Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
XCHADXFAQ77X
GitHub Repository: XCHADXFAQ77X/HACKING-BOOKS-X
Path: tree/master/10-part-100-article
317 views
Name
Size
Last Modified
Use Tor. Use Empire. .pdf644.1 KB
Vi Cheat Sheet ∞ .pdf1.9 MB
Web Application Penetration Testing Cheat Sheet ∞ .pdf3.2 MB
Whole Vibratissimo Smart Sex Toy XSS Disclosure Authentication .pdf1.6 MB
USING A SCF FILE TO GATHER HASHES.pdf377.1 KB
USING THE DDE ATTACK WITH POWERSHELL EMPIRE.pdf1 MB
Ultimate AppLocker ByPass List.pdf435.6 KB
Understanding Guide to Mimikatz.pdf2.8 MB
Understanding Privilege Escalation.pdf266.6 KB
Understanding the ELF.pdf315.3 KB
Unicode Domains are bad.pdf2.5 MB
Universal Radio Hacker: investigate wireless protocols like a boss.pdf894.6 KB
Unix Linux Cheat Sheet.pdf229.4 KB
Unleashing an Ultimate XSS Polyglot.pdf225.9 KB
Unquoted Service Path.pdf1.3 MB
Use your macOS terminal shell to do awesome things..pdf575 KB
Userland API Monitoring and Code Injection Detection.pdf753.9 KB
Using SQL Server for attacking a Forest Trust.pdf690.7 KB
Using WebDAV features as a covert channel.pdf941.9 KB
VNC Penetration Testing (Port 5901).pdf2.1 MB
VNC Pivoting through Meterpreter.pdf1.2 MB
VNC tunneling over SSH.pdf1.2 MB
Vacuuming Image Metadata from The Wayback Machine.pdf344.1 KB
Various public documents, whitepapers and articles about APT campaigns.pdf488 KB
Virtually Unlimited Memory: Escaping the Chrome Sandbox.pdf403.7 KB
Vulnerability Research Engineering Bookmarks Collection v1.0.txt4.9 KB
WINDOWS DEFENDE R ATTACK SURFACE R ED U C TI ON RULES BYPASS.pdf2.4 MB
WSH Injection: A Case Study.pdf335.6 KB
WannaCry & Google Hacking.pdf375.1 KB
Weak Service Permissions.pdf1.9 MB
Web Application Firewall (WAF) Evasion Techniques #2.pdf2.1 MB
Web Application Firewall (WAF) Evasion Techniques.pdf1.8 MB
Web Penetration Testing.pdf627.7 KB
Webshell to Meterpreter.pdf1.4 MB
Week in OSINT #2018–35.pdf402 KB
Week in OSINT #2019–14.pdf687.2 KB
Well, That Escalated Quickly....pdf766.8 KB
What is Google Dorks? Interesting Google Dorks.pdf2.4 MB
WiFi arsenal.pdf799.9 KB
Wifi Post Exploitation on Remote PC.pdf4.8 MB
Wiki to collect Red Team infrastructure hardening resources.pdf2.6 MB
Windows 10 UAC Loophole Can Be Used to Infect Systems with Malware.pdf213.7 KB
Windows Active Directory Post Exploitation Cheatsheet.pdf190.1 KB
Windows Atomic Tests by ATT&CK Tactic & Technique.pdf254.1 KB
Windows Command Prompt cmd Cheat Sheet - The Hackr.pdf811.7 KB
Windows Domains, Pivot & Profit.pdf4.9 MB
Windows Exploitation Tricks: Abusing the User-Mode Debugger.pdf262.6 KB
Windows IR Live Forensics Cheat Sheet.pdf562.8 KB
Windows Kernel Exploits.pdf973.8 KB
Windows Local Privilege Escalation PowerUp.pdf252.2 KB
  • 1
  • 2