| $36k Google App Engine RCE .pdf | 258.1 KB | |
| A View of Persistence .pdf | 3.7 MB | |
| Android Bluetooth - BNEP bnep_data_ind() Remote Heap Disclosure .pdf | 2.4 MB | |
| AppLocker Bypass – Regsvr32 .pdf | 703 KB | |
| [BBP系列二] Uber XSS via Cookie .pdf | 923.2 KB | |
| 0day "In the Wild".pdf | 107.2 KB | |
| 3k_dorks_shopping_by_rusev_-_hack-ar.com.txt | 112.5 KB | |
| A Guide to Attacking Domain Trusts.pdf | 1.1 MB | |
| A More Advanced Recon Automation #1 (Subdomains).pdf | 266.5 KB | |
| A NDROID M ALWARE G ENOME P ROJECT.pdf | 296.8 KB | |
| A Red Teamer's guide to pivoting.pdf | 352 KB | |
| A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.pdf | 324.8 KB | |
| A database of common, interesting or useful commands, in one handy referable form.pdf | 365.2 KB | |
| A list of useful payloads and bypass for Web Application Security and Pentest-CTF.pdf | 348.5 KB | |
| A list of web application security.pdf | 357.3 KB | |
| A penetration tester’s guide to sub-domain enumeration.pdf | 668.9 KB | |
| ADVANCED CROSS SITE SCRIPTING (XSS) CHEAT SHEET.pdf | 1.4 MB | |
| AWS changes its PenTesting permission requirement, Appsecco found out exactly what is allowed and what is not.pdf | 949.8 KB | |
| Advance Passenger Information.pdf | 392.1 KB | |
| Advanced ATM Penetration Testing Methods.pdf | 2.3 MB | |
| Advanced Cross Site Scripting(XSS) Cheat Sheet.pdf | 717.9 KB | |
| Adversarial Tactics, Techniques & Common Knowledge.pdf | 241.4 KB | |
| Advisory: Java-Python FTP Injections Allow for Firewall Bypass.pdf | 174.1 KB | |
| Airbnb – When Bypassing JSON Encoding, XSS Filter, WAF, CSP, and Auditor turns into Eight Vulnerabilities.pdf | 5.5 MB | |
| Aircrack-ng Cheatsheet.pdf | 152.9 KB | |
| Alibaba CDN Domain Fronting.pdf | 927.6 KB | |
| Always Install Elevated.pdf | 1 MB | |
| Amazon’s customer service backdoor.pdf | 404.8 KB | |
| An A-Z Index of the Windows CMD command line.pdf | 161.4 KB | |
| An Information Security Reference That Doesn't Suck.pdf | 423.6 KB | |
| An authoritative list of awesome devsecops tools with the help from community experiments and contributions..pdf | 369.3 KB | |
| Analyzing CVE-2018-6376 – Joomla!, Second Order SQL Injection.pdf | 2.8 MB | |
| Anatomy of UAC Attacks.pdf | 492.5 KB | |
| And I did OSCP!.pdf | 560 KB | |
| Android App Security Checklist.pdf | 415.1 KB | |
| Android Reverse Engineering 101 – Part 1.pdf | 1.8 MB | |
| Android Secure Coding Standard.pdf | 198.2 KB | |
| Android Security Bulletins.pdf | 176.4 KB | |
| Apache mod_python for red teams.pdf | 549.7 KB | |
| Application Introspection & Hooking With Frida.pdf | 872.1 KB | |
| Application whitelist bypass using XLL and embedded shellcode.pdf | 98.7 KB | |
| Art of Shellcoding: Basic AES Shellcode Crypter.pdf | 1.2 MB | |
| Automating your reconnaissance workflow with 'meg'.pdf | 1.5 MB | |
| Awesome XSS stuff.pdf | 337.8 KB | |
| Awesome.pdf | 483.2 KB | |
| BUG BOUNTY HUNTING (METHODOLOGY , TOOLKIT , TIPS & TRICKS , Blogs).pdf | 624.1 KB | |
| Beginner Guide to IPtables.pdf | 1.1 MB | |
| Beginner Guide to Website Footprinting.pdf | 6.7 MB | |
| Beginner Guide to impacket Tool kit.pdf | 2 MB | |
| Beginners Guide for John the Ripper (Part 1).pdf | 3.7 MB | |