Use Tor. Use Empire. .pdf
Web Application Penetration Testing Cheat Sheet ∞ .pdf
Whole Vibratissimo Smart Sex Toy XSS Disclosure Authentication .pdf
USING A SCF FILE TO GATHER HASHES.pdf
USING THE DDE ATTACK WITH POWERSHELL EMPIRE.pdf
Ultimate AppLocker ByPass List.pdf
Understanding Guide to Mimikatz.pdf
Understanding Privilege Escalation.pdf
Understanding the ELF.pdf
Unicode Domains are bad.pdf
Universal Radio Hacker: investigate wireless protocols like a boss.pdf
Unix Linux Cheat Sheet.pdf
Unleashing an Ultimate XSS Polyglot.pdf
Unquoted Service Path.pdf
Use your macOS terminal shell to do awesome things..pdf
Userland API Monitoring and Code Injection Detection.pdf
Using SQL Server for attacking a Forest Trust.pdf
Using WebDAV features as a covert channel.pdf
VNC Penetration Testing (Port 5901).pdf
VNC Pivoting through Meterpreter.pdf
VNC tunneling over SSH.pdf
Vacuuming Image Metadata from The Wayback Machine.pdf
Various public documents, whitepapers and articles about APT campaigns.pdf
Virtually Unlimited Memory: Escaping the Chrome Sandbox.pdf
Vulnerability Research Engineering Bookmarks Collection v1.0.txt
WINDOWS DEFENDE R ATTACK SURFACE R ED U C TI ON RULES BYPASS.pdf
WSH Injection: A Case Study.pdf
WannaCry & Google Hacking.pdf
Weak Service Permissions.pdf
Web Application Firewall (WAF) Evasion Techniques #2.pdf
Web Application Firewall (WAF) Evasion Techniques.pdf
Web Penetration Testing.pdf
Webshell to Meterpreter.pdf
Week in OSINT #2018–35.pdf
Week in OSINT #2019–14.pdf
Well, That Escalated Quickly....pdf
What is Google Dorks? Interesting Google Dorks.pdf
Wifi Post Exploitation on Remote PC.pdf
Wiki to collect Red Team infrastructure hardening resources.pdf
Windows 10 UAC Loophole Can Be Used to Infect Systems with Malware.pdf
Windows Active Directory Post Exploitation Cheatsheet.pdf
Windows Atomic Tests by ATT&CK Tactic & Technique.pdf
Windows Command Prompt cmd Cheat Sheet - The Hackr.pdf
Windows Domains, Pivot & Profit.pdf
Windows Exploitation Tricks: Abusing the User-Mode Debugger.pdf
Windows IR Live Forensics Cheat Sheet.pdf
Windows Kernel Exploits.pdf
Windows Local Privilege Escalation PowerUp.pdf
Windows Post Gather Modules.pdf
Windows Privilege Abuse: Auditing, Detection, and Defense.pdf
Windows Privilege Escalation Fundamentals.pdf
Windows Privilege Escalation.pdf
Windows Userland Persistence Fundamentals.pdf
Windows post-exploitation.pdf
Working of Traceroute using Wireshark.pdf
Writing a Custom Shellcode Encoder.pdf
X11 penetration testing.pdf
XSS Filter Evasion Cheat Sheet.pdf
XSSer – Automated Framework Tool to Detect and Exploit XSS vulnerabilities.pdf
us-17-Lekies-Dont-Trust-The-DOM-Bypassing-XSS-Mitigations-Via-Script-Gadgets.pdf
us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-Languages.pdf
v Geist WatchDog Console 3.2.2 XSS XML Injection Insecure Permissions .pdf
wordpress_uploadify_dorks_priv8.txt
www_slideshare_net_SamNizam_3_google_hacking(1).pdf
www_slideshare_net_SamNizam_3_google_hacking.pdf
0xsp | Privilege Escalation cheatsheet.pdf
100% evasion - Write a crypter in any language to bypass AV.pdf
