Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
XCHADXFAQ77X
GitHub Repository: XCHADXFAQ77X/HACKING-BOOKS-X
Path: tree/master/6-part-100-article/48_article
319 views
Name
Size
Last Modified
-dev-random - Useful WinDbg Resources.pdf3.3 MB
8 Wireshark Filters Every Wiretapper Uses to Spy on Web Conversations and Surfing Habits .pdf972.1 KB
A Primer to Windows x64 shellcoding.pdf726.7 KB
Automated WiFi Cracking.pdf2.3 MB
Bypassing IDS Signatures with Simple Reverse Shells.pdf456.1 KB
Captive Portal:The Definitive Guide.pdf3.4 MB
Cloakify-Factory: A Data Exfiltration Tool Uses Text-Based Steganography.pdf1.3 MB
Command and Control & Tunnelling via ICMP.pdf1.2 MB
Decrypting TLS Browser Traffic With Wireshark – The Easy Way!.pdf1 MB
Docker and Kubernetes Reverse shells193.4 KB
Evil Twin Attack:The Definitive Guide.pdf4 MB
How to Hack WiFi with Rogue Access Point.pdf1.2 MB
How to Use Wireshark: Network Analysis, 2019 Style.pdf339.6 KB
How to decrypt WiFi traffic in Wireshark.pdf1.3 MB
MS Excel Weaponization Techniques.pdf2.2 MB
Making it Rain shells in Kubernetes184.9 KB
Malware Traffic Analysis Exercise (July 2019) .pdf492.1 KB
Msfvenom Cheat Sheet.pdf214.7 KB
OSCP Note - Common use of Netcat(nc) and Ncat.pdf160.2 KB
OSCP-PWK-Notes-Public.pdf985.6 KB
PEpper: a python script to perform malware static analysis on Portable Executable format.pdf375.6 KB
Passing OSCP.pdf611.3 KB
Password Spraying Outlook Web Access: Remote Shell.pdf632.4 KB
Penetration Testing in Windows-Active Directory with Crackmapexec.pdf2.7 MB
Practical Windows Kernel Exploitation487 KB
Reverse Shells and Controlling Webcams.pdf2.4 MB
Reverse shell and some magic.pdf1.7 MB
Reverse shells.pdf2.5 MB
Run PowerShell without Powershell.exe — Best tools & techniques.pdf2.5 MB
Setting up a Windows VM lab for kernel debugging.pdf1.1 MB
Shells in Github Actions.pdf206.1 KB
The Journey to Try Harder: TJnull’s Preparation Guide for PWK-OSCP.pdf614.9 KB
The Ultimate Fake Access Point [Walkthrough].pdf1.3 MB
Tips for Reverse-Engineering Malicious Code.pdf277.9 KB
Undetectable C# & C++ Reverse Shells.pdf3 MB
Using CloudFront to Relay Cobalt Strike Traffic.pdf1 MB
Using Wireshark: Exporting Objects from a Pcap.pdf4.6 MB
WPA2 Cracking Using HashCat.pdf2.7 MB
XSS Payloads Cheat Sheet.pdf209.2 KB
Yet Another OSCP Exam Blog Post.pdf151.5 KB
eternalrelayx.py — Non-Admin NTLM Relaying & ETERNALBLUE Exploitation.pdf919.3 KB
new/-