Bookmark and Share BitCoin Donate: 13t8gAWVpHP2ddxMp88d1NFpZjnFJC6UwK

[Listing for Security]

[ How to hack with XPath queries ]  

[ Common methods to exploit SQL servers ]   (2 weeks ago)

[ Priviledge escalation in Windows XP up to SP 3 ]  

[ Kali Linux - Available tools ]  

[ Explaining the pirate bay architecture ]  

[ Security Links ]   (1 weeks ago)

[ Secure tunnelling ]  

[ Bit as a string ]   (2 weeks ago)

[ Bit as C# Hex ]  

[ .Net Security Collection ]   (2 weeks ago)

[ .Net padding oracle exploitation ]   (2 weeks ago)

[ Saveable or injectable .Net Shellcode ]  

[ .Net shellcode load and execute ]   (2 weeks ago)

[ Active Directory Attacks ]   (2 weeks ago)

[ Common LDAP Queries ]   (2 weeks ago)

[ AD Escalation attacks ]   (2 weeks ago)

[ List of security videos ]  

[ HSTS - Http Strict Transport Security ]  

[ Hidden custom DNS settings on windows ]  

[ Verify the SSL certificate of your banking / sensitive site for free ]  

[ SSL certificate verification plugins ]  

[ Rogue AP on customized Samsung Galaxy S2 ]  

[ List of all tools i use from git ]   (13 months ago)

[ Notes on arsemblage ]   (12 months ago)

[ Windows Persistence Techniques ]  

[ Active Network Sniffing Methods ]   (2 weeks ago)

[ Well known/important internet protocol ports with their secure counterpart ports if any exists ]  

[ The Open Systems Interconnection (OSI) Model ]  

[ The art of Network Scanning ]  

[ Using nmap as an active network scanning tool ]  

[ IANA ICMP types and codes ]   (1 months ago)

[ Registry settings to disable legacy DDE server execution ]  

[ Pentesting playbooks ]  

[ Setting up and usage of IODINE DNS Tunnels ]   (1 weeks ago)

[ Windows shell oneliners ]   (1 weeks ago)

[ github cyber source repo listing ]   (1 weeks ago)