Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
XCHADXFAQ77X
GitHub Repository: XCHADXFAQ77X/HACKING-BOOKS-X
Path: tree/master/2-part-100-article
317 views
Name
Size
Last Modified
$36k Google App Engine RCE .pdf258.1 KB
A View of Persistence .pdf3.7 MB
Android Bluetooth - BNEP bnep_data_ind() Remote Heap Disclosure .pdf2.4 MB
AppLocker Bypass – Regsvr32 .pdf703 KB
[BBP系列二] Uber XSS via Cookie .pdf923.2 KB
0day "In the Wild".pdf107.2 KB
3k_dorks_shopping_by_rusev_-_hack-ar.com.txt112.5 KB
A Guide to Attacking Domain Trusts.pdf1.1 MB
A More Advanced Recon Automation #1 (Subdomains).pdf266.5 KB
A NDROID M ALWARE G ENOME P ROJECT.pdf296.8 KB
A Red Teamer's guide to pivoting.pdf352 KB
A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.pdf324.8 KB
A database of common, interesting or useful commands, in one handy referable form.pdf365.2 KB
A list of useful payloads and bypass for Web Application Security and Pentest-CTF.pdf348.5 KB
A list of web application security.pdf357.3 KB
A penetration tester’s guide to sub-domain enumeration.pdf668.9 KB
ADVANCED CROSS SITE SCRIPTING (XSS) CHEAT SHEET.pdf1.4 MB
AWS changes its PenTesting permission requirement, Appsecco found out exactly what is allowed and what is not.pdf949.8 KB
Advance Passenger Information.pdf392.1 KB
Advanced ATM Penetration Testing Methods.pdf2.3 MB
Advanced Cross Site Scripting(XSS) Cheat Sheet.pdf717.9 KB
Adversarial Tactics, Techniques & Common Knowledge.pdf241.4 KB
Advisory: Java-Python FTP Injections Allow for Firewall Bypass.pdf174.1 KB
Airbnb – When Bypassing JSON Encoding, XSS Filter, WAF, CSP, and Auditor turns into Eight Vulnerabilities.pdf5.5 MB
Aircrack-ng Cheatsheet.pdf152.9 KB
Alibaba CDN Domain Fronting.pdf927.6 KB
Always Install Elevated.pdf1 MB
Amazon’s customer service backdoor.pdf404.8 KB
An A-Z Index of the Windows CMD command line.pdf161.4 KB
An Information Security Reference That Doesn't Suck.pdf423.6 KB
An authoritative list of awesome devsecops tools with the help from community experiments and contributions..pdf369.3 KB
Analyzing CVE-2018-6376 – Joomla!, Second Order SQL Injection.pdf2.8 MB
Anatomy of UAC Attacks.pdf492.5 KB
And I did OSCP!.pdf560 KB
Android App Security Checklist.pdf415.1 KB
Android Reverse Engineering 101 – Part 1.pdf1.8 MB
Android Secure Coding Standard.pdf198.2 KB
Android Security Bulletins.pdf176.4 KB
Apache mod_python for red teams.pdf549.7 KB
Application Introspection & Hooking With Frida.pdf872.1 KB
Application whitelist bypass using XLL and embedded shellcode.pdf98.7 KB
Art of Shellcoding: Basic AES Shellcode Crypter.pdf1.2 MB
Automating your reconnaissance workflow with 'meg'.pdf1.5 MB
Awesome XSS stuff.pdf337.8 KB
Awesome.pdf483.2 KB
BUG BOUNTY HUNTING (METHODOLOGY , TOOLKIT , TIPS & TRICKS , Blogs).pdf624.1 KB
Beginner Guide to IPtables.pdf1.1 MB
Beginner Guide to Website Footprinting.pdf6.7 MB
Beginner Guide to impacket Tool kit.pdf2 MB
Beginners Guide for John the Ripper (Part 1).pdf3.7 MB
  • 1
  • 2