Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
XCHADXFAQ77X
GitHub Repository: XCHADXFAQ77X/HACKING-BOOKS-X
Path: tree/master/9-part-100-article
317 views
Name
Size
Last Modified
SPN Discovery .pdf1.6 MB
SQL injection in an UPDATE query - a bug bounty story! .pdf777.5 KB
Security Harden CentOS 7 ∞ .pdf4.5 MB
Signal Desktop HTML Tag Injection Variant 2 .pdf1.8 MB
Sophos Endpoint Protection 10.7 - Tamper-Protection Bypass .pdf2.2 MB
Systemd Cheat Sheet ∞ .pdf991.9 KB
THE BIG BAD WOLF - XSS AND MAINTAINING ACCESS .pdf302.9 KB
The Absurdly Underestimated Dangers of CSV Injection .pdf753.2 KB
Malware Monday: Obfuscation.pdf566.6 KB
Malware analysis, my own list of tools and resources.pdf1.4 MB
NewArticles/-
RFSec-ToolKit is a collection of Radio Frequency Communication Protocol Hacktools..pdf1 MB
SMTP over XXE − how to send emails using Java's XML parser.pdf140.8 KB
SN1PER – A Detailed Explanation of Most Advanced Automated Information Gathering & Penetration Testing Tool.pdf6.2 MB
SOP bypass UXSS – Stealing Credentials Pretty Fast (Edge).pdf257.3 KB
SQL Injection & XSS Playground.pdf1 MB
SQL Injection Cheat Sheet.pdf549.9 KB
SQLMap Tamper Scripts (SQL Injection and WAF bypass) Tips.pdf247.4 KB
SQLi_Payloads.pdf305.4 KB
SQLite3 Injection Cheat Sheet.pdf101 KB
SSH Cheat Sheet.pdf138.6 KB
SSH Penetration Testing (Port 22).pdf2.3 MB
SSH Pivoting using Meterpreter.pdf1.3 MB
SSRF - Server Side Request Forgery (Types and ways to exploit it) Part-1.pdf416.1 KB
Safe Red Team Infrastructure.pdf1.7 MB
Secondary Logon Handle.pdf803.6 KB
Shellcode: Encrypting traffic.pdf427.4 KB
Short blog posts.pdf165.2 KB
Situational Awareness.pdf2 MB
Skeleton Key.pdf993.8 KB
Skipfish – Web Application Security Scanner for XSS, SQL Injection, Shell injection.pdf3.2 MB
Smart Google Search Queries To Find Vulnerable Sites – List of 4500+ Google Dorks.pdf1.4 MB
Software for cracking software. Selecting tools for reverse engineering.pdf432.6 KB
Spear Phishing 101.pdf345.5 KB
Spear Phishing.pdf811.8 KB
Static Analysis of Android Applications.pdf425.3 KB
Stealing Signatures and Making One Invalid Signature at a Time.pdf497.5 KB
Steganography.pdf310 KB
Stored Credentials.pdf412.4 KB
Sublist3r – Tool for Penetration testers to Enumerate Sub-domains.pdf3.1 MB
Telnet Pivoting through Meterpreter.pdf1.4 MB
Testing Injection.pdf627.9 KB
The Art of Subdomain Enumerationv.pdf750.6 KB
The Complete Meterpreter Guide | Privilege Escalation & Clearing Tracks .pdf719.3 KB
The Drebin Dataset.pdf206.3 KB
The Growth Hackers’ Guide to Google Dorks.pdf16.4 KB
The Hacker Playbook Updates.pdf154.5 KB
The Lazy Hacker.pdf666 KB
The OSINT Toolkit.pdf509.2 KB
The Solution for Web for Pentester-I.pdf378.9 KB
  • 1
  • 2