdf 2.6 MB
- 6-part-100-article/48_article/Penetration Testing in Windows-Active Directory with Crackmapexec.pdf 2.6 MB
- 5-part-100-article/new/Muting the Twitter algorithm and using basic search operators for better OSINT research.pdf 2.6 MB
- 10-part-100-article/Wiki to collect Red Team infrastructure hardening resources.pdf 2.5 MB
- 4-part-100-article/Find Details Of any Mobile Number, Email ID, IP Address in the world (Step By Step).pdf 2.5 MB
- 5-part-100-article/new/How To Use The AWS API With S3 Buckets In Your Pen Test.pdf 2.5 MB
- 2/A look at a bmp file with embedded shellcode.pdf 2.5 MB
- 3-part-100-article/BYPASSING APPLICAT ION WHITELIS TI NG WI TH B GI NF O.pdf 2.5 MB
- 2-part-100-article/new_articles/XSS Exploitation in DVWA (Bypass All Security).pdf 2.5 MB
- 1-part-100-article/5 ways to Exploit LFi Vulnerability.pdf 2.5 MB
- 6-part-100-article/48_article/Run PowerShell without Powershell.exe — Best tools & techniques.pdf 2.5 MB
- 5-part-100-article/new/6 Days Lab 1.1 Vulnhub.pdf 2.4 MB
- 10-part-100-article/Unicode Domains are bad.pdf 2.4 MB
- 6-part-100-article/48_article/Reverse shells.pdf 2.4 MB
- 2-part-100-article/new_articles/[HTB] Bastion Walkthrough.pdf 2.4 MB
- 10-part-100-article/WINDOWS DEFENDE R ATTACK SURFACE R ED U C TI ON RULES BYPASS.pdf 2.4 MB
- 5-part-100-article/new/Android Malware Analysis _ Dissecting Hydra Dropper.pdf 2.4 MB
- 6-part-100-article/48_article/Reverse Shells and Controlling Webcams.pdf 2.4 MB
- latest_articles/Live SQL Injection Exploitation with SQLMap – A Detailed Guide.pdf 2.4 MB
- 3-part-100-article/hacking/Reverse engineering and penetration testing on Android apps_ my own list of tools.pdf 2.4 MB
- 1-part-100-article/google/intext.pdf 2.3 MB
- 10-part-100-article/exploit/The Better Ettercap... Bettercap!.pdf 2.3 MB
- 2-part-100-article/Android Bluetooth - BNEP bnep_data_ind() Remote Heap Disclosure .pdf 2.3 MB
- 3-part-100-article/cofense_com_powerpoint_and_custom_actions.pdf 2.3 MB
- 6-part-100-article/ICMP Penetration Testing.pdf 2.3 MB
- 6-part-100-article/48_article/Automated WiFi Cracking.pdf 2.3 MB
- 2-part-100-article/Advanced ATM Penetration Testing Methods.pdf 2.2 MB
- 8-part-100-article/Netcat vs Cryptcat – Remote Shell to Control Kali Linux from Windows machine.pdf 2.2 MB
- 9-part-100-article/scanless – A Tool for Perform Anonymous Port Scan on Target Websites.pdf 2.2 MB
- 5-part-100-article/new/Resources.pdf 2.1 MB
- 5-part-100-article/new/Responder - CheatSheet .pdf 2.1 MB
- 6-part-100-article/48_article/MS Excel Weaponization Techniques.pdf 2.1 MB
- 1-part-100-article/google/google hacking as dorks mais perigosas.pdf 2.1 MB
- 3-part-100-article/Cisco Auditing Tool & Cisco Global Exploiter to Exploit 14 Vulnerabilities in Cisco Switches and Routers.pdf 2.1 MB
- 6-part-100-article/Lateral Movement – WinRM.pdf 2.1 MB
- 2-part-100-article/new_articles/Metasploit payloads evasion against Linux AV.pdf 2.1 MB
- 10-part-100-article/VNC Penetration Testing (Port 5901).pdf 2.1 MB
- 2-part-100-article/new_articles/Writing Malware Traffic Decrypters for ISFB-Ursnif .pdf 2.1 MB
- 8-part-100-article/Multi-Platform Macro Phishing Payloads.pdf 2.1 MB
- latest_articles/today/Most Important Mobile Application Penetration Testing Cheat sheet with Tools & Resources for Security Professionals .pdf 2.0 MB
- 1-part-100-article/ACCESSING CLIPBOAR D FROM THE LOC K SC REEN IN WI NDOWS 10.pdf 2.0 MB
- 8-part-100-article/raw_githubusercontent_com_cyberspacekittens_XSS_master_XSS2_.pdf 2.0 MB
- 10-part-100-article/Web Application Firewall (WAF) Evasion Techniques #2.pdf 2.0 MB
- 2-part-100-article/new_articles/Mr Robot Vulnhub Walkthrough.pdf 2.0 MB
- 5-part-100-article/new/HTB_ Arkham.pdf 2.0 MB
- 1-part-100-article/A8-Cross-Site Request Forgery (CSRF).pdf 2.0 MB
- 10-part-100-article/v Geist WatchDog Console 3.2.2 XSS XML Injection Insecure Permissions .pdf 2.0 MB
- 5-part-100-article/new/CrackMapExec - Cheatsheet .pdf 2.0 MB
- 2-part-100-article/Beginner Guide to impacket Tool kit.pdf 2.0 MB
- 3-part-100-article/hacking/WinDbg Malware Analysis Cheat Sheet.pdf 2.0 MB
- 2-part-100-article/adsecurity_org_p_3164.pdf 1.9 MB
- 5-part-100-article/new/HTB_ Unattended.pdf 1.9 MB
- 8-part-100-article/Most Important Endpoint Security & Threat Intelligence Tools List for Hackers and Security Professionals.pdf 1.9 MB
- 10-part-100-article/Weak Service Permissions.pdf 1.9 MB
- 10-part-100-article/Vi Cheat Sheet ∞ .pdf 1.9 MB
- 4-part-100-article/Fully undetectable backdooring PE file.pdf 1.9 MB
- 2-part-100-article/new_articles/How to red team_ Domain fronting with Powershell Empire and CloudFront .pdf 1.9 MB
- 6-part-100-article/Importance of Black Box Penetration Testing in Application Security.pdf 1.9 MB
- 3-part-100-article/DEFENSE-IN-DEPTH WRIT E-UP.pdf 1.9 MB
- 2/Analysis of the Frenchy Shellcode .pdf 1.9 MB
- 5-part-100-article/new/Analysis of a CVE-2017-0199 Malicious RTF Document.pdf 1.8 MB
- 2-part-100-article/bb/Beating Windows Defender. Analysis of Metasploit's new evasion modules..pdf 1.8 MB
- 2/7 Tools For Malicious Document Creation.pdf 1.8 MB
- 10-part-100-article/X11 penetration testing.pdf 1.8 MB
- 10-part-100-article/Web Application Firewall (WAF) Evasion Techniques.pdf 1.8 MB
- 8-part-100-article/Office 365 Safe links bypass.pdf 1.8 MB
- 10-part-100-article/exploit/Offensive SPF_ How to Automate Anti-Phishing Reconnaissance Using Sender Policy Framework.pdf 1.8 MB
- 2/Bypassing Anti-CSRF with Burp Suite Session Handling.pdf 1.8 MB
- 8-part-100-article/OFFICE 365 SAFE L INKS BYPASS.pdf 1.8 MB
- 10-part-100-article/exploit/How-To_ Find IDOR (Insecure Direct Object Reference) Vulnerabilities for large bounty rewards.pdf 1.8 MB
- 2-part-100-article/bb/Container Escaper.pdf 1.8 MB
- 1-part-100-article/5 Ways to Crawl a Website.pdf 1.8 MB
- 4-part-100-article/Dummies guide to AWS Penetration Testing.pdf 1.8 MB
- 10-part-100-article/exploit/Privilege Escalation Cheatsheet (Vulnhub) .pdf 1.7 MB
- 5-part-100-article/new/Vulnhub Write-up —DC-1.pdf 1.7 MB
- 2-part-100-article/bb/Bug-Hunting-Tips+Tricks.pdf 1.7 MB
- 10-part-100-article/exploit/Windows Exploit Development – Part 3_ Changing Offsets and Rebased Modules.pdf 1.7 MB
- 9-part-100-article/Signal Desktop HTML Tag Injection Variant 2 .pdf 1.7 MB
- 4-part-100-article/Building Profiles for a Social Engineering Attack.pdf 1.7 MB
- 2-part-100-article/Android Reverse Engineering 101 – Part 1.pdf 1.7 MB
- 4-part-100-article/Empire Tips and Tricks.pdf 1.7 MB
- 8-part-100-article/62_article/The new Facebook Graph Search – part 1 –.pdf 1.7 MB
- 3-part-100-article/CA Workload Automation AE CA Workload Control Center SQL Injection Code Execution .pdf 1.7 MB
- 5-part-100-article/github_com_RPISEC_Malware_blob_master_README_md.pdf 1.7 MB
- 4-part-100-article/Find Identifying Information from a Phone Number Using OSINT Tools .pdf 1.7 MB
- 3-part-100-article/BYPASSING DEVICE GUAR D UMCI USI NG CHM – CVE-20 17- 8 625.pdf 1.7 MB
- 6-part-100-article/LineageOS 14.1 Blueborne - RCE .pdf 1.7 MB
- 6-part-100-article/48_article/Reverse shell and some magic.pdf 1.7 MB
- 4-part-100-article/Exploiting Node.js deserialization bug for Remote Code Execution.pdf 1.6 MB
- 7-part-100-article/new_articles/Microsoft Exchange – ACL .pdf 1.6 MB
- 1-part-100-article/google/Google Dorks for 2019 – Finding Insecure Websites.pdf 1.6 MB
- 2/Atomic Red Team.pdf 1.6 MB
- 5-part-100-article/new/CTF Series _ Vulnerable Machines.pdf 1.6 MB
- 3-part-100-article/hacking/Here Be Dragons_ Reverse Engineering with Ghidra - Part 0 [Main Windows & CrackMe].pdf 1.6 MB
- 8-part-100-article/Open Source Intelligence Gathering 201 (Covering 12 additional techniques).pdf 1.6 MB
- 3-part-100-article/hacking/Building a Malware Analysis Lab_ Become a Malware Analysis Hunter in 2019.pdf 1.6 MB
- 10-part-100-article/Whole Vibratissimo Smart Sex Toy XSS Disclosure Authentication .pdf 1.6 MB
- 10-part-100-article/Windows Privilege Abuse_ Auditing, Detection, and Defense.pdf 1.6 MB
- 4-part-100-article/Dumping Clear-Text Credentials.pdf 1.6 MB
- 6-part-100-article/InfoZip UnZip 6.00 and 6.1c22 Buffer Overflow .pdf 1.6 MB
- 5-part-100-article/new/Check List - Mobile Application Testing II.pdf 1.6 MB
- 1-part-100-article/10 Tips and Best Practices To Improve PHP Security.pdf 1.6 MB
- 10-part-100-article/exploit/Koadic.pdf 1.5 MB
- 10-part-100-article/exploit/Dynamic Shellcode Execution.pdf 1.5 MB
- 11-part-24-article/TP-Link EAP Controller CSRF Hard-Coded Key XSS .pdf 1.5 MB
- 2-part-100-article/Automating your reconnaissance workflow with 'meg'.pdf 1.5 MB
- latest_articles/today/INFO-SEC RELATED CHEAT SHEETS.pdf 1.5 MB
- 10-part-100-article/exploit/Going Phishing with Terraform.pdf 1.5 MB
- 4-part-100-article/FIND HACKED EMAIL ADDRESSES.pdf 1.5 MB
- 5-part-100-article/Hot Potato.pdf 1.5 MB
- 11-part-24-article/56_article/Week in OSINT #2019–23.pdf 1.5 MB
- 11-part-24-article/56_article/Detecting and Tracking the Red-Team.pdf 1.5 MB
- 1-part-100-article/15k btc dorks.pdf 1.5 MB
- 5-part-100-article/new/HTB_ Holiday.pdf 1.5 MB
- 5-part-100-article/How to use Public IP on Kali Linux.pdf 1.5 MB
- 11-part-24-article/56_article/Red-Team_ Java Deserialization — From Discovery to Reverse Shell on Limited Environments.pdf 1.5 MB
