Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
XCHADXFAQ77X
GitHub Repository: XCHADXFAQ77X/HACKING-BOOKS-X
Path: tree/master/8-part-100-article/62_article
319 views
Name
Size
Last Modified
12 OSINT Resources For E-mail Addresses.pdf1.4 MB
A Penetration Testing Cheat Sheet For Windows Machine – Intrusion Detection.pdf961.1 KB
A Virgil's Guide _to Pentest .pdf481 KB
A cheat-sheet for password crackers.pdf488.2 KB
Advanced Blind XSS Payloads.pdf506.9 KB
Advanced OSINT Tools.pdf147.7 KB
Android Applications Reversing 101 .pdf3.2 MB
Antivirus Evasion Tools [Updated 2019].pdf1.6 MB
Big List Of Public Resources For Intelligence (OSINT) .pdf437.1 KB
Buffer Overflow introduction.pdf1.9 MB
Burp Suite Guide.pdf1.9 MB
Bypass HTTPS website…MITM (Man In The Middle Attack).pdf567.2 KB
Cracking Microsoft Excel Documents using John The Ripper.pdf370.3 KB
Docker for Pentesters.pdf2.9 MB
Enumeration is the KEY.pdf436.8 KB
Evading AV with JavaScript Obfuscation.pdf1.7 MB
Exploit Development – Vulnserver GMON – Egghunter.pdf1.8 MB
Ghidra Collaborative Reversing 1-2 — How to setup a Ghidra server.pdf2.4 MB
Guide to Red Team Operations.pdf1.2 MB
How to crack a PDF password with Brute Force using John the Ripper in Kali Linux.pdf762.5 KB
Linux Reverse Engineering CTFs for Beginners.pdf540.8 KB
List of 100+ Cyber Security RSS Feeds.pdf1.5 MB
List of Open Source C2 Post-Exploitation Frameworks.pdf196.6 KB
List of some Penetration Testing Tools.pdf634.6 KB
Machines Similar to OSCP.pdf249.5 KB
Metasploit Basics for Hackers, Part 24: The New Evasion Modules in Metasploit 5.pdf1.6 MB
Metasploitable 3 and Flags.pdf18 MB
Most Important Mobile Application Penetration Testing Cheat sheet with Tools & Resources for Security Professionals .pdf2.1 MB
MySQL Pentesting with Metasploit Framework.pdf2.9 MB
OSINT Cheat Sheet.pdf456.3 KB
Passive Data Collecting: Shodan.pdf1.7 MB
Penetration Testing Your WordPress Website.pdf736.2 KB
Polyglots: The Ultimate XSS Payloads..pdf298.4 KB
Post Exploitation: Empire.pdf597.9 KB
Reverse Engineering Gootkit with Ghidra Part I.pdf1.4 MB
Reverse Engineering a Linux executable – hello world.pdf427.1 KB
SSH Password Testing With Hydra on Kali Linux .pdf453.5 KB
Shells.pdf415.8 KB
Step by step Metasploit walkthrough.pdf3.6 MB
TCPDUMP: a simple cheatsheet.pdf392.2 KB
TLS & SSL Penetration Testing.pdf1.3 MB
The new Facebook Graph Search – part 1 –.pdf1.7 MB
The new Facebook Graph Search – part 2 –.pdf1.8 MB
Top 40 Best Linux Commands Cheat Sheet. Get It Free Now.pdf1.5 MB
Traversals 8 Deep Exotic Encoding Cheat Sheets .pdf259.1 KB
Upgrading simple shells to fully interactive TTYs.pdf1.5 MB
What is CTF and how to get Started – Complete Guide for Beginners to Advanced .pdf1.5 MB
What is mad-metasploit, db_autopwn.pdf1.9 MB
Windows - My Pentest Notes.pdf899.8 KB
Windows Command Prompt -cmd Cheat Sheet.pdf535.8 KB
  • 1
  • 2