776 links
  • Shared Bookmarks
  • Home
  • Login
  • RSS Feed
  • ATOM Feed
  • Tag cloud
  • Picture wall
  • Daily
thumbnail yichuan-w/LEANN: RAG on Everything with LEANN. Enjoy 97% storage savings while running a fast, accurate, and 100% private RAG application on your personal device.
thumbnail UprootSecurity Resources
thumbnail DCOM Again: Installing Trouble - SpecterOps
thumbnail Mimikatz – Active Directory & Azure AD/Entra ID Security
thumbnail Dissecting DCOM part 1
thumbnail 0xBugatti/myAwesome
thumbnail Wh04m1001/CVE-2025-48799
thumbnail de4dot/de4dot: .NET deobfuscator and unpacker.
thumbnail toxuin/mdns-tunneller: Tunnels two (or more) mDNS domains together
thumbnail Persistence – COM Hijacking – Penetration Testing Lab
thumbnail The Most Helpful PowerShell Cheat Sheet You’ll Ever Find
thumbnail (442) Breaking Bitlocker - Bypassing the Windows Disk Encryption - YouTube
thumbnail Magento – Unauthenticated Remote Code Execution – 0-Days And Life
thumbnail Home - FaceOnLive : On-Premises ID Verification & Biometrics Solution Provider
thumbnail SECFORCE/droidground: A simple playground for Android CTF challenges.
thumbnail Tracing Shadows: Mapping the Network of a Cybercriminal - Google Slides
thumbnail GitHub - navilg/media-stack: A self-hosted stack for media management and streaming, with AI-powered movie and show recommendations. Includes Sonarr, Radarr, qBitTorrent, Prowlarr, Jellyfin, Jellyseerr, Recommendarr, and VPN support.
thumbnail Find KYC-free Services | KYCnot.me
thumbnail Proxmox VE Helper-Scripts
thumbnail community-scripts/ProxmoxVE: Proxmox VE Helper-Scripts (Community Edition)
thumbnail BlackSnufkin/LitterBox: sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment
thumbnail Windows BitLocker -- Screwed without a Screwdriver — Neodyme
thumbnail Wack0/bitlocker-attacks: A list of public attacks on BitLocker
thumbnail MzHmO/Exploit-Street: Complete list of LPE exploits for Windows (starting from 2023)
thumbnail sw33tLie/sns: IIS shortname scanner written in Go
thumbnail Examples of TLS/SSL Vulnerabilities TLS Security 6: | Acunetix
thumbnail Liferay Json Deserialize 1 hit RCE
thumbnail dockur/windows: Windows inside a Docker container.
thumbnail Azure · nccgroup/ScoutSuite Wiki
thumbnail Security Cameras - A Penetration Tester's Journey | Tobia Bocchi: whoami, blogging, notes
thumbnail FalconFriday — Detecting Active Directory Data Collection — 0xFF21 - FalconForce
thumbnail Step through the source code of AEM's Apache Sling Engine – implementationDetails()
thumbnail XSS-Payloads/Without-Parentheses.md at master · RenwaX23/XSS-Payloads
thumbnail AEM SaaS Like a Champion ❤️🏆🚀 - AEM.Design
thumbnail topscoder/nuclei-wordfence-cve: You just found a hidden gem 💎 This repo contains a massive amount (10,000+) of WordPress related Nuclei templates. Updated daily!
thumbnail aem-links/curl_cheatsheet.md at master · paulrohrbeck/aem-links
thumbnail Circumventing SSL Pinning in obfuscated apps with OkHttp – NVISO Labs
thumbnail GitHub - sysdig/wafer
thumbnail S1lkys/SharpKiller: Lifetime AMSI bypass by @ZeroMemoryEx ported to .NET Framework 4.8
thumbnail sAjibuu/Upload_Bypass: File upload restrictions bypass, by using different bug bounty techniques covered in Hacktricks.
