Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
XCHADXFAQ77X
GitHub Repository: XCHADXFAQ77X/HACKING-BOOKS-X
Path: tree/master/5-part-100-article/new
317 views
Name
Size
Last Modified
*Puff* *Puff* PSExec.pdf1.2 MB
28 Essential AWS S3 CLI Command Examples to Manage Buckets and Objects.pdf362.7 KB
6 Days Lab 1.1 Vulnhub.pdf2.5 MB
Analysis and Reproduction of iOS-OSX Vulnerability: CVE-2019-7286.pdf505 KB
Analysis and exploitation of Pegasus kernel vulnerabilities (CVE-2016-4655 CVE-2016-4656).pdf728.8 KB
Analysis of CVE-2017-11882 Exploit in the Wild.pdf3.5 MB
Analysis of a CVE-2017-0199 Malicious RTF Document.pdf1.9 MB
Analyzing Keyboard Firmware Part 1.pdf811.6 KB
Analyzing Keyboard Firmware Part 2.pdf465.9 KB
Android Application Penetration Testing Checklist.pdf887.2 KB
Android Malware Analysis : Dissecting Hydra Dropper.pdf2.4 MB
Art of Anti Detection 1 – Introduction to AV & Detection Techniques.pdf1 MB
CTF Series : Vulnerable Machines.pdf1.7 MB
CVE-2019-12103 – Analysis of a Pre-Auth RCE on the TP-Link M7350, with Ghidra!.pdf4.6 MB
CVE-2019-3010 – Local privilege escalation on Solaris 11.x via xscreensaver.pdf518.4 KB
CVE-2019-5786: Analysis & Exploitation of the recently patched Chrome vulnerability.pdf288.4 KB
CVE-2019-7286 Part II: Gaining PC Control.pdf592 KB
Check List - Mobile Application Testing II.pdf1.6 MB
Commando VM: Looking Around.pdf812.5 KB
CrackMapExec - Cheatsheet .pdf2 MB
Detailed Analysis of macOS Vulnerability CVE-2019-8507.pdf489.3 KB
Getting started of security whether it be pen testing, DFIR, reverse engineering.pdf284.3 KB
HTB: Arkham.pdf2.1 MB
HTB: CTF.pdf1.4 MB
HTB: Ghoul.pdf3.3 MB
HTB: Helpline.pdf1.1 MB
HTB: Holiday.pdf1.5 MB
HTB: Kryptos.pdf1.3 MB
HTB: Luke.pdf1.1 MB
HTB: Unattended.pdf2 MB
Hacking with ZANTI- The mobile pentesting Toolkit 2019 latest update.pdf3.4 MB
How To Use The AWS API With S3 Buckets In Your Pen Test.pdf2.6 MB
How to Build Your Own Penetration Testing Drop Box .pdf1 MB
Images, posts & videos related to "X64dbg".pdf665.6 KB
Information Security Professional (CISSP Preparation).pdf543.2 KB
Infrastructure PenTest Series : Part 1 - Intelligence Gathering.pdf488.5 KB
Infrastructure PenTest Series : Part 2 - Vulnerability Analysis.pdf1.5 MB
Linux kernel exploit cheetsheet.pdf387.8 KB
List of FTP Commands For Linux and Windows with Examples.pdf546 KB
Malware Analysis — Tools And Resources.pdf3.7 MB
Malware writing series - Python Malware, part 1.pdf320 KB
Minimize false positives for WAF.pdf585 KB
Mobile app tra ic analysis – For Fun.pdf267.5 KB
Mobile penetration testing on Android using Drozer.pdf553.9 KB
Muting the Twitter algorithm and using basic search operators for better OSINT research.pdf2.7 MB
My HackTheBox CTF Methodology - From fresh box to root! .pdf226.1 KB
NetCat CheatSheet .pdf945.2 KB
Network Security Monitoring.pdf1.1 MB
Network scanning with nmap.pdf784.4 KB
OSCP Fun Guide.pdf603.4 KB
  • 1
  • 2