- 1-part-100-article/google/thehackrspace_com_google_hacking_google_dorks.pdf 1.5 MB
- 2-part-100-article/new_articles/Windows.pdf 1.4 MB
- 5-part-100-article/new/Infrastructure PenTest Series _ Part 2 - Vulnerability Analysis.pdf 1.4 MB
- 2-part-100-article/ADVANCED CROSS SITE SCRIPTING (XSS) CHEAT SHEET.pdf 1.4 MB
- 1-part-100-article/4 Ways to DNS Enumeration.pdf 1.4 MB
- 9-part-100-article/Malware analysis, my own list of tools and resources.pdf 1.4 MB
- 2-part-100-article/new_articles/Pentest tools - Metasploit.pdf 1.4 MB
- 11-part-24-article/Trovebox 4.0.0-rc6 SQL Injection Bypss SSRF .pdf 1.4 MB
- 2-part-100-article/new_articles/Hack The Box - Unattended.pdf 1.4 MB
- 2-part-100-article/new_articles/Windows - WPAD poisoning using Responder.pdf 1.4 MB
- 2-part-100-article/new_articles/i18 Challenge - Part 2.pdf 1.4 MB
- 10-part-100-article/Webshell to Meterpreter.pdf 1.4 MB
- 7-part-100-article/new_articles/Extracting the payload from a pcap file using Python.pdf 1.4 MB
- 3-part-100-article/Command and Control – DropBox.pdf 1.4 MB
- 2-part-100-article/bb/Detecting malicious downloads with Osquery, Rsyslog, Kafka, Python3, and VirusTotal .pdf 1.4 MB
- 5-part-100-article/new/HTB_ CTF.pdf 1.4 MB
- 4-part-100-article/FTP Pivoting through RDP.pdf 1.4 MB
- 2-part-100-article/new_articles/Mitre STEM CTF Cyber Challenge 2018_ Write-up.pdf 1.4 MB
- 3-part-100-article/Comprehensive Guide to Crunch Tool.pdf 1.4 MB
- 9-part-100-article/Smart Google Search Queries To Find Vulnerable Sites – List of 4500+ Google Dorks.pdf 1.4 MB
- 4-part-100-article/From Pass-the-Hash to Pass-the-Ticket with No Pain.pdf 1.3 MB
- 10-part-100-article/exploit/One-Way Shellcode for firewall evasion using Out Of Band data .pdf 1.3 MB
- 4-part-100-article/FLASH_Security.pdf 1.3 MB
- 4-part-100-article/File System Access Using sqlmap.pdf 1.3 MB
- 5-part-100-article/new/Practical Malware Analysis.pdf 1.3 MB
- 11-part-24-article/56_article/Week in OSINT #2019–13.pdf 1.3 MB
- 8-part-100-article/Neat tricks to bypass CSRF-protection.pdf 1.3 MB
- 1-part-100-article/6 Ways to Hack PostgresSQL Login.pdf 1.3 MB
- 4-part-100-article/face-it-compromised-next_6419.pdf 1.3 MB
- 6-part-100-article/48_article/Cloakify-Factory_ A Data Exfiltration Tool Uses Text-Based Steganography.pdf 1.3 MB
- 4-part-100-article/Ericsson-LG iPECS NMS A.1Ac - Cleartext Credential Disclosure .pdf 1.3 MB
- 10-part-100-article/Windows Userland Persistence Fundamentals.pdf 1.3 MB
- 8-part-100-article/Nmap Scans using Hex Value of Flags.pdf 1.3 MB
- 3-part-100-article/Command and Control – Gmail.pdf 1.3 MB
- 10-part-100-article/Unquoted Service Path.pdf 1.3 MB
- 2-part-100-article/new_articles/Petya-NotPetya Ransomware Analysis.pdf 1.3 MB
- 2-part-100-article/new_articles/Information Gathering With Cobalt Strike.pdf 1.3 MB
- 1-part-100-article/6 Ways to Hack VNC Login Password.pdf 1.3 MB
- 6-part-100-article/48_article/How to decrypt WiFi traffic in Wireshark.pdf 1.3 MB
- 1-part-100-article/6 Ways to Hack FTP Login Password.pdf 1.3 MB
- 5-part-100-article/new/HTB_ Kryptos.pdf 1.3 MB
- 10-part-100-article/exploit/Testing initial access with _Generate-Macro_ in Atomic Red Team.pdf 1.3 MB
- 5-part-100-article/Golden Ticket.pdf 1.2 MB
- 2/BugBounty WriteUp — take attention and get Stored XSS.pdf 1.2 MB
- latest_articles/LFI to RCE via access_log injection.pdf 1.2 MB
- 6-part-100-article/48_article/The Ultimate Fake Access Point [Walkthrough].pdf 1.2 MB
- 6-part-100-article/Fun with Metasploit Payloads.pdf 1.2 MB
- 1-part-100-article/6 Ways to Hack SSH Login Password.pdf 1.2 MB
- 10-part-100-article/VNC tunneling over SSH.pdf 1.2 MB
- 2-part-100-article/blog_kchung_co_reverse_engineering_hid_iclass_master_keys.pdf 1.2 MB
- 10-part-100-article/exploit/Fork Sparta, Join The Legion.pdf 1.2 MB
- 11-part-24-article/56_article/Week in OSINT #2019–18.pdf 1.2 MB
- 2-part-100-article/Art of Shellcoding_ Basic AES Shellcode Crypter.pdf 1.2 MB
- 10-part-100-article/exploit/Heap Exploit Development – Case study from an in-the-wild iOS 0-day.pdf 1.2 MB
- 10-part-100-article/exploit/Windows Exploit Development_ A simple buffer overflow example.pdf 1.2 MB
- 10-part-100-article/VNC Pivoting through Meterpreter.pdf 1.2 MB
- 3-part-100-article/Command and Control – Windows COM.pdf 1.2 MB
- 3-part-100-article/CSRF Exploitation using XSS.pdf 1.2 MB
- 6-part-100-article/Lateral Movement – RDP.pdf 1.2 MB
- 6-part-100-article/48_article/How to Hack WiFi with Rogue Access Point.pdf 1.2 MB
- 7-part-100-article/new_articles/Microsoft Exchange – Domain Escalation .pdf 1.2 MB
- 5-part-100-article/Hijacking Digital Signatures.pdf 1.2 MB
- 11-part-24-article/56_article/Week in OSINT #2019–28.pdf 1.2 MB
- 5-part-100-article/Group Policy Preferences.pdf 1.2 MB
- 4-part-100-article/firewall bypss.pdf 1.2 MB
- 2-part-100-article/bb/Beginner Tips to Own Boxes at HackTheBox !.pdf 1.2 MB
- 1-part-100-article/4 ways to SMTP Enumeration.pdf 1.2 MB
- 6-part-100-article/48_article/Command and Control & Tunnelling via ICMP.pdf 1.2 MB
- 3-part-100-article/Command and Control – DNS .pdf 1.2 MB
- 10-part-100-article/exploit/Vulnserver – GMON command SEH based overflow exploit.pdf 1.2 MB
- 8-part-100-article/Mimikatz – Windows Tutorial for Beginner (Part-1).pdf 1.2 MB
- 5-part-100-article/How to Steal the Telegram Desktop Session – Teleshadow.pdf 1.1 MB
- 6-part-100-article/IDS, IPS AND FIREWALL EVASION USING NMAP .pdf 1.1 MB
- 1-part-100-article/6 Ways to Hack SNMP Password.pdf 1.1 MB
- 6-part-100-article/48_article/Setting up a Windows VM lab for kernel debugging.pdf 1.1 MB
- 10-part-100-article/exploit/Process Memory and Memory Corruptions.pdf 1.1 MB
- 2-part-100-article/new_articles/PentesterLab -- Web for Pentester - SQL Injection.pdf 1.1 MB
- 2-part-100-article/Beginner Guide to IPtables.pdf 1.1 MB
- 1-part-100-article/5 Ways to Hack SMB Login Password.pdf 1.1 MB
- 3-part-100-article/hacking/How to Get and Set Up a Free Windows VM for Malware Analysis.pdf 1.1 MB
- 5-part-100-article/new/HTB_ Luke.pdf 1.1 MB
- 1-part-100-article/5 ways to Banner Grabbing.pdf 1.1 MB
- 1-part-100-article/5 ways to banner grappng.pdf 1.1 MB
- 2-part-100-article/A Guide to Attacking Domain Trusts.pdf 1.1 MB
- 11-part-24-article/56_article/Week in OSINT #2019–29.pdf 1.1 MB
- 10-part-100-article/exploit/Vulnserver – TRUN command buffer overflow exploit.pdf 1.1 MB
- 1-part-100-article/google/Latest Google Dorks List 2019 [Google Hacking Secret].pdf 1.1 MB
- 5-part-100-article/GitHub Enterprise SQL Injection .pdf 1.1 MB
- 1-part-100-article/4 Ways to Hack Telnet Passsword.pdf 1.1 MB
- 2-part-100-article/Exploiting Metasploitable without Metasploit ___ Samba Exploitation.pdf 1.1 MB
- 5-part-100-article/new/HTB_ Helpline.pdf 1.1 MB
- 5-part-100-article/Hello Hackrs, today i will show you how facebook can be hacked in 2k17..pdf 1.1 MB
- 10-part-100-article/exploit/PowerShell ExecutionPolicy Bypass.pdf 1.1 MB
- 5-part-100-article/new/Network Security Monitoring.pdf 1.1 MB
- 4-part-100-article/DOM XSS – auth.uber.com.pdf 1.1 MB
- 5-part-100-article/HTTP to HTTPS WordPress Migration – In-Depth Guide.pdf 1.1 MB
- 7-part-100-article/OWASP_Top_10_-_2017_Release_Candidate1_English.pdf 1.1 MB
- 9-part-100-article/Top 3 Open Source SSL Testing Tools.pdf 1.1 MB
- 10-part-100-article/us-17-Lekies-Dont-Trust-The-DOM-Bypassing-XSS-Mitigations-Via-Script-Gadgets.pdf 1.0 MB
- 6-part-100-article/Kali Linux Cheat Sheet for Penetration Testers.pdf 1.0 MB
- 3-part-100-article/Command and Control – JavaScript .pdf 1.0 MB
- 2-part-100-article/new_articles/How to Learn Penetration Testing_ A Beginners Tutorial .pdf 1.0 MB
- 6-part-100-article/48_article/Decrypting TLS Browser Traffic With Wireshark – The Easy Way!.pdf 1.0 MB
- 10-part-100-article/USING THE DDE ATTACK WITH POWERSHELL EMPIRE.pdf 1.0 MB
- 10-part-100-article/exploit/Malicious Input_ How Hackers Use Shellcode.pdf 1.0 MB
- 1-part-100-article/google/Using Google Dorks For Hacking.pdf 1.0 MB
- 7-part-100-article/new_articles/ssrf-open-redirect-cheat-sheet.pdf 1.0 MB
- 8-part-100-article/Red Team Tips.pdf 1.0 MB
- 2-part-100-article/new_articles/Write-up_ solution to a RE crackme.pdf 1.0 MB
- 3-part-100-article/Command and Control – JavaScript.pdf 1.0 MB
- 6-part-100-article/48_article/Using CloudFront to Relay Cobalt Strike Traffic.pdf 1.0 MB
- 1-part-100-article/google/Complete Google Dorks List in 2019 For Ethical Hacking and Penetration Testing.pdf 1.0 MB
- 3-part-100-article/Command and Control – Kernel.pdf 1.0 MB
- 10-part-100-article/exploit/Vulnserver – KSTET command exploit with egghunter.pdf 1.0 MB
- 5-part-100-article/new/Art of Anti Detection 1 – Introduction to AV & Detection Techniques.pdf 1023.9 KB
- 3-part-100-article/CloudFront Hijacking.pdf 1022.4 KB
- 4-part-100-article/Excel macros with PowerShell.pdf 1022.0 KB
- 3-part-100-article/hacking/NetCat attack (CVE-2019-11184)_ steal encrypted SSH keystrokes exploiting DDIO.pdf 1000.2 KB
- 6-part-100-article/Injecting Metasploit Payloads into Android Applications – Manually .pdf 997.8 KB
- 3-part-100-article/DLL Injection.pdf 996.3 KB
- 10-part-100-article/exploit/Vulnserver – Fuzzing with Spike.pdf 988.2 KB
- 7-part-100-article/PowerPick – A ClickOnce Adjunct.pdf 986.3 KB
- 7-part-100-article/OSCP Notes – Information Gathering .pdf 984.6 KB
