By elvis, 28 July, 2024 Kerberos Protocol for newbies ViewFrom UCS - Michael Zhmaylo Tags PDF BOOKS Kerberos Protocol Kerberos newbies Windows Protool Michael Zhmaylo
By elvis, 28 July, 2024 LOLBIN Attack & Defense ViewFrom Abdullah Ali Alhakami Tags PDF BOOKS LOLBIN Attack Defense Attack and Defense Abdullah Ali Alhakami Windows
By elvis, 28 July, 2024 A New North Korean Group Emerges, Disrupting the Open Source Ecosystem ViewFrom CheckmarX JUne 2024 SCS-111 Tags PDF BOOKS North Korean Group Open Source Ecosystem Open Source Checkmarx
By elvis, 28 July, 2024 Offensive Hunting - Using Blue Team techniques in Red Team Ops ViewFrom OutFlank - June 2022 Marc Smeets, Mark Bergman Tags PDF BOOKS Offensive Hunting Offensive Hunting Blue Team Red Team Ops Red Team Outflank Mark Bergman Marc Smeets
By elvis, 28 July, 2024 PASS-THE-HASH Detection With Windows Event Viewer ViewFrom CyberArk Labs Research Tags PDF BOOKS PASS-THE-HASH Detection Windows Event Viewer CyberArk Labs Research
By elvis, 28 July, 2024 Windows Post-Exploitation Command Execution ViewFrom [email protected] Tags PDF BOOKS Windows Post Exploitation Windows Post Exploitation Exploitation Command Execution [email protected]
By elvis, 28 July, 2024 Reverse Shell Cheat Sheet ViewFrom Anonymous Tags PDF BOOKS Reverse Shell Cheat Sheet Shell
By elvis, 28 July, 2024 Secure Coding Practices ViewFrom OWASP based checklist Tags PDF BOOKS OWASP Secure Coding Practices Secure Coding Checklist
By elvis, 28 July, 2024 Session Hijacking 101: A Beginner's Guide to Understanding and Securing Your Online Sessions ViewFrom Codelivly Tags PDF BOOKS Session HIjacking Guide Securing
By elvis, 28 July, 2024 Shellcode Development ViewFrom Joas Antoniolots of resource links inside Tags PDF BOOKS Shellcode Development Shellcode Joas Antonio