Home
Incident Response
Phishing Overview
Pentest Report Guidelines
Pentesting How-to's
Scripts & Code
WordLists and Templates
General TTPs
Misc Content
Microsoft Portals of Interest
Links
More
Linux Kernel Exploits
Linux Exploit Selector
Exploit-DB
Packet Storm
Darknet.org
Exploit Search.Net
Security Focus
Vulners.com
Enigna0x3 Red Team Blog
Metasploit Unleased
Bypassing WAF Filters Attack Forest Trusts via MSSQL
RATS via Living off the Land
DA via Kerberos Delegation
Using an HID as a Dropper
Web Backdoor and Reverse sh
Webshells - More Shells
Exploiting SQLI Opportunities
Veil Pay-loading Office Docs
Rev sh Cheat Sheet # 1
Rev sh Cheat Sheet # 2
Reverse Shell Cheat Sheet # 3
Zone-h Defacement Archive
DataBreaches.Net
The Grey Corner
UC-TV (CompSci) Videos
CobaltStrike - Training
Censys Site Scanner Shodan.io Site Scanner
ShellCode Disassembler
MMD - Malware TTPs
SecurityTube Videos
Correlating Linux Kernel to Ver
Exploiting Printers
MAC -> Vendor Search
Microsoft App Eval Ctr
Old-Apps Download Ctr What's My IP
Visual TraceRoute Google Translate Zero-Day Initiative
Trend Micro Website Inspector
URL Esc / UnEsc Converter
Is it Down RIght Now
File Icon Creator
Find My Hash