- 2-part-100-article/Always Install Elevated.pdf 981.7 KB
- 2-part-100-article/new_articles/VulnHub ___Mr.Robot 1___ - CTF.pdf 979.0 KB
- 5-part-100-article/new/How to Build Your Own Penetration Testing Drop Box .pdf 978.7 KB
- 6-part-100-article/Building an OSINT Reconnaissance Tool from Scratch.pdf 978.5 KB
- 1-part-100-article/2019 OSINT Guide.pdf 973.2 KB
- 2-part-100-article/new_articles/Macro Malware Analysis.pdf 971.7 KB
- 4-part-100-article/Evilginx - Advanced Phishing with Two-factor Authentication Bypass.pdf 970.8 KB
- 9-part-100-article/Skeleton Key.pdf 970.5 KB
- 8-part-100-article/Microsoft Office – NTLM Hashes via Frameset.pdf 970.4 KB
- 10-part-100-article/exploit/Windows Reverse Shell Shellcode I..pdf 966.4 KB
- 2-part-100-article/blog_nviso_be_2017_01_11_a_practical_guide_to_rfid_badge_cop.pdf 965.3 KB
- 3-part-100-article/Check Meltdown Vulnerability in CPU.pdf 964.2 KB
- 10-part-100-article/exploit/Windows Reverse Shell Shellcode II..pdf 963.7 KB
- 6-part-100-article/48_article/new/OSCP-PWK-Notes-Public.pdf 962.5 KB
- 6-part-100-article/Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence (Part 2).pdf 952.4 KB
- 10-part-100-article/Windows Kernel Exploits.pdf 951.0 KB
- 4-part-100-article/ENUMERATION.pdf 950.1 KB
- 6-part-100-article/48_article/8 Wireshark Filters Every Wiretapper Uses to Spy on Web Conversations and Surfing Habits .pdf 949.3 KB
- 3-part-100-article/Capcom Rootkit Proof-Of-Concept.pdf 947.4 KB
- 6-part-100-article/Introducing BloodHound.pdf 944.6 KB
- 3-part-100-article/Bypass SSH Restriction by Port Relay.pdf 943.6 KB
- 11-part-24-article/56_article/Difference between Nmap TCP SYN Scan and TCP Connect Scan.pdf 943.2 KB
- 6-part-100-article/LFI Cheat Sheet ∞ .pdf 942.2 KB
- 8-part-100-article/62_article/A Penetration Testing Cheat Sheet For Windows Machine – Intrusion Detection.pdf 938.6 KB
- 1-part-100-article/A curated list of amazingly awesome OSINT.pdf 937.6 KB
- 6-part-100-article/Lateral Movement using Excel.Application and DCOM.pdf 935.8 KB
- 11-part-24-article/56_article/google_hacking.pdf 934.6 KB
- 1-part-100-article/google/www_google_dorking_com_search_label_Filetype.pdf 931.7 KB
- 2-part-100-article/new_articles/HacktheBox Writeup_ Jerry.pdf 930.4 KB
- 2-part-100-article/AWS changes its PenTesting permission requirement, Appsecco found out exactly what is allowed and what is not.pdf 927.6 KB
- 5-part-100-article/new/NetCat CheatSheet .pdf 923.1 KB
- 3-part-100-article/Command and Control – HTTPS .pdf 923.0 KB
- 5-part-100-article/Here is the list of Black Hat Arsenal Europe 2017 Tools List.pdf 919.9 KB
- 10-part-100-article/Using WebDAV features as a covert channel.pdf 919.9 KB
- 4-part-100-article/empire_without_powershell_exe.pdf 912.9 KB
- 2-part-100-article/bb/Bypassing 2FA For Fun With Evilginx2.pdf 912.4 KB
- 5-part-100-article/new/huge list of pentest tookit.pdf 909.5 KB
- 2-part-100-article/Alibaba CDN Domain Fronting.pdf 905.9 KB
- 5-part-100-article/How to Detect Meterpreter in Your PC.pdf 905.3 KB
- 10-part-100-article/XSS Filter Evasion Cheat Sheet.pdf 904.9 KB
- 2-part-100-article/[BBP系列二] Uber XSS via Cookie .pdf 901.6 KB
- latest_articles/today/DVTA - Part 4 - Traffic Tampering with dnSpy.pdf 900.3 KB
- 3-part-100-article/hacking/Android Apk reverse engineering using Apktool and Frida.pdf 900.1 KB
- 3-part-100-article/Command and Control – WMI .pdf 899.8 KB
- 2-part-100-article/new_articles/NSA Cybersecurity publications.pdf 898.9 KB
- 6-part-100-article/48_article/eternalrelayx.py — Non-Admin NTLM Relaying & ETERNALBLUE Exploitation.pdf 897.8 KB
- 10-part-100-article/exploit/Exploit Development-Everything You Need to Know .pdf 897.5 KB
- 11-part-24-article/56_article/How to never have a public S3 bucket.pdf 893.0 KB
- 5-part-100-article/new/htb-writeup.pdf 882.1 KB
- 3-part-100-article/Command and Control – WebDAV .pdf 879.2 KB
- 2-part-100-article/new_articles/[Hackthebox] Web challenge ___ HDC.pdf 878.3 KB
- 4-part-100-article/“Fileless” UAC Bypass using sdclt.exe.pdf 877.0 KB
- 2-part-100-article/new_articles/How I Found the Honeypot_ Dark Web OSINT and Image Processing .pdf 875.8 KB
- 5-part-100-article/Google Hacking.pdf 875.5 KB
- 10-part-100-article/Universal Radio Hacker_ investigate wireless protocols like a boss.pdf 873.7 KB
- 5-part-100-article/new/Android Application Penetration Testing Checklist.pdf 866.5 KB
- 2-part-100-article/new_articles/Pond. Analoguepond.pdf 857.7 KB
- 2/0x2_ Shell_Reverse_TCP_IPV6 – Linux-x86.pdf 855.6 KB
- 4-part-100-article/Dropbox for the Empire.pdf 855.5 KB
- 3-part-100-article/Command and Control – Twitter.pdf 854.9 KB
- 2-part-100-article/Application Introspection & Hooking With Frida.pdf 851.7 KB
- 1-part-100-article/A collection of open source and commercial tools that aid in red team operations..pdf 849.5 KB
- 3-part-100-article/Command and Control – Web Interface .pdf 847.8 KB
- 2-part-100-article/Best of Post Exploitation Exploits & Tricks.pdf 844.5 KB
- 4-part-100-article/DNS Tunnelling.pdf 844.0 KB
- 2-part-100-article/bb/Analysis of the JSE malware .pdf 842.9 KB
- 4-part-100-article/FOOTPRINTING .pdf 832.5 KB
- 10-part-100-article/exploit/Windows Kernel Exploitation Part 1_ Stack Buffer Overflows.pdf 829.3 KB
- 5-part-100-article/How to Evade Application Whitelisting Using REGSVR32 .pdf 822.8 KB
- 10-part-100-article/Writing a Custom Shellcode Encoder.pdf 821.8 KB
- 1-part-100-article/google/2000+ Latest Google And Carding Dorks 2019 (Updated).pdf 809.3 KB
- 1-part-100-article/A curated list of CVE PoCs.pdf 807.5 KB
- 7-part-100-article/Penetration Testing of an FTP Server.pdf 805.3 KB
- 3-part-100-article/DLL Hijacking.pdf 802.6 KB
- 3-part-100-article/Command and Control – Images .pdf 801.0 KB
- 3-part-100-article/Command and Control – Images.pdf 800.7 KB
- 10-part-100-article/exploit/Vulnserver – HTER command buffer overflow exploit.pdf 796.5 KB
- 5-part-100-article/new/Commando VM_ Looking Around.pdf 793.5 KB
- 10-part-100-article/Windows Command Prompt cmd Cheat Sheet - The Hackr.pdf 792.7 KB
- 5-part-100-article/new/Analyzing Keyboard Firmware Part 1.pdf 792.6 KB
- 4-part-100-article/enum4linux Cheat Sheet ∞ .pdf 791.0 KB
- 6-part-100-article/[Kernel Exploitation] 2_ Payloads.pdf 790.4 KB
- 4-part-100-article/From OSINT to Internal – Gaining Access from outside the perimeter.pdf 787.8 KB
- 2-part-100-article/new_articles/OSINT TOOLS A List of Open Source Verification and Investigation Tools and Methods .pdf 785.0 KB
- 9-part-100-article/Secondary Logon Handle.pdf 784.8 KB
- latest_articles/today/Windows Privilege Escalation Scripts & Techniques.pdf 783.9 KB
- 10-part-100-article/WiFi arsenal.pdf 781.2 KB
- 6-part-100-article/[Kernel Exploitation] 5_ Integer Overflow.pdf 776.3 KB
- 3-part-100-article/Detecting Malicious Microsoft Office Macro Documents.pdf 775.6 KB
- 3-part-100-article/Command and Control – ICMP.pdf 772.5 KB
- 3-part-100-article/Bypassing AMSI via COM Server Hijacking.pdf 769.2 KB
- 2-part-100-article/bb/CVE-2019-7315_ Genie Access WIP3BVAF IP Camera Directory Traversal .pdf 767.6 KB
- 5-part-100-article/new/Network scanning with nmap.pdf 766.0 KB
- 1-part-100-article/google/CREDIT CARD HACKING DORK .pdf 762.3 KB
- 9-part-100-article/SQL injection in an UPDATE query - a bug bounty story! .pdf 759.3 KB
- 10-part-100-article/exploit/How I Found XSS By Searching In Shodan.pdf 755.7 KB
- 3-part-100-article/Command and Control – WebSocket.pdf 749.6 KB
- 1-part-100-article/google/Google Hacking – For fun and profit – I.pdf 749.4 KB
- 10-part-100-article/Well, That Escalated Quickly....pdf 748.9 KB
- 2/0x5_ Dissecting_Metasploit_Shellcode – Linux-x86.pdf 746.5 KB
- 3-part-100-article/hacking/Android APK Reverse Engineering_ What’s in an APK.pdf 741.9 KB
- 3-part-100-article/Command and Control – Browser.pdf 737.3 KB
- latest_articles/today/Chaining Three Bugs to Get RCE in Microsoft AttackSurfaceAnalyzer.pdf 737.0 KB
- 3-part-100-article/cracking-active-directory-passwords-how-cook-ad-crack_8697.pdf 736.3 KB
- 10-part-100-article/Userland API Monitoring and Code Injection Detection.pdf 736.2 KB
- 7-part-100-article/new_articles/DNS Enumeration_ Top DNS Recon Tools and Techniques.pdf 735.5 KB
- latest_articles/today/DVTA - Part 5 - Client-side Storage and DLL Hijacking.pdf 732.4 KB
- 2-part-100-article/new_articles/iOS Pentesting - Reversing Jailbreak.pdf 730.0 KB
- 5-part-100-article/new/Securing Web Applications.pdf 728.8 KB
- 1-part-100-article/google/www_technorelate_com_google_dork_list.pdf 726.7 KB
- 8-part-100-article/62_article/Penetration Testing Your WordPress Website.pdf 718.9 KB
- 5-part-100-article/Hacking with JSP Shells.pdf 716.2 KB
- 5-part-100-article/new/Analysis and exploitation of Pegasus kernel vulnerabilities (CVE-2016-4655 CVE-2016-4656).pdf 711.8 KB
- 6-part-100-article/48_article/A Primer to Windows x64 shellcoding.pdf 709.7 KB
- 3-part-100-article/hacking/In-the-wild iOS Exploit Chain 3 .pdf 705.1 KB
- 2-part-100-article/Advanced Cross Site Scripting(XSS) Cheat Sheet.pdf 701.1 KB
- 5-part-100-article/How I Chained 4 vulnerabilities on GitHub Enterprise, From SSRF Execution Chain to RCE! .pdf 700.9 KB
- 10-part-100-article/exploit/Part 9_ Spraying the Heap [Chapter 2_ Use-After-Free] – Finding a needle in a Haystack.pdf 695.5 KB
