| Trend Micro Threat Discovery Appliance - Session Generation Authentication Bypass (CVE-2016-8584) .pdf | 657.5 KB | |
| #BugBounty — API keys leakage,Source code disclosure in India’slargest e-commerce healthcare company..pdf | 321.4 KB | |
| #BugBounty — AWS S3 added to my“Bucket” list!.pdf | 208.9 KB | |
| #BugBounty — Exploiting CRLFInjection can lands into a nice bounty.pdf | 436.9 KB | |
| #BugBounty — How I was able todownload the Source Code of India’sLargest Telecom Service Providerincluding dozens of more popularwebsites!.pdf | 399.7 KB | |
| #BugBounty — “How I was able toshop for free!”- Payment PriceManipulation.pdf | 513.6 KB | |
| #BugBounty — “I don’t need your current password to login into youraccount” - How could I completely takeover any user’s account in anonline classi ed ads company..pdf | 320.9 KB | |
| #BugBounty — “Journey from LFI toRCE!!!”-How I was able to get thesame in one of the India’s popularproperty buy-sell company..pdf | 313.9 KB | |
| #BugBounty — “Let me reset yourpassword and login into your account“-How I was able to Compromise anyUser Account via Reset PasswordFunctionality.pdf | 277.7 KB | |
| A guide to ethical hacking — Understanding Nmap.pdf | 509.8 KB | |
| Bug Bounty Guide2.pdf | 620.5 KB | |
| BugBounty @ Linkedln-How I wasable to bypass Open RedirectionProtection.pdf | 255.2 KB | |
| BugBounty — Compromising UserAccount- ”How I was able tocompromise user account via HTTPParameter Pollution(HPP)”.pdf | 283.5 KB | |
| BugBounty — How I was able tobypass rewall to get RCE and thenwent from server shell to get rootuser account!.pdf | 265.4 KB | |
| Cloud Security ~ Why Use a VPN for Remote Administration?.pdf | 741.2 KB | |
| Detecting and Tracking the Red-Team.pdf | 1.5 MB | |
| Difference between Nmap TCP SYN Scan and TCP Connect Scan.pdf | 965.8 KB | |
| Exfiltration series: Certexfil.pdf | 574.7 KB | |
| Exfiltration series: Spotexfil.pdf | 682.6 KB | |
| Find Username, Password & CVV Data Using Google Dorks.pdf | 168.3 KB | |
| GooGle Dorks List .pdf | 135.5 KB | |
| Google Dorks List - For Find Sensitive Data .pdf | 477.9 KB | |
| Google Dorks List 2019 | Fresh Google Dorks 2019 for SQLi.pdf | 498.2 KB | |
| Google Dorks List 2019 | Labtest Google Dorks 2019 for SQLi.pdf | 632.4 KB | |
| Google Dorks List 2019 | Latest Google Dorks 2019 for SQLi.pdf | 430.1 KB | |
| Google Dorks List “Google Hacking”.pdf | 320.4 KB | |
| Google Hacking Ethics.pdf | 224.9 KB | |
| Google Hacking Mini-Guide.pdf | 167 KB | |
| Google hacking (dorking) tutorial #1.pdf | 267.4 KB | |
| How To Find Admin Login Page Of Any Website Using Hacking Tools .pdf | 220.2 KB | |
| How to never have a public S3 bucket.pdf | 914.4 KB | |
| NMAP How-To.pdf | 527.2 KB | |
| Nmap In The Windows Bash Shell (WSL).pdf | 497.3 KB | |
| Parrot OS on Windows (WSL).pdf | 433.8 KB | |
| Penetration Testing for Beginners: Nmap.pdf | 262 KB | |
| Penetration Testing — mehr Komfort mit nmap.pdf | 516.3 KB | |
| Red-Team: Java Deserialization — From Discovery to Reverse Shell on Limited Environments.pdf | 1.5 MB | |
| Tracking Users: From Cookies to DeviceFingerprinting.pdf | 328 KB | |
| Trust Direction: An Enabler for Active Directory Enumeration andTrust Exploitation.pdf | 710.7 KB | |
| UAC BYPASS WITH ELEVATED PRIVILEGESWORKS ON ALL WINDOWS VERSIONS.pdf | 309.1 KB | |
| Understanding Nmap by using hping.pdf | 646.5 KB | |
| Using Powershell to programmatically run nmap scans.pdf | 258 KB | |
| Week in OSINT #2019–13.pdf | 1.3 MB | |
| Week in OSINT #2019–18.pdf | 1.2 MB | |
| Week in OSINT #2019–23.pdf | 1.5 MB | |
| Week in OSINT #2019–28.pdf | 1.2 MB | |
| Week in OSINT #2019–29.pdf | 1.1 MB | |
| Writing NMAP Scripts Like A Super-Hero.pdf | 572 KB | |
| XSS Google Dorks List 2017 |How To Find XSS Vulnerable Websites .pdf | 192.4 KB | |
| XSS without HTML: Client-Side Template Injection withAngularJS.pdf | 411.7 KB | |