| Use Tor. Use Empire. .pdf | 644.1 KB | |
| Vi Cheat Sheet ∞ .pdf | 1.9 MB | |
| Web Application Penetration Testing Cheat Sheet ∞ .pdf | 3.2 MB | |
| Whole Vibratissimo Smart Sex Toy XSS Disclosure Authentication .pdf | 1.6 MB | |
| USING A SCF FILE TO GATHER HASHES.pdf | 377.1 KB | |
| USING THE DDE ATTACK WITH POWERSHELL EMPIRE.pdf | 1 MB | |
| Ultimate AppLocker ByPass List.pdf | 435.6 KB | |
| Understanding Guide to Mimikatz.pdf | 2.8 MB | |
| Understanding Privilege Escalation.pdf | 266.6 KB | |
| Understanding the ELF.pdf | 315.3 KB | |
| Unicode Domains are bad.pdf | 2.5 MB | |
| Universal Radio Hacker: investigate wireless protocols like a boss.pdf | 894.6 KB | |
| Unix Linux Cheat Sheet.pdf | 229.4 KB | |
| Unleashing an Ultimate XSS Polyglot.pdf | 225.9 KB | |
| Unquoted Service Path.pdf | 1.3 MB | |
| Use your macOS terminal shell to do awesome things..pdf | 575 KB | |
| Userland API Monitoring and Code Injection Detection.pdf | 753.9 KB | |
| Using SQL Server for attacking a Forest Trust.pdf | 690.7 KB | |
| Using WebDAV features as a covert channel.pdf | 941.9 KB | |
| VNC Penetration Testing (Port 5901).pdf | 2.1 MB | |
| VNC Pivoting through Meterpreter.pdf | 1.2 MB | |
| VNC tunneling over SSH.pdf | 1.2 MB | |
| Vacuuming Image Metadata from The Wayback Machine.pdf | 344.1 KB | |
| Various public documents, whitepapers and articles about APT campaigns.pdf | 488 KB | |
| Virtually Unlimited Memory: Escaping the Chrome Sandbox.pdf | 403.7 KB | |
| Vulnerability Research Engineering Bookmarks Collection v1.0.txt | 4.9 KB | |
| WINDOWS DEFENDE R ATTACK SURFACE R ED U C TI ON RULES BYPASS.pdf | 2.4 MB | |
| WSH Injection: A Case Study.pdf | 335.6 KB | |
| WannaCry & Google Hacking.pdf | 375.1 KB | |
| Weak Service Permissions.pdf | 1.9 MB | |
| Web Application Firewall (WAF) Evasion Techniques #2.pdf | 2.1 MB | |
| Web Application Firewall (WAF) Evasion Techniques.pdf | 1.8 MB | |
| Web Penetration Testing.pdf | 627.7 KB | |
| Webshell to Meterpreter.pdf | 1.4 MB | |
| Week in OSINT #2018–35.pdf | 402 KB | |
| Week in OSINT #2019–14.pdf | 687.2 KB | |
| Well, That Escalated Quickly....pdf | 766.8 KB | |
| What is Google Dorks? Interesting Google Dorks.pdf | 2.4 MB | |
| WiFi arsenal.pdf | 799.9 KB | |
| Wifi Post Exploitation on Remote PC.pdf | 4.8 MB | |
| Wiki to collect Red Team infrastructure hardening resources.pdf | 2.6 MB | |
| Windows 10 UAC Loophole Can Be Used to Infect Systems with Malware.pdf | 213.7 KB | |
| Windows Active Directory Post Exploitation Cheatsheet.pdf | 190.1 KB | |
| Windows Atomic Tests by ATT&CK Tactic & Technique.pdf | 254.1 KB | |
| Windows Command Prompt cmd Cheat Sheet - The Hackr.pdf | 811.7 KB | |
| Windows Domains, Pivot & Profit.pdf | 4.9 MB | |
| Windows Exploitation Tricks: Abusing the User-Mode Debugger.pdf | 262.6 KB | |
| Windows IR Live Forensics Cheat Sheet.pdf | 562.8 KB | |
| Windows Kernel Exploits.pdf | 973.8 KB | |
| Windows Local Privilege Escalation PowerUp.pdf | 252.2 KB | |