- 11-part-24-article/56_article/Trust Direction_ An Enabler for Active Directory Enumeration andTrust Exploitation.pdf 694.1 KB
- 3-part-100-article/Bypassing UAC using App Paths.pdf 690.6 KB
- 2-part-100-article/AppLocker Bypass – Regsvr32 .pdf 686.6 KB
- 3-part-100-article/hacking/In-the-wild iOS Exploit Chain 1 .pdf 685.7 KB
- 3-part-100-article/BYPASSING UAC ON WINDOWS 10 USING DISK CLEANUP.pdf 682.8 KB
- 10-part-100-article/exploit/Egg Hunters.pdf 675.0 KB
- 10-part-100-article/Using SQL Server for attacking a Forest Trust.pdf 674.5 KB
- 2-part-100-article/new_articles/Port Scanning with Nmap.pdf 673.5 KB
- 4-part-100-article/Exploiting CSRF on JSON endpoints with Flash and redirects.pdf 671.6 KB
- 10-part-100-article/Week in OSINT #2019–14.pdf 671.1 KB
- 6-part-100-article/Macroless DOC malware that avoids detection with Yara rule.pdf 671.0 KB
- latest_articles/today/DVTA - Part 3 - Network Recon.pdf 668.3 KB
- 2-part-100-article/new_articles/Write a Reverse TCP Shell in Go.pdf 667.3 KB
- 11-part-24-article/56_article/Exfiltration series_ Spotexfil.pdf 666.6 KB
- 6-part-100-article/Insecure Registry Permissions.pdf 666.4 KB
- 1-part-100-article/A curated list of awesome Python frameworks, libraries, software and resources.pdf 664.8 KB
- latest_articles/today/Auto-sslscan (Automatic SSL Scanning) .pdf 664.0 KB
- 7-part-100-article/Phishing with Maldocs.pdf 663.8 KB
- 2/A Beginner’s Guide to Windows Shellcode Execution Techniques.pdf 662.6 KB
- 10-part-100-article/exploit/Windows Kernel Exploitation Part 3_ Integer Overflow.pdf 661.9 KB
- 1-part-100-article/google/Google Dorks – Use Google For Hacking websites and Databases.pdf 661.4 KB
- 2-part-100-article/bb/Attack Simulation_ from No Access to Domain Admin.pdf 658.1 KB
- 5-part-100-article/new/[Hacking walkthrough] Another CTF challenge.pdf 655.4 KB
- 2-part-100-article/A penetration tester’s guide to sub-domain enumeration.pdf 653.3 KB
- 5-part-100-article/new/Images, posts & videos related to _X64dbg_.pdf 650.1 KB
- 2-part-100-article/new_articles/No Mercy.pdf 649.9 KB
- 3-part-100-article/Command and Control – Website .pdf 649.1 KB
- 2/A nice list of useful coding tutorials.pdf 643.3 KB
- 11-part-24-article/56_article/Trend Micro Threat Discovery Appliance - Session Generation Authentication Bypass (CVE-2016-8584) .pdf 642.2 KB
- 6-part-100-article/InternetExplorer.Application for C2.pdf 637.3 KB
- 3-part-100-article/hacking/In-the-wild iOS Exploit Chain 2 .pdf 637.1 KB
- 3-part-100-article/Cross Site Scripting ( XSS ) Vulnerability Payload List.pdf 635.9 KB
- 8-part-100-article/62_article/Wireshark Cheatsheet .pdf 634.3 KB
- 11-part-24-article/56_article/Understanding Nmap by using hping.pdf 631.4 KB
- 10-part-100-article/exploit/Getting started with ARM exploitation.pdf 630.5 KB
- 10-part-100-article/Use Tor. Use Empire. .pdf 629.1 KB
- 1-part-100-article/google/Latest Google Dorks SQL Injection List Collection– SQL Dorks 2017-2019.pdf 626.9 KB
- 10-part-100-article/exploit/Writing shellcodes for Windows x64.pdf 626.2 KB
- 4-part-100-article/External C2 (Third-party Command and Control).pdf 623.8 KB
- 10-part-100-article/exploit/TCP Bind Shell in Assembly (ARM 32-bit).pdf 619.7 KB
- 6-part-100-article/48_article/Password Spraying Outlook Web Access_ Remote Shell.pdf 617.7 KB
- 4-part-100-article/Docker Cheat Sheet.pdf 616.7 KB
- 10-part-100-article/exploit/Example of JS Malware .pdf 615.9 KB
- 10-part-100-article/exploit/Heap Overflows and the iOS Kernel Heap.pdf 614.8 KB
- 10-part-100-article/Web Penetration Testing.pdf 613.1 KB
- 2-part-100-article/BUG BOUNTY HUNTING (METHODOLOGY , TOOLKIT , TIPS & TRICKS , Blogs).pdf 609.5 KB
- 11-part-24-article/56_article/Bug Bounty Guide2.pdf 606.0 KB
- 10-part-100-article/exploit/Windows Shellcode – Download and Execute Payload Using MSIEXEC.pdf 604.0 KB
- 6-part-100-article/48_article/The Journey to Try Harder_ TJnull’s Preparation Guide for PWK-OSCP.pdf 600.5 KB
- 3-part-100-article/hacking/Chaining Cache Poisoning To Stored XSS.pdf 598.1 KB
- 6-part-100-article/48_article/Passing OSCP.pdf 597.1 KB
- 3-part-100-article/hacking/In-the-wild iOS Exploit Chain 4 .pdf 596.1 KB
- 3-part-100-article/DCShadow.pdf 596.0 KB
- 2-part-100-article/new_articles/Information Gathering with Google Search Engine.pdf 595.6 KB
- 3-part-100-article/CloudFlare for Command and Control.pdf 592.9 KB
- 5-part-100-article/new/OSCP Fun Guide.pdf 589.3 KB
- latest_articles/How I got 5500$ from Yahoo for RCE.pdf 588.4 KB
- 10-part-100-article/Windows Privilege Escalation Fundamentals.pdf 588.2 KB
- 3-part-100-article/hacking/In-the-wild iOS Exploit Chain 5 .pdf 579.9 KB
- 5-part-100-article/new/CVE-2019-7286 Part II_ Gaining PC Control.pdf 578.2 KB
- 10-part-100-article/Wiping Out CSRF.pdf 574.8 KB
- 10-part-100-article/exploit/Part 5_ Unicode 0x00410041.pdf 574.2 KB
- 3-part-100-article/Compromising Jenkins and extracting credentials.pdf 574.0 KB
- 3-part-100-article/Command and Control – Website Keyword.pdf 572.3 KB
- 2-part-100-article/new_articles/PicoCTF 2018 Writeup_ Forensics .pdf 572.3 KB
- 5-part-100-article/new/Minimize false positives for WAF.pdf 571.3 KB
- 7-part-100-article/new_articles/Top GitHub Dorks and Tools Used to Scan GitHub Repositories for Sensitive Data.pdf 568.4 KB
- 5-part-100-article/Hacking a Website and Gaining Root Access using Dirty COW Exploit.pdf 568.3 KB
- 1-part-100-article/google/Dork Carding 2018 paypal & Credit Card .pdf 567.2 KB
- 1-part-100-article/A curated list of Web Security materials and resources.pdf 566.6 KB
- 10-part-100-article/Use your macOS terminal shell to do awesome things..pdf 561.6 KB
- 1-part-100-article/google/How To Hack With Google Dorks.pdf 561.6 KB
- 6-part-100-article/Investigative tools for finding people online and keeping yourself safe.txt 561.6 KB
- 11-part-24-article/56_article/Exfiltration series_ Certexfil.pdf 561.3 KB
- 2-part-100-article/blackarch_org_scanner_html.pdf 560.1 KB
- 11-part-24-article/56_article/Writing NMAP Scripts Like A Super-Hero.pdf 558.7 KB
- 1-part-100-article/A curated list of amazingly awesome PHP libraries, resources and shiny things..pdf 554.8 KB
- 8-part-100-article/62_article/Bypass HTTPS website…MITM (Man In The Middle Attack).pdf 554.0 KB
- 4-part-100-article/Exploiting System Shield AntiVirus Arbitrary Write Vulnerability using SeTakeOwnershipPrivilege.pdf 554.0 KB
- 1-part-100-article/google/How to Hack Website Top Methods to Hack Website in 2019.pdf 552.3 KB
- 2-part-100-article/new_articles/i18 Challenge - Part 1.pdf 552.0 KB
- 10-part-100-article/Windows IR Live Forensics Cheat Sheet.pdf 549.7 KB
- 2-part-100-article/And I did OSCP!.pdf 547.0 KB
- 5-part-100-article/new/Senstive Information Leak Lead To join any Organisation.pdf 543.7 KB
- 6-part-100-article/Building a Keyword Monitoring Pipeline with Python, Pastebin and Searx.pdf 543.3 KB
- 5-part-100-article/new/Mobile penetration testing on Android using Drozer.pdf 541.0 KB
- latest_articles/today/DVTA - Part 2 - Cert Pinning and Login Button.pdf 540.1 KB
- 9-part-100-article/SQL Injection Cheat Sheet.pdf 537.1 KB
- 2-part-100-article/Apache mod_python for red teams.pdf 536.8 KB
- 5-part-100-article/new/List of FTP Commands For Linux and Windows with Examples.pdf 533.2 KB
- 6-part-100-article/Bug Hunting Methodology (part-1).pdf 530.9 KB
- 5-part-100-article/new/Information Security Professional (CISSP Preparation).pdf 530.5 KB
- 10-part-100-article/exploit/Windows Kernel Exploitation Part 2_ Type Confusion.pdf 530.5 KB
- 4-part-100-article/Doing RECON the correct way.pdf 529.2 KB
- 2-part-100-article/Bounty Write-up (HTB).pdf 529.0 KB
- 10-part-100-article/exploit/Shellcode_ Loading .NET Assemblies From Memory.pdf 528.4 KB
- 5-part-100-article/Google dorks for growth hackers.pdf 526.9 KB
- 10-part-100-article/exploit/TCP Reverse Shell in Assembly (ARM 32-bit).pdf 525.0 KB
- 10-part-100-article/exploit/Fuzzing VulnServer with Peach.pdf 524.4 KB
- 5-part-100-article/How I Identified 93k Domain-Frontable CloudFront Domains.pdf 518.6 KB
- 5-part-100-article/new/Slurp – Amazon AWS S3 Bucket Enumerator.pdf 518.5 KB
- 11-part-24-article/56_article/NMAP How-To.pdf 514.8 KB
- 4-part-100-article/Excess XSS.pdf 513.1 KB
- 2-part-100-article/bb/Asset Enumeration_ Expanding a Target's Attack Surface.pdf 511.4 KB
- 1-part-100-article/A curated list of hacking environments where you can train your cyber skills legally and safely.pdf 508.0 KB
- 2-part-100-article/new_articles/Hack The Box walkthrough_ Netmon.pdf 507.3 KB
- 10-part-100-article/exploit/Part 8_ Spraying the Heap [Chapter 1_ Vanilla EIP] – Putting Needles in the Haystack.pdf 506.9 KB
- 5-part-100-article/new/CVE-2019-3010 – Local privilege escalation on Solaris 11.x via xscreensaver.pdf 506.3 KB
- 2-part-100-article/blackarch_org_webapp_html.pdf 505.8 KB
- 11-part-24-article/56_article/Penetration Testing — mehr Komfort mit nmap.pdf 504.2 KB
- 10-part-100-article/exploit/Part 3_ Structured Exception Handler (SEH).pdf 504.0 KB
- 8-part-100-article/Online Investigative Tools for Social Media Discovery and Locating People.pdf 502.7 KB
- 6-part-100-article/Intel SYSRET.pdf 501.9 KB
- 11-part-24-article/56_article/#BugBounty — “How I was able toshop for free!”- Payment PriceManipulation.pdf 501.7 KB
