Bookmark and Share

[Listing for Security]

[ How to hack with XPath queries ]  

[ Common methods to exploit SQL servers ]   (6 months ago)

[ Privilege escalation in Windows XP up to SP 3 ]   (3 months ago)

[ Kali Linux - Available tools ]  

[ Explaining the pirate bay architecture ]  

[ Security Links ]   (3 months ago)

[ Secure tunnelling ]  

[ Bit as a string ]   (6 months ago)

[ Bit as C# Hex ]  

[ .Net Security Collection ]   (6 months ago)

[ .Net padding oracle exploitation ]   (6 months ago)

[ Saveable or injectable .Net Shellcode ]  

[ .Net shellcode load and execute ]   (6 months ago)

[ Active Directory Attacks ]   (6 months ago)

[ Common LDAP Queries ]   (6 months ago)

[ AD Escalation attacks ]   (6 months ago)

[ List of security videos ]  

[ HSTS - Http Strict Transport Security ]  

[ Hidden custom DNS settings on windows ]  

[ Verify the SSL certificate of your banking / sensitive site for free ]  

[ SSL certificate verification plugins ]  

[ Rogue AP on customized Samsung Galaxy S2 ]  

[ List of all tools i use from git ]   (19 months ago)

[ Notes on arsemblage ]   (17 months ago)

[ Windows Persistence Techniques ]  

[ Active Network Sniffing Methods ]   (6 months ago)

[ Well known/important internet protocol ports with their secure counterpart ports if any exists ]  

[ The Open Systems Interconnection (OSI) Model ]  

[ The art of Network Scanning ]  

[ Using nmap as an active network scanning tool ]  

[ IANA ICMP types and codes ]   (7 months ago)

[ Registry settings to disable legacy DDE server execution ]  

[ Pentesting playbooks ]  

[ Setting up and usage of IODINE DNS Tunnels ]   (5 months ago)

[ Windows and Linux shell oneliners ]   (6 days ago)

[ github cyber source repo listing ]   (5 months ago)

[ How to Hijack RDP sessions with TSCon.exe with no exploit ]   (4 months ago)

[ How to reroute your mobile traffic through your laptop wifi and out your ethernet connection through upstream socks proxy ]   (4 months ago)

[ Corelan Buffer Overflow Tutorial - C# solution ]   (4 months ago)

[ Archived version of Corelan tut 1 ]   (4 months ago)

[ How to generate alphanumeric shellcode with rapid7's msfvenom ]   (4 months ago)

[ All the techniques you can use to redirect execution to your shellcode ]   (4 months ago)

[ How to run mimikatz undetected on Windows 10 x64 by;assing windows defender ]   (3 months ago)

[ Advanced XSS/Cross-Site Scripting - Post (and pre) exploitation with thefatrat ]   (3 months ago)

[ Low hanging fruit privilege escalation in linux ]   (3 months ago)

[ Attacking Adobe ColdFusion for Pentesters ]   (2 months ago)

[ Quick certificate pinning bypass for Android pentest ]   (1 months ago)

[ Writing the Total Meltdown Exploit ]   (4 weeks ago)

[ Pass-the-Hash Is Dead: Long Live LocalAccountTokenFilterPolicy ]   (4 weeks ago)

[ How to attach terminal to a detached process ]   (4 weeks ago)

[ Pass the hash with metasploit using ntlmv1 and ntlmv2 ]   (3 weeks ago)

[ Cool article on easily bypassing cert pinning in android ]   (2 weeks ago)

[ Beginner ROP walkthrough, tools, methods ]   (2 weeks ago)

[ Process PCAP network stream captures with BRO ]   (1 weeks ago)

[ Responder features and tutorial from TrustWave ]   (1 weeks ago)

[ How to exploit CVE-2018-0886 ]   (1 weeks ago)