| CA Workload Automation AE CA Workload Control Center SQL Injection Code Execution .pdf | 1.7 MB | |
| Command and Control – DNS .pdf | 1.2 MB | |
| Command and Control – HTTPS .pdf | 945.1 KB | |
| Command and Control – Images .pdf | 820.1 KB | |
| Command and Control – JavaScript .pdf | 1 MB | |
| Command and Control – WMI .pdf | 921.3 KB | |
| Command and Control – Web Interface .pdf | 868.1 KB | |
| Command and Control – WebDAV .pdf | 900.3 KB | |
| Command and Control – Website .pdf | 664.6 KB | |
| Comprehensive Guide to Sqlmap (Target Options) .pdf | 7.2 MB | |
| Cross-site scripting .pdf | 81.1 KB | |
| BYPASSING APPLICAT ION WHITELIS TI NG WI TH B GI NF O.pdf | 2.5 MB | |
| BYPASSING DEVICE GUAR D UMCI USI NG CHM – CVE-20 17- 8 625.pdf | 1.7 MB | |
| BYPASSING UAC ON WINDOWS 10 USING DISK CLEANUP.pdf | 699.1 KB | |
| BYPASSING UAC USING APP PATHS.pdf | 692.3 KB | |
| Bypass SSH Restriction by Port Relay.pdf | 966.2 KB | |
| Bypassing AMSI via COM Server Hijacking.pdf | 787.6 KB | |
| Bypassing Application Whitelisting By Using dnx.exe.pdf | 231.9 KB | |
| Bypassing Application Whitelisting By Using rcsi.exe.pdf | 166.4 KB | |
| Bypassing UAC using App Paths.pdf | 707.1 KB | |
| CEH Module 1: Introduction to Ethical Hacking .pdf | 450.2 KB | |
| CSP bypassing form-action with reflected XSS.pdf | 387.1 KB | |
| CSRF Exploitation using XSS.pdf | 1.2 MB | |
| Capcom Rootkit Proof-Of-Concept.pdf | 970.1 KB | |
| Capture VNC Session of Remote PC using SetToolkit.pdf | 8.1 MB | |
| Check Meltdown Vulnerability in CPU.pdf | 987.3 KB | |
| Checking for maliciousness in Acroform objects on PDF files.pdf | 487.1 KB | |
| Cisco Auditing Tool & Cisco Global Exploiter to Exploit 14 Vulnerabilities in Cisco Switches and Routers.pdf | 2.1 MB | |
| CloudFlare for Command and Control.pdf | 607 KB | |
| CloudFront Hijacking.pdf | 1 MB | |
| Collection of the cheat sheets useful for pentesting.pdf | 338 KB | |
| Command Line Cheat Sheet.pdf | 397 KB | |
| Command and Control – Browser.pdf | 754.9 KB | |
| Command and Control – DropBox.pdf | 1.4 MB | |
| Command and Control – Gmail.pdf | 1.3 MB | |
| Command and Control – ICMP.pdf | 791 KB | |
| Command and Control – Images.pdf | 819.9 KB | |
| Command and Control – JavaScript.pdf | 1 MB | |
| Command and Control – Kernel.pdf | 1 MB | |
| Command and Control – PowerShell.pdf | 495.2 KB | |
| Command and Control – Twitter.pdf | 875.3 KB | |
| Command and Control – WebSocket.pdf | 767.5 KB | |
| Command and Control – Website Keyword.pdf | 586 KB | |
| Command and Control – Windows COM.pdf | 1.2 MB | |
| Comprehensive Guide to Crunch Tool.pdf | 1.4 MB | |
| Comprehensive Guide to SSH Tunnelling.pdf | 3.3 MB | |
| Compromising Jenkins and extracting credentials.pdf | 587.7 KB | |
| Crack WPA-WPA2 Wi-Fi Routers with Airodump-ng and Aircrack-ng-Hashcat 🖧.pdf | 391.8 KB | |
| Cross Site Scripting ( XSS ) Vulnerability Payload List.pdf | 651.1 KB | |
| Cross-Site Scripting (XSS) Payloads.pdf | 311.1 KB | |