- 2-part-100-article/new_articles/WordPress 5.0.0 Remote Code Execution.pdf 501.0 KB
- 1-part-100-article/A collection of awesome penetration testing resources, tools and other shiny things.pdf 500.4 KB
- 2-part-100-article/new_articles/Information gathering.pdf 499.8 KB
- 3-part-100-article/hacking/Magento 2.3.1_ Unauthenticated Stored XSS to RCE.pdf 499.7 KB
- 5-part-100-article/How I found a $5,000 Google Maps XSS (by fiddling with Protobuf).pdf 498.0 KB
- 11-part-24-article/56_article/A guide to ethical hacking — Understanding Nmap.pdf 497.9 KB
- 10-part-100-article/exploit/Part 7_ Return Oriented Programming.pdf 496.3 KB
- 1-part-100-article/A curated list of the awesome resources about the Vulnerability Research.pdf 496.0 KB
- 10-part-100-article/exploit/How Red Teams Bypass AMSI and WLDP for .NET Dynamic Code.pdf 495.3 KB
- 1-part-100-article/abusing phishing.pdf 495.3 KB
- 5-part-100-article/new/Analysis and Reproduction of iOS-OSX Vulnerability_ CVE-2019-7286.pdf 493.2 KB
- 1-part-100-article/A curated list of awesome command-line frameworks, toolkits, guides and gizmos. Inspired by awesome-php..pdf 492.2 KB
- 1-part-100-article/A curated list of resources for learning about vehicle security and car hacking..pdf 489.7 KB
- 4-part-100-article/BurpSuit + SqlMap = One Love.pdf 488.1 KB
- 9-part-100-article/Stealing Signatures and Making One Invalid Signature at a Time.pdf 485.9 KB
- 4-part-100-article/Executing Commands and Bypassing AppLocker with PowerShell Diagnostic Scripts.pdf 485.9 KB
- 11-part-24-article/56_article/Nmap In The Windows Bash Shell (WSL).pdf 485.7 KB
- 1-part-100-article/A curated list of static analysis tools, linters and code quality checkers for various programming languages.pdf 484.9 KB
- 3-part-100-article/Command and Control – PowerShell.pdf 483.6 KB
- 9-part-100-article/stealingthe_network_executing_metasploit_empire_payloads_fro2.pdf 483.3 KB
- 2-part-100-article/new_articles/Infrastructure PenTest Series _ Part 4 - Post Exploitation.pdf 482.8 KB
- 2-part-100-article/Anatomy of UAC Attacks.pdf 481.0 KB
- 6-part-100-article/Links for the OSINT Team.pdf 480.6 KB
- 6-part-100-article/48_article/new/Malware Traffic Analysis Exercise (July 2019) .pdf 480.6 KB
- 3-part-100-article/hacking/Windows Kernel Logic Bug Class_ Access Mode Mismatch in IO Manager .pdf 479.5 KB
- 1-part-100-article/15k_btc_dorks.txt 479.0 KB
- 5-part-100-article/new/Detailed Analysis of macOS Vulnerability CVE-2019-8507.pdf 477.9 KB
- 5-part-100-article/new/Infrastructure PenTest Series _ Part 1 - Intelligence Gathering.pdf 477.1 KB
- 8-part-100-article/Privilege Escalation & Post-Exploitation.pdf 477.1 KB
- 1-part-100-article/A curated list of awesome malware analysis tools and resources..pdf 476.7 KB
- 10-part-100-article/Various public documents, whitepapers and articles about APT campaigns.pdf 476.6 KB
- 3-part-100-article/Checking for maliciousness in Acroform objects on PDF files.pdf 475.7 KB
- 6-part-100-article/48_article/Practical Windows Kernel Exploitation 475.6 KB
- 4-part-100-article/Firebase Databases.pdf 472.2 KB
- 2-part-100-article/Awesome.pdf 472.0 KB
- 2-part-100-article/new_articles/From unauthenticated to root on a supervision appliance.pdf 469.9 KB
- latest_articles/today/On Username Enumeration.pdf 469.7 KB
- 11-part-24-article/56_article/Google Dorks List - For Find Sensitive Data .pdf 466.8 KB
- 7-part-100-article/Pentesting Cheatsheets.pdf 466.1 KB
- 6-part-100-article/Latest hacks.pdf 464.1 KB
- 2-part-100-article/new_articles/WiFi.pdf 462.8 KB
- 5-part-100-article/Google Dorks for Carding (HUGE LIST) .pdf 459.9 KB
- 7-part-100-article/Phishing with PowerPoint .pdf 455.7 KB
- 5-part-100-article/new/Analyzing Keyboard Firmware Part 2.pdf 455.0 KB
- 2-part-100-article/new_articles/Pentest lab - pWnOS.pdf 454.1 KB
- 6-part-100-article/linux kerenal exploit.pdf 451.5 KB
- 10-part-100-article/exploit/R A S P B E R RY P I O N Q E M U.pdf 447.3 KB
- 8-part-100-article/62_article/OSINT Cheat Sheet.pdf 445.6 KB
- 6-part-100-article/48_article/Bypassing IDS Signatures with Simple Reverse Shells.pdf 445.4 KB
- 10-part-100-article/xss-payload-list..pdf 445.2 KB
- 1-part-100-article/A curated list of awesome infosec courses and training resources.pdf 444.2 KB
- 11-part-24-article/TOR Fronting – Utilising Hidden Services for Privacy.pdf 443.9 KB
- 10-part-100-article/exploit/How to debug an iOS application with Appmon and LLDB.pdf 442.5 KB
- 8-part-100-article/Reverse engineering and penetration testing on Android apps_ my own list of tools.pdf 442.4 KB
- 1-part-100-article/A curated list of movies every hacker & cyberpunk must watch..pdf 441.0 KB
- 4-part-100-article/“Fileless” UAC Bypass Using eventvwr.exe and Registry Hijacking.pdf 440.9 KB
- 3-part-100-article/CEH Module 1_ Introduction to Ethical Hacking .pdf 439.7 KB
- 4-part-100-article/Finding Target-relevant Domain Fronts.pdf 439.3 KB
- 2-part-100-article/new_articles/Windows Notes + Cheatsheet.pdf 437.4 KB
- 3-part-100-article/hacking/CVE-2019–10864_ Wp-Statistics Stored XSS.pdf 436.0 KB
- 1-part-100-article/A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups..pdf 435.6 KB
- 1-part-100-article/10k_private_fortnite_dorks.txt 435.1 KB
- 5-part-100-article/Google Dorks For Carding [Huge List] - Part 1.pdf 434.2 KB
- 1-part-100-article/A curated list of CTF frameworks, libraries, resources and softwares.pdf 433.6 KB
- latest_articles/LFI on Netherland Bank.pdf 432.8 KB
- 5-part-100-article/How to prepare for PWK-OSCP, a noob-friendly guide .pdf 427.5 KB
- 5-part-100-article/new/Practical guide to NTLM Relaying in 2017 (A.K.A getting a foothold in under 5 minutes).pdf 426.9 KB
- 11-part-24-article/56_article/#BugBounty — Exploiting CRLFInjection can lands into a nice bounty.pdf 426.7 KB
- 10-part-100-article/Ultimate AppLocker ByPass List.pdf 425.4 KB
- 1-part-100-article/A curated list of Awesome Threat Intelligence resources.pdf 425.2 KB
- 11-part-24-article/56_article/Parrot OS on Windows (WSL).pdf 423.7 KB
- 3-part-100-article/codewhitesec_blogspot_com_2018_05_poor_richfaces_html.pdf 421.6 KB
- 3-part-100-article/Digging Through Someones Past Using OSINT.pdf 420.6 KB
- 5-part-100-article/new/Privilege escalation in Windows Domains (2-3).pdf 419.6 KB
- 3-part-100-article/hacking/WordPress 5.1 CSRF to Remote Code Execution.pdf 419.2 KB
- 3-part-100-article/hacking/The Many Possibilities of CVE-2019-8646 .pdf 419.0 KB
- 1-part-100-article/A collection of android security related resources.pdf 418.7 KB
- 2-part-100-article/new_articles/Offensive Security___s CTP & OSCE Review.pdf 417.9 KB
- 1-part-100-article/A collection of awesome software, libraries, documents, books, resources and cools stuffs about security..pdf 417.7 KB
- latest_articles/today/Detecting WMI Exploitation v1.1.pdf 416.0 KB
- 10-part-100-article/exploit/Introduction to Writing ARM Shellcode.pdf 415.8 KB
- 2-part-100-article/blackarch_org_social_html.pdf 415.5 KB
- 1-part-100-article/A collection of hacking - penetration testing resources to make you better!.pdf 414.1 KB
- 1-part-100-article/A collection of hacking penetration testing resources to make you better!.pdf 413.7 KB
- 2-part-100-article/An Information Security Reference That Doesn't Suck.pdf 413.7 KB
- 1-part-100-article/A curated list of awesome Windows Exploitation resources, and shiny things. Inspired by awesom.pdf 413.2 KB
- 9-part-100-article/The goal of this repository is to document the most common techniques to bypass AppLocker..pdf 411.1 KB
- 5-part-100-article/new/Violent Python and Exploit Development.pdf 409.4 KB
- 2-part-100-article/Android App Security Checklist.pdf 405.4 KB
- 1-part-100-article/A curated list of resources for learning about application security.pdf 405.0 KB
- 2-part-100-article/bb/Analyzing the TRITON industrial malware.pdf 404.7 KB
- 10-part-100-article/exploit/Exploiting CVE–2019-1132_ Another NULL Pointer Dereference in Windows Kernel.pdf 403.4 KB
- 11-part-24-article/56_article/XSS without HTML_ Client-Side Template Injection withAngularJS.pdf 402.1 KB
- 1-part-100-article/A curated list of Capture The Flag (CTF) frameworks, libraries, resources and softwares..pdf 401.3 KB
- 2-part-100-article/new_articles/How a double-free bug in WhatsApp turns to RCE .pdf 401.2 KB
- 10-part-100-article/www_slideshare_net_SamNizam_3_google_hacking.pdf 400.6 KB
- 2-part-100-article/an awesome list of honeypot resources.pdf 399.7 KB
- 1-part-100-article/A curated list of awesome YARA rules, tools, and people..pdf 398.8 KB
- 8-part-100-article/Most Important Mobile Application Penetration Testing Cheat sheet with Tools & Resources for Security Professionals.pdf 398.4 KB
- 2-part-100-article/new_articles/How to bypass AMSI and execute ANY malicious Powershell code.pdf 398.0 KB
- 2/Bypass Data Execution Protection (DEP) .pdf 397.7 KB
- 2-part-100-article/Amazon’s customer service backdoor.pdf 395.4 KB
- 1-part-100-article/A collected list of awesome security talks.pdf 395.0 KB
- 6-part-100-article/Kali Linux Cheat Sheet for Penetration Testerss.pdf 395.0 KB
- 10-part-100-article/Virtually Unlimited Memory_ Escaping the Chrome Sandbox.pdf 394.3 KB
- 10-part-100-article/Week in OSINT #2018–35.pdf 392.6 KB
- 5-part-100-article/new/Open Source Intelligence (OSINT) Tools & Resources .pdf 391.8 KB