A Complete Penetration Testing & Hacking Tools List for Hackers & Security Professionals.pdf
A Guide To Social Media Intelligence Gathering (SOCMINT).pdf
A Pentester's Guide - Part 2 (OSINT - LinkedIn is not just for jobs).pdf
A Pivot Cheatsheet for Pentesters.pdf
A guide to Linux Privilege Escalation.pdf
A guide to searching LinkedIn by email address.pdf
AWAE-OSWE PREP (Code analysis to gaining rce and automating everything with Python).pdf
Abusing Firefox in Enterprise Environments.pdf
Analysing over 1M leaked passwords from the UK's biggest companies.pdf
Android App Hacking: Hardcoded Credentials.pdf
Apache Tomcat RCE by deserialization (CVE-2020-9484) – write-up and exploit.pdf
Attacking Azure Container Registries with Compromised Credentials.pdf
Authenticate against a MySQL server without knowing the cleartext password.pdf
Beginner Tips to Own Boxes at HackTheBox !.pdf
BountyCon CTF 2020 Write-up.pdf
Brute Forcing User IDS via CSRF To Delete all Users with CSRF attack..pdf
Bug Bounty (JavaScript Files).pdf
Bug Bounty Cheatsheet.pdf
Bug Bytes #71 – 20K Facebook XSS, LevelUp 0x06 & Naffy’s Notes.pdf
Bypassing modern XSS mitigations with code-reuse attacks.pdf
Cisco Password Cracking and Decrypting Guide - InfosecMatter.pdf
Comprehensive Guide on Password Spraying Attack.pdf
Comprehensive Guide to tcpdump (Part 2) .pdf
Corporate Reconnaissance.pdf
Credential Dumping: Applications.pdf
Credential Dumping: Windows Credential Manager.pdf
Cross-Site Scripting (XSS) Cheat Sheet - 2020 Edition.pdf
DNS Rebinding: Stealing WiFi credentials through your solar panel inverter.pdf
DOM XSS in Gmail with a little helpfrom Chrome.pdf
Decrypting and analyzing HTTPS traffic without MITM.pdf
Discovering the IP address of a Wordpress site hidden behind Cloudflare.pdf
Documenting the impossible: Unexploitable XSS labs.pdf
Domain Persistence: Golden Ticket Attack .pdf
Evading Detection with Excel 4.0 Macros and the BIFF8 XLS Format .pdf
Everything You Need to Know About IDOR (Insecure Direct Object References).pdf
Hacking-OSCP cheatsheet.pdf
Harvesting Whois Data for OSINT.pdf
How to hack a company by circumventing its WAF for fun and profit – part 3.pdf
LinkedIn OSINT Techniques: Part I.pdf
MR. ROBOT 1 – CAPTURE THE FLAG CHALLENGE, WALK THROUGH.pdf
OSINT: Google and LinkedIn.pdf
OWASP Amass: A Solid Information Gathering Tool.pdf
OWNING O365 THROUGH BETTER BRUTE-FORCING.pdf
Out of Band Exploitation (OOB) CheatSheet.pdf
Relaying NTLM authentication over RPC.pdf
Roasting your way to DA - Build-Break-Defend-Fix.pdf
S3 Bucket Misconfiguration: From Basics to Pawn.pdf
Shodan Pentesting Guide.pdf
TryHackMe DailyBugle Writeup - Exploiting Joomla Version 3.7.0.pdf
Tutorial on privilege escalation and post exploitation tactics in Google Cloud Platform environments .pdf
UAC bypass through Trusted Folder abuse.pdf
WPScan:WordPress Pentesting Framework.pdf
Windows Firewall Post Exploitation with Netsh.pdf
Windows Privilege Escalation Cheatsheet for OSCP .pdf
using-snapchat-for-osint-.pdf
Folders and files Name Name Last commit message
Last commit date
parent directory
View all files
You can’t perform that action at this time.