thumbnail Liuk3r/CVE-2023-32233: CVE-2023-32233: Linux内核中的安全漏洞
thumbnail Blind Forensics with the RDP Bitmap Cache | by Ronald Craft | Medium
thumbnail RDP Bitmap Cache | Count Upon Security
thumbnail last-byte/PersistenceSniper: Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Made with ❤️ by @last0x00 and @dottor_morte
thumbnail mm0r1/exploits: Pwn stuff.
thumbnail barrracud4/image-upload-exploits: This repository contains various media files for known attacks on web applications processing media files. Useful for penetration tests and bug bounty.
thumbnail Liferay Portal Json Web Service Deserialization Vulnerability (CVE-2020–7961) Analysis | by Knownsec 404 team | Medium
thumbnail Markakd/CVE-2022-2588: exploit for CVE-2022-2588
thumbnail An Exploration & Remediation of JSON Interoperability… | Bishop Fox
thumbnail stufus/egresscheck-framework: Used to check for TCP and UDP egress filtering on both windows and unix client systems
thumbnail Fixing khugepaged CPU usage VMware Workstation
thumbnail Bypassing Cylance and other AVs/EDRs by Unhooking Windows APIs - Red Teaming Experiments
thumbnail clong/DetectionLab: Automate the creation of a lab environment complete with security tooling and logging best practices
thumbnail Targeted Workstation Compromise with SCCM | enigma0x3
thumbnail Ethical Hacking Lessons — Building Free Active Directory Lab in Azure | by Kamran Bilgrami | Medium
thumbnail FSecureLABS/bitlocker-spi-toolkit: Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.
thumbnail login-securite/DonPAPI: Dumping DPAPI credz remotely
thumbnail Sequoia: A Local Privilege Escalation Vulnerability in Linux’s Filesystem Layer (CVE-2021-33909) | Qualys Security Blog
thumbnail How we found Unintended bypass to exploiting entire CyberThreatForce discord server | by Muhammad Faqih Jihan Insani | Jul, 2021 | Medium
thumbnail Security Testing of Thick Client Application | by David Valles | Medium
thumbnail Path to Process Injection — Bypass Userland API Hooking | by Seemant Bisht | Nov, 2020 | Medium
thumbnail Hping Tips and Tricks. Hping is a TCP/IP packet forging tool… | by Peter Kacherginsky | Medium
thumbnail The Powerful HTTP Request Smuggling 💪 | by Ricardo Iramar dos Santos | Oct, 2020 | Medium
thumbnail Abusing SeLoadDriverPrivilege for privilege escalation - Tarlogic Security - Cyber Security and Ethical hacking
thumbnail Hakluke’s Guide to Amass — How to Use Amass More Effectively for Bug Bounties | by Luke Stephens (@hakluke) | Aug, 2020 | Medium
thumbnail ntlm_theft: A file payload generator for forced ntlm hash disclosure
thumbnail When it’s not only about a Kubernetes CVE… - Breizh Zero-day Hunters - Medium
thumbnail itm4n/PrivescCheck: Privilege Escalation Enumeration Script for Windows
thumbnail Writing a Password Protected Reverse Shell (Linux/x64)
thumbnail Poking Holes in the Firewall: Egress Testing With AllPorts.Exposed - Black Hills Information Security
thumbnail The Danger of Exposing Docker.Sock
thumbnail GitHub - rootm0s/WinPwnage: UAC bypass, Elevate, Persistence and Execution methods
thumbnail Windows Privilege Escalation via Unquoted Service Paths – root@Hausec
thumbnail GitHub - f0rb1dd3n/Reptile: LKM Linux rootkit
thumbnail GitHub - d4rk007/RedGhost: Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace.
thumbnail Recipe for Root - Your Cookbook for Privilege Escalation
thumbnail PHP security exploit - list content of remote PHP file? - Stack Overflow
Shaarli - The personal, minimalist, super fast, database-free, bookmarking service by the Shaarli community - Help/documentation