- 11-part-24-article/56_article/#BugBounty — How I was able todownload the Source Code of India’sLargest Telecom Service Providerincluding dozens of more popularwebsites!.pdf 390.4 KB
- 5-part-100-article/HQL for pentesters .pdf 390.0 KB
- 10-part-100-article/exploit/Shellcode_ In-Memory Execution of JavaScript, VBScript, JScript and XSL.pdf 389.1 KB
- 3-part-100-article/Command Line Cheat Sheet.pdf 387.7 KB
- 1-part-100-article/A curated list of tools for incident response.pdf 386.9 KB
- 2-part-100-article/Advance Passenger Information.pdf 382.9 KB
- 3-part-100-article/Crack WPA-WPA2 Wi-Fi Routers with Airodump-ng and Aircrack-ng-Hashcat 🖧.pdf 382.6 KB
- 10-part-100-article/exploit/Part 2_ Saved Return Pointer Overflows.pdf 382.4 KB
- 1-part-100-article/A curated list of awesome forensic analysis tools and resources.pdf 381.9 KB
- 1-part-100-article/A curated list of awesome social engineering resources..pdf 379.8 KB
- 5-part-100-article/new/Linux kernel exploit cheetsheet.pdf 378.7 KB
- 3-part-100-article/CSP bypassing form-action with reflected XSS.pdf 378.0 KB
- 7-part-100-article/OSCP-Survival-Guide.pdf 375.9 KB
- 2-part-100-article/bb/300+ Powerful Termux Hacking Tools For Hackers .pdf 374.4 KB
- 6-part-100-article/Linux Kernel Exploitation.pdf 373.5 KB
- 1-part-100-article/A bunch of links related to Linux kernel exploitation.pdf 373.1 KB
- 10-part-100-article/exploit/Part 6_ Writing W32 shellcode.pdf 371.4 KB
- 9-part-100-article/The Solution for Web for Pentester-I.pdf 370.1 KB
- 6-part-100-article/Linux Essentials_ Curl Fundamentals 369.6 KB
- 5-part-100-article/new/Pwn2Own 2019_ Microsoft Edge Renderer Exploitation (CVE-2019-0940). Part 1.pdf 368.7 KB
- 1-part-100-article/A curated list of awesome awesomeness.pdf 368.4 KB
- 10-part-100-article/USING A SCF FILE TO GATHER HASHES.pdf 368.3 KB
- 10-part-100-article/www_slideshare_net_SamNizam_3_google_hacking(1).pdf 367.4 KB
- 8-part-100-article/Mobile Application Penetration Testing Cheat Sheet2.pdf 366.9 KB
- 6-part-100-article/48_article/PEpper_ a python script to perform malware static analysis on Portable Executable format.pdf 366.8 KB
- 10-part-100-article/WannaCry & Google Hacking.pdf 366.4 KB
- 5-part-100-article/new/Reversing obfuscated passwords.pdf 366.2 KB
- 4-part-100-article/dorks_list_fresh_carding_2018.txt 365.6 KB
- 6-part-100-article/Jenkins Servers Infected With Miner.pdf 364.6 KB
- 3-part-100-article/Defeating Windows User Account Control.pdf 364.0 KB
- 7-part-100-article/PowerUp.pdf 363.9 KB
- 2/0x4_ ROT13_XOR_Encoder_MMX_Decoder_Shellcode – Linux-x86.pdf 362.7 KB
- 8-part-100-article/62_article/Cracking Microsoft Excel Documents using John The Ripper.pdf 361.7 KB
- 2-part-100-article/new_articles/Pentesting tools.pdf 361.4 KB
- 2-part-100-article/An authoritative list of awesome devsecops tools with the help from community experiments and contributions..pdf 360.7 KB
- 2-part-100-article/bb/Awesome Penetration Testing.pdf 358.8 KB
- 4-part-100-article/Enumeration for Linux Privilege Escalation .pdf 357.9 KB
- 2-part-100-article/A database of common, interesting or useful commands, in one handy referable form.pdf 356.7 KB
- 5-part-100-article/hq_paid_dorks_mixed_gaming_lol_steam_..music_shoping.txt 355.9 KB
- 1-part-100-article/A collection of various awesome lists for hackers, pentesters and security researchers.pdf 355.5 KB
- 5-part-100-article/hq_paid_gaming_dorks.txt 354.2 KB
- 5-part-100-article/new/28 Essential AWS S3 CLI Command Examples to Manage Buckets and Objects.pdf 354.2 KB
- 1-part-100-article/A curated list of awesome Hacking tutorials, tools and resources.pdf 354.1 KB
- 1-part-100-article/10k_hq_gaming_dorks.txt 354.0 KB
- 3-part-100-article/Decrypted content of eqgrp-auction-file.tar.xz.pdf 351.0 KB
- 5-part-100-article/new/OSINT.pdf 350.4 KB
- 1-part-100-article/A curated list of awesome reversing resources.pdf 349.3 KB
- 2-part-100-article/A list of web application security.pdf 349.0 KB
- 1-part-100-article/google/Download Latest Biggest Carding Dorks List 2017 - 2018 .pdf 347.9 KB
- 5-part-100-article/new/admin marks - my personal cheatsheet for little managment.pdf 347.6 KB
- 6-part-100-article/JSMVCOMFG - To sternly look at JavaScript MVC and Templating Frameworks .pdf 347.0 KB
- 4-part-100-article/DOM based AngularJS sandbox escapes.pdf 346.9 KB
- 3-part-100-article/digital_forensics_sans_org_community_cheat_sheets.pdf 346.2 KB
- 2-part-100-article/bb/Android-security.pdf 346.2 KB
- 1-part-100-article/10k_hq_shopping_dorks.txt 344.7 KB
- 5-part-100-article/new/Web Application Penetration Testing Course.pdf 344.4 KB
- 1-part-100-article/google/Bing Queries.txt 344.2 KB
- 2-part-100-article/A Red Teamer's guide to pivoting.pdf 343.8 KB
- 3-part-100-article/hacking/#bugbountytip.pdf 343.4 KB
- 5-part-100-article/How to Make a Captive Portal of Death.pdf 342.4 KB
- 2-part-100-article/new_articles/Pentest Tips and Tricks #1.pdf 340.6 KB
- 2-part-100-article/A list of useful payloads and bypass for Web Application Security and Pentest-CTF.pdf 340.4 KB
- 2-part-100-article/new_articles/OSCP+CTF Scripts.pdf 336.6 KB
- 10-part-100-article/Vacuuming Image Metadata from The Wayback Machine.pdf 336.1 KB
- 5-part-100-article/new/osint_link_osint_part3.pdf 335.7 KB
- 4-part-100-article/Free Security and Hacking eBooks.pdf 335.6 KB
- 3-part-100-article/Discovery Scan.pdf 332.5 KB
- 4-part-100-article/Exploit Office 2016 using CVE-2018-0802 .pdf 332.4 KB
- 6-part-100-article/48_article/new/How to Use Wireshark_ Network Analysis, 2019 Style.pdf 331.7 KB
- 1-part-100-article/A Collection of Hacks in IoT Space so that we can address them (hopefully)..pdf 331.6 KB
- 1-part-100-article/A curated list of resources related to Industrial Control System (ICS) security..pdf 331.3 KB
- 11-part-24-article/XXE OOB exploitation at Java 1.7+.pdf 330.3 KB
- 3-part-100-article/Collection of the cheat sheets useful for pentesting.pdf 330.2 KB
- 2-part-100-article/Awesome XSS stuff.pdf 330.0 KB
- 2-part-100-article/new_articles/XXE.pdf 329.6 KB
- 10-part-100-article/WSH Injection_ A Case Study.pdf 327.8 KB
- 1-part-100-article/google/Dork Fresh Carding 2019 4000++ List.pdf 327.2 KB
- 8-part-100-article/Official Black Hat Arsenal Security Tools Repository.pdf 326.6 KB
- 5-part-100-article/new/Pwn2Own 2019_ Microsoft Edge Sandbox Escape (CVE-2019-0938). Part 2.pdf 325.6 KB
- 1-part-100-article/A collective list of public JSON APIs for use in security..pdf 325.2 KB
- 4-part-100-article/Evil XML with two encodings .pdf 325.2 KB
- 5-part-100-article/new/The Ultimate List of .NET Dependency Injection Frameworks.pdf 324.2 KB
- 2-part-100-article/bb/Awesome Malware Analysis.pdf 324.1 KB
- 1-part-100-article/google/Latest Carding Dorks List for Sql Injection 2019.pdf 324.1 KB
- 2-part-100-article/new_articles/MiKey - A Linux keylogger.pdf 322.6 KB
- 1-part-100-article/10k_btc_dorks.txt 321.7 KB
- 10-part-100-article/exploit/Shellcode_ Using the Exception Directory to find GetProcAddress.pdf 321.1 KB
- 11-part-24-article/56_article/Tracking Users_ From Cookies to DeviceFingerprinting.pdf 320.4 KB
- 10-part-100-article/exploit/Exploiting Techniques _000 - ret2libc .pdf 319.5 KB
- 6-part-100-article/InvalidSign.pdf 319.5 KB
- 10-part-100-article/exploit/Extracting “Stack Strings” from Shellcode .pdf 317.5 KB
- 2-part-100-article/A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.pdf 317.3 KB
- 5-part-100-article/new/Pentesting Cheatsheet.pdf 316.9 KB
- 2-part-100-article/new_articles/Pentest-Tools.pdf 315.8 KB
- 11-part-24-article/56_article/#BugBounty — API keys leakage,Source code disclosure in India’slargest e-commerce healthcare company..pdf 313.9 KB
- 1-part-100-article/7,000 Dorks for hacking into various sites.txt 313.9 KB
- 11-part-24-article/56_article/#BugBounty — “I don’t need your current password to login into youraccount” - How could I completely takeover any user’s account in anonline classi ed ads company..pdf 313.5 KB
- 11-part-24-article/XXE.pdf 313.5 KB
- 2-part-100-article/new_articles/iOS Pentesting - Static analysis.pdf 313.2 KB
- 11-part-24-article/56_article/Google Dorks List “Google Hacking”.pdf 312.9 KB
- 5-part-100-article/new/Malware writing series - Python Malware, part 1.pdf 312.6 KB
- 7-part-100-article/Organic HTTP File Transfer.pdf 312.5 KB
- 1-part-100-article/google/GOOGLE DORKS LIST .pdf 312.4 KB
- 8-part-100-article/Notes for taking the OSCP in 2097. Read in book form on GitBook.pdf 312.2 KB
- 1-part-100-article/A collection of sources of indicators of compromise.pdf 311.6 KB
- 7-part-100-article/Post Exploitation With Windows Credentials Editor (WCE) .pdf 310.7 KB
- 2/0x7_ Custom_crypter – Linux-x86.pdf 309.3 KB
- 1-part-100-article/A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development.pdf 308.5 KB
- 3-part-100-article/hacking/The Fully Remote Attack Surface of the iPhone .pdf 308.4 KB
- 10-part-100-article/Understanding the ELF.pdf 308.0 KB
- 11-part-24-article/56_article/#BugBounty — “Journey from LFI toRCE!!!”-How I was able to get thesame in one of the India’s popularproperty buy-sell company..pdf 306.6 KB
- 5-part-100-article/Google Dorks List 2018.pdf 305.7 KB
- 4-part-100-article/Ethical Google Hacking - Sensitive Doc Dork (Part 2).pdf 304.9 KB
