Bookmark and Share

[Listing for Security]

[ How to hack with XPath queries ]  

[ Common methods to exploit SQL servers ]   (3 months ago)

[ Privilege escalation in Windows XP up to SP 3 ]   (2 weeks ago)

[ Kali Linux - Available tools ]  

[ Explaining the pirate bay architecture ]  

[ Security Links ]   (3 weeks ago)

[ Secure tunnelling ]  

[ Bit as a string ]   (3 months ago)

[ Bit as C# Hex ]  

[ .Net Security Collection ]   (3 months ago)

[ .Net padding oracle exploitation ]   (3 months ago)

[ Saveable or injectable .Net Shellcode ]  

[ .Net shellcode load and execute ]   (3 months ago)

[ Active Directory Attacks ]   (3 months ago)

[ Common LDAP Queries ]   (3 months ago)

[ AD Escalation attacks ]   (3 months ago)

[ List of security videos ]  

[ HSTS - Http Strict Transport Security ]  

[ Hidden custom DNS settings on windows ]  

[ Verify the SSL certificate of your banking / sensitive site for free ]  

[ SSL certificate verification plugins ]  

[ Rogue AP on customized Samsung Galaxy S2 ]  

[ List of all tools i use from git ]   (16 months ago)

[ Notes on arsemblage ]   (15 months ago)

[ Windows Persistence Techniques ]  

[ Active Network Sniffing Methods ]   (3 months ago)

[ Well known/important internet protocol ports with their secure counterpart ports if any exists ]  

[ The Open Systems Interconnection (OSI) Model ]  

[ The art of Network Scanning ]  

[ Using nmap as an active network scanning tool ]  

[ IANA ICMP types and codes ]   (4 months ago)

[ Registry settings to disable legacy DDE server execution ]  

[ Pentesting playbooks ]  

[ Setting up and usage of IODINE DNS Tunnels ]   (2 months ago)

[ Windows shell oneliners ]   (3 months ago)

[ github cyber source repo listing ]   (2 months ago)

[ How to Hijack RDP sessions with TSCon.exe with no exploit ]   (1 months ago)

[ How to reroute your mobile traffic through your laptop wifi and out your ethernet connection through upstream socks proxy ]   (1 months ago)

[ Corelan Buffer Overflow Tutorial - C# solution ]   (1 months ago)

[ Archived version of Corelan tut 1 ]   (1 months ago)

[ How to generate alphanumeric shellcode with rapid7's msfvenom ]   (1 months ago)

[ All the techniques you can use to redirect execution to your shellcode ]   (1 months ago)

[ How to run mimikatz undetected on Windows 10 x64 by;assing windows defender ]   (3 weeks ago)

[ Advanced XSS/Cross-Site Scripting - Post (and pre) exploitation with thefatrat ]   (2 weeks ago)

[ Low hanging fruit privilege escalation in linux ]   (2 weeks ago)