| -dev-random - Useful WinDbg Resources.pdf | 3.3 MB | |
| 8 Wireshark Filters Every Wiretapper Uses to Spy on Web Conversations and Surfing Habits .pdf | 972.1 KB | |
| A Primer to Windows x64 shellcoding.pdf | 726.7 KB | |
| Automated WiFi Cracking.pdf | 2.3 MB | |
| Bypassing IDS Signatures with Simple Reverse Shells.pdf | 456.1 KB | |
| Captive Portal:The Definitive Guide.pdf | 3.4 MB | |
| Cloakify-Factory: A Data Exfiltration Tool Uses Text-Based Steganography.pdf | 1.3 MB | |
| Command and Control & Tunnelling via ICMP.pdf | 1.2 MB | |
| Decrypting TLS Browser Traffic With Wireshark – The Easy Way!.pdf | 1 MB | |
| Docker and Kubernetes Reverse shells | 193.4 KB | |
| Evil Twin Attack:The Definitive Guide.pdf | 4 MB | |
| How to Hack WiFi with Rogue Access Point.pdf | 1.2 MB | |
| How to Use Wireshark: Network Analysis, 2019 Style.pdf | 339.6 KB | |
| How to decrypt WiFi traffic in Wireshark.pdf | 1.3 MB | |
| MS Excel Weaponization Techniques.pdf | 2.2 MB | |
| Making it Rain shells in Kubernetes | 184.9 KB | |
| Malware Traffic Analysis Exercise (July 2019) .pdf | 492.1 KB | |
| Msfvenom Cheat Sheet.pdf | 214.7 KB | |
| OSCP Note - Common use of Netcat(nc) and Ncat.pdf | 160.2 KB | |
| OSCP-PWK-Notes-Public.pdf | 985.6 KB | |
| PEpper: a python script to perform malware static analysis on Portable Executable format.pdf | 375.6 KB | |
| Passing OSCP.pdf | 611.3 KB | |
| Password Spraying Outlook Web Access: Remote Shell.pdf | 632.4 KB | |
| Penetration Testing in Windows-Active Directory with Crackmapexec.pdf | 2.7 MB | |
| Practical Windows Kernel Exploitation | 487 KB | |
| Reverse Shells and Controlling Webcams.pdf | 2.4 MB | |
| Reverse shell and some magic.pdf | 1.7 MB | |
| Reverse shells.pdf | 2.5 MB | |
| Run PowerShell without Powershell.exe — Best tools & techniques.pdf | 2.5 MB | |
| Setting up a Windows VM lab for kernel debugging.pdf | 1.1 MB | |
| Shells in Github Actions.pdf | 206.1 KB | |
| The Journey to Try Harder: TJnull’s Preparation Guide for PWK-OSCP.pdf | 614.9 KB | |
| The Ultimate Fake Access Point [Walkthrough].pdf | 1.3 MB | |
| Tips for Reverse-Engineering Malicious Code.pdf | 277.9 KB | |
| Undetectable C# & C++ Reverse Shells.pdf | 3 MB | |
| Using CloudFront to Relay Cobalt Strike Traffic.pdf | 1 MB | |
| Using Wireshark: Exporting Objects from a Pcap.pdf | 4.6 MB | |
| WPA2 Cracking Using HashCat.pdf | 2.7 MB | |
| XSS Payloads Cheat Sheet.pdf | 209.2 KB | |
| Yet Another OSCP Exam Blog Post.pdf | 151.5 KB | |
| eternalrelayx.py — Non-Admin NTLM Relaying & ETERNALBLUE Exploitation.pdf | 919.3 KB | |
| new/ | - | |