- 10-part-100-article/XSS_Payloads.pdf 304.8 KB
- 3-part-100-article/Cross-Site Scripting (XSS) Payloads.pdf 303.8 KB
- 9-part-100-article/Steganography.pdf 302.8 KB
- 11-part-24-article/56_article/UAC BYPASS WITH ELEVATED PRIVILEGESWORKS ON ALL WINDOWS VERSIONS.pdf 301.9 KB
- 1-part-100-article/A collection of Red Team focused tools, scripts, and notes.pdf 300.8 KB
- 5-part-100-article/Hacker101 is a free class for web security.pdf 300.5 KB
- 1-part-100-article/A Course on Intermediate Level Linux Exploitation.pdf 300.3 KB
- 4-part-100-article/Download Google Dorks List 2019.pdf 299.6 KB
- 6-part-100-article/IP Cams from around the world.pdf 299.3 KB
- 10-part-100-article/exploit/Local Linux Enumeration & Privilege Escalation Cheatsheet.pdf 298.9 KB
- 4-part-100-article/Empire Domain Fronting.pdf 297.5 KB
- 2/An Introduction to Printer Exploitation .pdf 296.9 KB
- 2-part-100-article/new_articles/Linux-Unix-IT Tips and Tricks #3.pdf 296.6 KB
- 10-part-100-article/exploit/Part 2_ Linux Format String Exploitation.pdf 292.3 KB
- 11-part-24-article/[XSS] Re ected XSS Bypass Filter.pdf 290.9 KB
- 2/autoBOF_ a Journey into Automation, Exploit Development, and Buffer Overflows.pdf 290.4 KB
- 1-part-100-article/google/Exploring Google Hacking Techniques.pdf 290.0 KB
- 2-part-100-article/A NDROID M ALWARE G ENOME P ROJECT.pdf 289.8 KB
- 2-part-100-article/new_articles/Linux-Unix-IT Tips and Tricks #2.pdf 288.6 KB
- 10-part-100-article/exploit/Windows Process Injection_ Breaking BaDDEr.pdf 286.2 KB
- 6-part-100-article/I Can See You! Open Source Intelligence (OSINT).pdf 286.0 KB
- 2-part-100-article/bb/Code Injection with Python .pdf 284.3 KB
- 6-part-100-article/IKARUS anti.virus and its 9 exploitable kernel vulnerabilities.pdf 283.1 KB
- 3-part-100-article/hacking/Analyzing Malicious Documents Cheat Sheet.pdf 281.8 KB
- 5-part-100-article/new/CVE-2019-5786_ Analysis & Exploitation of the recently patched Chrome vulnerability.pdf 281.7 KB
- 5-part-100-article/new/Open Source Intelligence Tools (OSINT).pdf 278.5 KB
- 2-part-100-article/new_articles/Linux-Unix-IT Tips and Tricks #1.pdf 278.0 KB
- 5-part-100-article/new/Getting started of security whether it be pen testing, DFIR, reverse engineering.pdf 277.7 KB
- 11-part-24-article/56_article/BugBounty — Compromising UserAccount- ”How I was able tocompromise user account via HTTPParameter Pollution(HPP)”.pdf 276.9 KB
- 10-part-100-article/exploit/Exploit Mitigation Techniques - Data Execution Prevention (DEP) .pdf 276.5 KB
- 2-part-100-article/new_articles/Writeup_ TRAFFIC ANALYSIS EXERCISE.pdf 275.9 KB
- 2-part-100-article/new_articles/Nmap Anonymization with Proxychains.pdf 273.2 KB
- 6-part-100-article/48_article/Tips for Reverse-Engineering Malicious Code.pdf 271.4 KB
- 11-part-24-article/56_article/#BugBounty — “Let me reset yourpassword and login into your account“-How I was able to Compromise anyUser Account via Reset PasswordFunctionality.pdf 271.2 KB
- 2-part-100-article/new_articles/Pentest Tips and Tricks #2.pdf 270.5 KB
- 2-part-100-article/new_articles/trailofbits_github_io_ctf_forensics.pdf 268.6 KB
- 2/0x6_ Polymorphic_Shellcode_Example – Linux-x86.pdf 267.6 KB
- 10-part-100-article/exploit/Windows Process Injection_ WordWarping, Hyphentension, AutoCourgette, Streamception, Oleum, ListPlanting, Treepoline.pdf 267.2 KB
- 5-part-100-article/Hiding Registry keys with PSRe ect.pdf 267.1 KB
- 4-part-100-article/File Upload XSS.pdf 266.9 KB
- 1-part-100-article/google/Google Dorks For Hacking CCTV And Security Cameras .pdf 266.0 KB
- 1-part-100-article/4500_google_dorks.pdf 264.9 KB
- 2-part-100-article/new_articles/Pentest_ Domo arigato mr. Roboto .pdf 264.4 KB
- 3-part-100-article/hacking/Reverse engineering 'Black Desert Online' (1. Preface).pdf 264.4 KB
- 6-part-100-article/LINUX PRIVILEGE ESCALATION.pdf 263.4 KB
- 5-part-100-article/new/Mobile app tra ic analysis – For Fun.pdf 261.3 KB
- 11-part-24-article/56_article/Google hacking (dorking) tutorial #1.pdf 261.2 KB
- 10-part-100-article/Understanding Privilege Escalation.pdf 260.4 KB
- 2-part-100-article/A More Advanced Recon Automation #1 (Subdomains).pdf 260.3 KB
- 1-part-100-article/google/300 Google Dork SQLi Vuln Fresh 2019.pdf 259.8 KB
- 1-part-100-article/google/CC Dork.pdf 259.8 KB
- 11-part-24-article/56_article/BugBounty — How I was able tobypass rewall to get RCE and thenwent from server shell to get rootuser account!.pdf 259.2 KB
- 1-part-100-article/google/Google Dorks List of 2018 for SQL Injection Hacking {NEW}.pdf 257.4 KB
- 1-part-100-article/google/Google Hacking (dorks) .pdf 256.7 KB
- 4-part-100-article/Follow the Bitcoin With Python, BlockExplorer and Webhose.io.pdf 256.6 KB
- 5-part-100-article/googleprojectzero_blogspot_com_2019_04.pdf 256.5 KB
- 10-part-100-article/Windows Exploitation Tricks_ Abusing the User-Mode Debugger.pdf 256.5 KB
- 11-part-24-article/56_article/Penetration Testing for Beginners_ Nmap.pdf 255.9 KB
- 2-part-100-article/Black Hat 2018 tools list.pdf 252.8 KB
- 2-part-100-article/$36k Google App Engine RCE .pdf 252.1 KB
- 11-part-24-article/56_article/Using Powershell to programmatically run nmap scans.pdf 252.0 KB
- 5-part-100-article/GraphQL NoSQL Injection Through JSON Types.pdf 250.7 KB
- 10-part-100-article/exploit/Shellcode_ In-Memory Execution of DLL.pdf 249.5 KB
- 11-part-24-article/56_article/BugBounty @ Linkedln-How I wasable to bypass Open RedirectionProtection.pdf 249.3 KB
- 10-part-100-article/Windows Atomic Tests by ATT&CK Tactic & Technique.pdf 248.2 KB
- 10-part-100-article/Windows Local Privilege Escalation PowerUp.pdf 246.3 KB
- 1-part-100-article/google/GHDB Reborn Dictionary - Exploit-DB.com - 21Sept2011.txt 245.8 KB
- 6-part-100-article/Hybrid Cobalt Strike Redirectors.pdf 244.5 KB
- 3-part-100-article/hacking/How to make a “Ultra-Geek” Linux Workstation.pdf 244.0 KB
- 7-part-100-article/Pentesting Cheatsheet2.pdf 241.3 KB
- 2-part-100-article/new_articles/Pentest_ owning Zico2 .pdf 239.1 KB
- 3-part-100-article/code_google_com_archive_p_androguard_wikis_DatabaseAndroidMa.pdf 238.1 KB
- 5-part-100-article/Gobuster.pdf 237.3 KB
- 2-part-100-article/Adversarial Tactics, Techniques & Common Knowledge.pdf 235.8 KB
- 10-part-100-article/Windows Post Gather Modules.pdf 235.1 KB
- 9-part-100-article/ssl crt.pdf 234.0 KB
- 10-part-100-article/exploit/[VulnHub] SmashTheTux - Chapter 0x00 - Basic Buffer Overflow & Ret2libc .pdf 232.5 KB
- 4-part-100-article/dorks.txt 231.7 KB
- 2-part-100-article/new_articles/Linux-Unix-IT Tips and Tricks #4.pdf 231.2 KB
- 6-part-100-article/John The Ripper Hash Formats.pdf 229.3 KB
- 6-part-100-article/LINUX CHEAT SHEET.pdf 226.7 KB
- 3-part-100-article/Bypassing Application Whitelisting By Using dnx.exe.pdf 226.5 KB
- 4-part-100-article/Enabling Remote Desktop.pdf 226.1 KB
- 1-part-100-article/google/3000+ Google Dorks List 2019 For SQL injection.pdf 225.0 KB
- 10-part-100-article/Unix Linux Cheat Sheet.pdf 224.0 KB
- latest_articles/today/How to become a cybersecurity pro_ A cheat sheet.pdf 223.6 KB
- 5-part-100-article/new/Privilege escalation in Windows Domains (3-3).pdf 222.8 KB
- 2/Demystifying Code Injection Techniques_ Part 1 – Shellcode Injection.pdf 222.0 KB
- 2-part-100-article/new_articles/Pentest_ Lazy Sys Admin .pdf 221.1 KB
- 1-part-100-article/10000_fresh_sqli_vulnerable_websites_list.txt 220.9 KB
- 5-part-100-article/new/My HackTheBox CTF Methodology - From fresh box to root! .pdf 220.8 KB
- 10-part-100-article/Unleashing an Ultimate XSS Polyglot.pdf 220.7 KB
- 11-part-24-article/56_article/Google Hacking Ethics.pdf 219.7 KB
- 2-part-100-article/Big List Of Google Dorks Hacking..pdf 217.3 KB
- 1-part-100-article/google/Google Dorks, a brief list of resources.pdf 215.6 KB
- 2-part-100-article/new_articles/Hack The Box Write-up - Access.pdf 215.2 KB
- 11-part-24-article/56_article/How To Find Admin Login Page Of Any Website Using Hacking Tools .pdf 215.0 KB
- 5-part-100-article/Google Dorks.pdf 213.1 KB
- 2/Buffer Overflow Exploitation .pdf 212.5 KB
- 6-part-100-article/48_article/Msfvenom Cheat Sheet.pdf 209.7 KB
- 10-part-100-article/Windows 10 UAC Loophole Can Be Used to Infect Systems with Malware.pdf 208.7 KB
- 5-part-100-article/GitHub Enterprise Remote Code Execution.pdf 208.0 KB
- 6-part-100-article/48_article/XSS Payloads Cheat Sheet.pdf 204.3 KB
- 2-part-100-article/analyzing-malicious-document-files.pdf 204.2 KB
- 11-part-24-article/56_article/#BugBounty — AWS S3 added to my“Bucket” list!.pdf 204.1 KB
- 11-part-24-article/XXE_payloads.pdf 202.7 KB
- 9-part-100-article/The Drebin Dataset.pdf 201.5 KB
- 6-part-100-article/48_article/Shells in Github Actions.pdf 201.3 KB
- 2-part-100-article/bb/Bug-Hunting-Day-6.pdf 199.8 KB
- 10-part-100-article/Windows Privilege Escalation.pdf 199.6 KB
- 1-part-100-article/8k_carding_dorks__).txt 199.3 KB
- 6-part-100-article/I'll Get Your Credentials ... Later!.pdf 196.5 KB
- 11-part-24-article/56_article/google-dorks.pdf 196.0 KB
- 10-part-100-article/Windows post-exploitation.pdf 194.3 KB
- 6-part-100-article/Linux Atomic Tests by ATT&CK Tactic & Technique.pdf 193.9 KB
- 2-part-100-article/Android Secure Coding Standard.pdf 193.6 KB
- 3-part-100-article/Dark Web OSINT Part Four_ Using Scikit-Learn to Find Hidden Service Clones.pdf 191.9 KB
