By elvis, 1 August, 2024 Red Report 2024 ViewFrom PICUS Security(link is external) 2024 Tags PICUS red report 2024 PDF BOOKS Red report reports mitre attack
By elvis, 31 July, 2024 DNS Security Tutorial ViewFrom ICANN(link is external), Champika Wijayatunga(link is external) (ICANN)Phil Regnauld(link is external) (NSRC(link is external)) Tags dns security tutorial icann champika wijayatunga phil regnauld nsrc dns
By elvis, 31 July, 2024 OWASP Web Application Penetration Checklist v1.1 ViewFrom OWASP(link is external) Tags OWASP web application penetration Checklist Pentesting 1.1
By elvis, 31 July, 2024 OWASP Application Security Verification Standard (ASVS) 4.0.3 ViewFrom OWASP(link is external) October 2021 Tags OWASP asvs application security verification standard application security verification standard 4.0.3 Penetration Testing Pentesting
By elvis, 31 July, 2024 EDR bypassing via memory manipulation techniques ViewFrom WITH secure(link is external)Connor Morley(link is external) Tags edr edr bypassing memory manipulation with secure connor morley
By elvis, 31 July, 2024 Windows - Privilege Escalation ViewFrom Anonymous Tags Windows Privilege Escalation PDF BOOKS
By elvis, 31 July, 2024 OWASP Web Security Testing Guide v4.2 ViewTesting Guide Home(link is external)From OWASP(link is external)Elie Saad(link is external)Rick MItchell(link is external) Tags OWASP web security testing guide 4.2 web application security elie saad rick mitchell
By elvis, 31 July, 2024 Tribe of Hackers - Red Team ViewFrom WileyMarcus J. CareyJennifer Jin Tags Tribe of Hackers Red Team PDF BOOKS wiley marcus j carey jennifer jin
By elvis, 31 July, 2024 Exploit Engineering - Attacking the Linux Kernel ViewFrom Expolit Development Group (EDG) of nccgroup(link is external)Cedric Halbronn(link is external)Alex Plaskett(link is external)Aaron Adams Tags exploit engineering exploit attacking linux kernel PDF BOOKS nccgroup edg cedric halbronn alex plaskett aaron adams
By elvis, 31 July, 2024 Metasploit Guide for Beginners View From Anonymous Tags PDF BOOKS metasploit guide beginners Metasploit