Home
Incident Response
Phishing Overview
Pentest Report Guidelines
Pentesting How-to's
Scripts & Code
WordLists and Templates
General TTPs
Misc Content
Microsoft Portals of Interest
Links
More
Linux Kernel Exploits
Linux Exploit Selector
Exploit-DB
Packet Storm
Darknet.org
Exploit Search.Net
Security Focus
Vulners.com
​
Enigna0x3 Red Team Blog
Metasploit Unleased
Bypassing WAF Filters Attack Forest Trusts via MSSQL
RATS via Living off the Land
DA via Kerberos Delegation
Using an HID as a Dropper
Web Backdoor and Reverse sh
Webshells - More Shells
Exploiting SQLI Opportunities
Veil Pay-loading Office Docs
Rev sh Cheat Sheet # 1
Rev sh Cheat Sheet # 2
Reverse Shell Cheat Sheet # 3
Zone-h Defacement Archive
DataBreaches.Net
The Grey Corner
UC-TV (CompSci) Videos
CobaltStrike - Training
Censys Site Scanner Shodan.io Site Scanner
ShellCode Disassembler
MMD - Malware TTPs
SecurityTube Videos
Correlating Linux Kernel to Ver
Exploiting Printers
MAC -> Vendor Search
Microsoft App Eval Ctr
Old-Apps Download Ctr What's My IP
Visual TraceRoute Google Translate Zero-Day Initiative
Trend Micro Website Inspector
URL Esc / UnEsc Converter
Is it Down RIght Now
File Icon Creator
Find My Hash