- 2-part-100-article/bb/Bug-Hunting-Day-7.pdf 190.5 KB
- 5-part-100-article/hq_fortnite__dorks_list.txt 190.5 KB
- 7-part-100-article/malware-analysis-cheat-sheet.pdf 190.3 KB
- 6-part-100-article/48_article/new/Docker and Kubernetes Reverse shells 188.9 KB
- 2-part-100-article/bb/CVE-2019-0708 aka BlueKeep Blueteam cheatsheet[EN.pdf 186.4 KB
- 10-part-100-article/Windows Active Directory Post Exploitation Cheatsheet.pdf 185.7 KB
- 2-part-100-article/blog_fosec_vn_dns_data_exfiltration_what_is_this_and_how_to_.pdf 184.8 KB
- 10-part-100-article/exploit/Hiding with a Linux Rootkit .pdf 182.4 KB
- 2-part-100-article/bb/Bug-Bounty-Bookmarks.pdf 182.4 KB
- 5-part-100-article/Google Dorking - Tutorial .pdf 181.2 KB
- 6-part-100-article/48_article/Making it Rain shells in Kubernetes 180.7 KB
- 4-part-100-article/Dns Recon Cheatsheet.pdf 175.7 KB
- 10-part-100-article/exploit/Weaponized Exploit Writing in GO FUSION0 .pdf 174.3 KB
- 4-part-100-article/Free SMTP Server List - SMTP Servers.pdf 173.9 KB
- 2-part-100-article/Android Security Bulletins.pdf 172.3 KB
- 1-part-100-article/google/How to use Google Dorks for Credit Cards Details.pdf 171.0 KB
- 5-part-100-article/new/Python tools for penetration testers.pdf 170.7 KB
- 3-part-100-article/byt3bl33d3r_github_io_getting_the_goods_with_crackmapexec_pa2.pdf 170.3 KB
- 2-part-100-article/Advisory_ Java-Python FTP Injections Allow for Firewall Bypass.pdf 170.0 KB
- 5-part-100-article/htmlpurifier_org_live_smoketests_xssAttacks_php.pdf 168.7 KB
- 2-part-100-article/billsempf_xss.txt.pdf 168.0 KB
- 4-part-100-article/Expanding Skype Forensics with OSINT_ Email Accounts.pdf 166.9 KB
- 11-part-24-article/56_article/Find Username, Password & CVV Data Using Google Dorks.pdf 164.4 KB
- 11-part-24-article/56_article/Google Hacking Mini-Guide.pdf 163.1 KB
- 5-part-100-article/How we exploited a remote code execution vulnerability in math.js.pdf 162.7 KB
- 3-part-100-article/Bypassing Application Whitelisting By Using rcsi.exe.pdf 162.5 KB
- 6-part-100-article/Links for Doxing, Personal OSInt, Profiling, Footprinting, Cyberstalking.pdf 161.8 KB
- 2/Androguard usage.pdf 161.6 KB
- 6-part-100-article/Linux Post Exploitation Command List.pdf 159.4 KB
- latest_articles/today/Cheating at Moonlighter - Part 4 - Defense.pdf 158.1 KB
- 2-part-100-article/An A-Z Index of the Windows CMD command line.pdf 157.7 KB
- 10-part-100-article/XSS-Payloads.pdf 156.8 KB
- 6-part-100-article/48_article/OSCP Note - Common use of Netcat(nc) and Ncat.pdf 156.5 KB
- 6-part-100-article/List Of Vulnerable SQL Injection Sites.pdf 155.2 KB
- 1-part-100-article/google/Google Hacking Master List.pdf 154.9 KB
- 2-part-100-article/new_articles/Security Resources Part - 2.pdf 153.9 KB
- latest_articles/today/SQL INJECTION CHEAT SHEET.pdf 152.8 KB
- 7-part-100-article/PowerView-3.0 tips and tricks.pdf 150.8 KB
- 10-part-100-article/xss_payloads_2016.pdf 150.4 KB
- 2-part-100-article/Aircrack-ng Cheatsheet.pdf 149.4 KB
- 10-part-100-article/xssdb_net_xssdb_txt.pdf 149.0 KB
- 6-part-100-article/48_article/Yet Another OSCP Exam Blog Post.pdf 148.0 KB
- 2-part-100-article/new_articles/Introduction to Computer Security.pdf 147.3 KB
- 2-part-100-article/new_articles/Hack The Box Write-up - Carrier.pdf 147.2 KB
- 2-part-100-article/new_articles/Infrastructure PenTest Series _ Part 5 - Reporting.pdf 145.7 KB
- latest_articles/today/oscp_links.pdf 145.2 KB
- 2-part-100-article/bitrot_sh_cheatsheet.pdf 144.4 KB
- 2/awesome-exploit-development.pdf 142.7 KB
- 10-part-100-article/exploit/Part 1_ Introduction to Exploit Development.pdf 142.4 KB
- latest_articles/today/Wireless Penetration Testing Cheat Sheet.pdf 141.9 KB
- 1-part-100-article/google/GHDB Reborn Dictionary - NEW ONLY - Exploit-DB.com - 21Sept2011.txt 140.3 KB
- 5-part-100-article/How to bypass libinjection in many WAF NGWAF.pdf 139.1 KB
- 6-part-100-article/I N T R O D U C T I O N T O A R M A S S E M B LY B A S I C S.pdf 139.0 KB
- 2-part-100-article/new_articles/iOS Pentesting Tools.pdf 137.7 KB
- 7-part-100-article/OSCP Notes – Shells .pdf 137.0 KB
- 2-part-100-article/new_articles/Linux Notes + Cheatsheet.pdf 133.0 KB
- 11-part-24-article/56_article/GooGle Dorks List .pdf 132.4 KB
- 2-part-100-article/new_articles/Hack The Box Write-up - Calamity.pdf 131.4 KB
- latest_articles/today/Pentest-Cheat-Sheet.pdf 130.8 KB
- 2-part-100-article/android pentesting sheet .pdf 129.2 KB
- 8-part-100-article/Microsoft Windows - UAC Protection Bypass (Via Slui File Handler Hijack) (Metasploit).pdf 126.0 KB
- latest_articles/today/windows_privesc .pdf 125.5 KB
- 2-part-100-article/android pentesting sheet 2.pdf 122.3 KB
- 1-part-100-article/google/gist_github_com_zbetcheckin_04e6a5d7f2d5ef8cfa3c298701f47f9c.pdf 121.1 KB
- 2-part-100-article/new_articles/GoLang dropper with a Gravity RAT.pdf 121.0 KB
- latest_articles/today/Hping3 Linux Tutorial.pdf 120.7 KB
- 10-part-100-article/xss-d3adend.org.txt.pdf 120.1 KB
- 10-part-100-article/unix-privesc-check.pdf 119.9 KB
- 3-part-100-article/byt3bl33d3r_github_io_getting_the_goods_with_crackmapexec_pa.pdf 118.4 KB
- 2-part-100-article/new_articles/Pentesting.pdf 115.7 KB
- 3-part-100-article/hacking/malware-traffic-analysis.net.pdf 115.4 KB
- 4-part-100-article/Dump LAPS passwords with ldapsearch.pdf 113.8 KB
- 4-part-100-article/Free SMTP servers list.pdf 111.9 KB
- 7-part-100-article/Postgres SQL Injection Cheat Sheet.pdf 110.4 KB
- 6-part-100-article/Ingres SQL Injection Cheat Sheet.pdf 110.1 KB
- 2-part-100-article/3k_dorks_shopping_by_rusev_-_hack-ar.com.txt 109.9 KB
- 2-part-100-article/new_articles/Hack The Box Write-up - Active.pdf 108.8 KB
- 4-part-100-article/DORKS 2018 .txt 107.1 KB
- 8-part-100-article/Reverse Shell Cheat Sheet.pdf 107.0 KB
- 2-part-100-article/new_articles/OSINT_Toolkit.pdf 106.0 KB
- 6-part-100-article/Linux Advanced Privilege Escalation.pdf 105.2 KB
- 2-part-100-article/0day _In the Wild_.pdf 104.7 KB
- 8-part-100-article/Microsoft Windows - Token Process Trust SID Access Check Bypass Privilege Escalation.pdf 102.5 KB
- 2-part-100-article/new_articles/Hack The Box Write-up - Dropzone.pdf 99.3 KB
- 9-part-100-article/SQLite3 Injection Cheat Sheet.pdf 98.7 KB
- 1-part-100-article/google/dork-vuln-part1.txt 97.3 KB
- 2-part-100-article/Application whitelist bypass using XLL and embedded shellcode.pdf 96.4 KB
- 2-part-100-article/new_articles/Hack The Box Write-up - DevOops.pdf 94.6 KB
- 6-part-100-article/Linux Privilege Escalation Scripts.pdf 93.2 KB
- 10-part-100-article/exploit/Part 1_ Introduction to Linux Exploit Development.pdf 92.7 KB
- 8-part-100-article/MySQL SQL Injection Cheat Sheet.pdf 89.5 KB
- 3-part-100-article/DB2 SQL Injection Cheat Sheet.pdf 86.3 KB
- 4-part-100-article/Empire 1.5.pdf 84.9 KB
- latest_articles/today/‘ip’ Command cheat sheet (Command Line Reference).pdf 82.9 KB
- 3-part-100-article/carding_dorks_2019.txt 82.1 KB
- 2-part-100-article/bb/Bug-Hunting-Day-5.pdf 80.4 KB
- 3-part-100-article/Cross-site scripting .pdf 79.3 KB
- 9-part-100-article/sqli_dork_2019.txt 73.8 KB
- 2-part-100-article/androguard_readthedocs_io_en_latest_tools_androaxml_html.pdf 71.6 KB
- 2-part-100-article/bb/Career Cheatsheet.pdf 65.5 KB
- 2-part-100-article/new_articles/Links ___ start hacking.pdf 64.9 KB
- 7-part-100-article/Privilege Escalation.pdf 64.4 KB
- 3-part-100-article/hacking/Reverse Engineering Resources for 2019.pdf 63.3 KB
- 1-part-100-article/google/dork-vuln-part3.txt 53.2 KB
- lista.txt 47.3 KB
- 6-part-100-article/Links-Mentioned-in-WPTonic-146.pdf 43.9 KB
- 8-part-100-article/real_carding_dorks.txt 38.1 KB
- 1-part-100-article/google/fresh_dorks_carding_2017-2018_by_Toxic Boys Team.txt 36.1 KB
- 2-part-100-article/new_articles/WPA+WPA2-ENTERPRISE Best Practice Guide.pdf 36.0 KB
- 8-part-100-article/new_exploit_development_2018.txt 33.8 KB
- 2-part-100-article/best_google_hacking_list_on_the_net.(1).txt 32.1 KB
- 1-part-100-article/17k_carding_dorks_2019(1).txt 29.3 KB
- 7-part-100-article/OSCP Notes by Ash.txt 22.8 KB
- 5-part-100-article/google-dorks 14.5 KB
- 1-part-100-article/650 DORKS CC BY yZeruhh _3 _!.txt 11.5 KB
- 1-part-100-article/google/dork-vuln-part2.txt 11.4 KB
- 5-part-100-article/HQ SQLI Google Dorks For Shops-Amazon.txt 10.9 KB
- 5-part-100-article/Good reviews of CT-OSCE .txt 10.8 KB
- 1-part-100-article/google/SharePoint Bing Queries.txt 9.5 KB
- 1-part-100-article/google/SharePoint Google Queries - 18MAR2012.txt 8.4 KB
- 1-part-100-article/google/Shodan Queries.txt 7.5 KB
- 1-part-100-article/100_sqli_vulnerable_websites_jun,24,2018.txt 6.1 KB
- 10-part-100-article/Vulnerability Research Engineering Bookmarks Collection v1.0.txt 4.8 KB
- 2-part-100-article/admin_login_dorks.txt 4.3 KB
- 3-part-100-article/camera_dorks.txt 4.2 KB
- 1-part-100-article/google/google_dork_adminlist_sguru.txt 4.2 KB
- 1-part-100-article/221 Admin.txt 3.3 KB
- 4-part-100-article/exploit_dorks_for_joomla,fck_and_others_2015_old_but_gold.txt 2.9 KB
- 10-part-100-article/wordpress_uploadify_dorks_priv8.txt 1.6 KB
- 6-part-100-article/Gain access to unsecured IP cameras with these Google dorks.txt 1.4 KB
- 5-part-100-article/hq_dorks_2017_fresh_dorks!!!!!.txt 1.2 KB
- 1-part-100-article/8500_sql_dorks.txt 754 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.