| SPN Discovery .pdf | 1.6 MB | |
| SQL injection in an UPDATE query - a bug bounty story! .pdf | 777.5 KB | |
| Security Harden CentOS 7 ∞ .pdf | 4.5 MB | |
| Signal Desktop HTML Tag Injection Variant 2 .pdf | 1.8 MB | |
| Sophos Endpoint Protection 10.7 - Tamper-Protection Bypass .pdf | 2.2 MB | |
| Systemd Cheat Sheet ∞ .pdf | 991.9 KB | |
| THE BIG BAD WOLF - XSS AND MAINTAINING ACCESS .pdf | 302.9 KB | |
| The Absurdly Underestimated Dangers of CSV Injection .pdf | 753.2 KB | |
| Malware Monday: Obfuscation.pdf | 566.6 KB | |
| Malware analysis, my own list of tools and resources.pdf | 1.4 MB | |
| NewArticles/ | - | |
| RFSec-ToolKit is a collection of Radio Frequency Communication Protocol Hacktools..pdf | 1 MB | |
| SMTP over XXE − how to send emails using Java's XML parser.pdf | 140.8 KB | |
| SN1PER – A Detailed Explanation of Most Advanced Automated Information Gathering & Penetration Testing Tool.pdf | 6.2 MB | |
| SOP bypass UXSS – Stealing Credentials Pretty Fast (Edge).pdf | 257.3 KB | |
| SQL Injection & XSS Playground.pdf | 1 MB | |
| SQL Injection Cheat Sheet.pdf | 549.9 KB | |
| SQLMap Tamper Scripts (SQL Injection and WAF bypass) Tips.pdf | 247.4 KB | |
| SQLi_Payloads.pdf | 305.4 KB | |
| SQLite3 Injection Cheat Sheet.pdf | 101 KB | |
| SSH Cheat Sheet.pdf | 138.6 KB | |
| SSH Penetration Testing (Port 22).pdf | 2.3 MB | |
| SSH Pivoting using Meterpreter.pdf | 1.3 MB | |
| SSRF - Server Side Request Forgery (Types and ways to exploit it) Part-1.pdf | 416.1 KB | |
| Safe Red Team Infrastructure.pdf | 1.7 MB | |
| Secondary Logon Handle.pdf | 803.6 KB | |
| Shellcode: Encrypting traffic.pdf | 427.4 KB | |
| Short blog posts.pdf | 165.2 KB | |
| Situational Awareness.pdf | 2 MB | |
| Skeleton Key.pdf | 993.8 KB | |
| Skipfish – Web Application Security Scanner for XSS, SQL Injection, Shell injection.pdf | 3.2 MB | |
| Smart Google Search Queries To Find Vulnerable Sites – List of 4500+ Google Dorks.pdf | 1.4 MB | |
| Software for cracking software. Selecting tools for reverse engineering.pdf | 432.6 KB | |
| Spear Phishing 101.pdf | 345.5 KB | |
| Spear Phishing.pdf | 811.8 KB | |
| Static Analysis of Android Applications.pdf | 425.3 KB | |
| Stealing Signatures and Making One Invalid Signature at a Time.pdf | 497.5 KB | |
| Steganography.pdf | 310 KB | |
| Stored Credentials.pdf | 412.4 KB | |
| Sublist3r – Tool for Penetration testers to Enumerate Sub-domains.pdf | 3.1 MB | |
| Telnet Pivoting through Meterpreter.pdf | 1.4 MB | |
| Testing Injection.pdf | 627.9 KB | |
| The Art of Subdomain Enumerationv.pdf | 750.6 KB | |
| The Complete Meterpreter Guide | Privilege Escalation & Clearing Tracks .pdf | 719.3 KB | |
| The Drebin Dataset.pdf | 206.3 KB | |
| The Growth Hackers’ Guide to Google Dorks.pdf | 16.4 KB | |
| The Hacker Playbook Updates.pdf | 154.5 KB | |
| The Lazy Hacker.pdf | 666 KB | |
| The OSINT Toolkit.pdf | 509.2 KB | |
| The Solution for Web for Pentester-I.pdf | 378.9 KB | |