kub12

Untitled

Sep 21st, 2020
1,093
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 252.52 KB | None | 0 0
  1.  
  2. https://gist.github.com/cure53/df34ea68c26441f3ae98f821ba1feb9c
  3. http://goo.gl/ZIOZqG (+)
  4. http://rol.im/asux/
  5. https://bitbucket.org/decalage/oletools
  6. https://goo.gl/fBEuSF (+)
  7. https://intothesymmetry.blogspot.co.uk/2016/05/holy-redirecturi-batman.html
  8. https://unlogic.co.uk/2016/04/12/binary-bomb-with-radare2-prelude/
  9. http://www.oreilly.com/webops-perf/free/files/docker-security.pdf
  10. http://goo.gl/QM0mZx (+)
  11. https://www.cs.tau.ac.il/~tromer/mobilesc/
  12. https://scumjr.github.io/2016/01/10/from-smm-to-userland-in-a-few-bytes/
  13. http://winternl.com/2016/05/02/hello-world/
  14. http://blog.frizn.fr/bkpctf-2016/qwn2own-bkpctf16
  15. https://eev.ee/blog/2016/04/12/apple-did-not-invent-emoji/
  16. http://www.backtrack-linux.org/backtrack/backtrack-0day-privilege-escalation/
  17. https://goo.gl/BVzfDH (+)
  18. http://mksben.l0.cm/2016/05/xssauditor-bypass-flash-basetag.html
  19. https://goo.gl/Hdo0Xt (+)
  20. http://www.shellntel.com/blog/2016/3/30/vpn-over-dns-1
  21. https://snyk.io/blog/marked-xss-vulnerability/
  22. http://goo.gl/ZRPrGm (+)
  23. https://www.notsosecure.com/crafting-way-json-web-tokens/
  24. https://steamdb.info/blog/breaking-steam-client-cryptography/
  25. https://nullsecure.org/building-your-own-passivedns-feed/
  26. https://goo.gl/2LrWzM (+)
  27. http://yurichev.com/blog/breaking_simple_exec_crypto/
  28. https://boris.in/blog/2016/the-bank-job/
  29. https://vagmour.eu/why-resolving-to-internal-ips-really-hurts/
  30. https://www.thanassis.space/arm.html
  31. http://gutomaia.net/pyNES/
  32. http://goo.gl/hEhxXH (+)
  33. https://derevenets.com/
  34. http://goo.gl/nctrWn (+)
  35. https://corner.squareup.com/2016/05/content-security-policy-single-page-app.html
  36. https://www.informationsecurity.ws/2016/01/pwning-windows-7-with-avg-av/
  37. https://goo.gl/t0Cc6s (+)
  38. https://dfir.it/blog/2015/08/12/webshell-every-time-the-same-purpose/
  39. http://www.contextis.com/resources/blog/push-hack-reverse-engineering-ip-camera/
  40. http://www.neutralizethreat.com/2016/02/lazagne-credential-recovery-binary-used.html
  41. http://phishme.com/powerpoint-and-custom-actions/
  42. https://seanmelia.files.wordpress.com/2016/02/yahoo-remote-code-execution-cms1.pdf
  43. https://learn.adafruit.com/hacking-the-kinect/overview
  44. http://ipv6excuses.com/
  45. http://blog.detectify.com/post/82370846588/how-we-got-read-access-on-googles-production-servers
  46. http://pwnrules.com/flickr-from-sql-injection-to-rce/
  47. http://nahamsec.com/2014/04/paypal-marketing-remote-code-execution/
  48. https://www.unix-ag.uni-kl.de/~conrad/krypto/pkcrack.html
  49. http://www.sec-down.com/wordpress/?p=373
  50. https://www.appsecconsulting.com/appsec-blog/searching-for-credit-card-track-data-in-memory/menu-id-193.html
  51. http://javascript.info/tutorial/clickjacking
  52. http://n0where.net/basic-integer-overflows/
  53. http://thehackerblog.com/crossdomain-xml-proof-of-concept-tool/
  54. http://www.ctnieves.com/blogpost.php?id=1
  55. http://phrack.org/papers/fall_of_groups.html
  56. https://gist.github.com/epixoip/10570627
  57. https://hackerone.com/reports/390
  58. https://esevece.github.io/2016/06/01/taking-over-heroku-accounts.html
  59. https://gist.github.com/HarmJ0y/3328d954607d71362e3c
  60. http://goo.gl/gOwiwL (+)
  61. http://blog.securelayer7.net/mongodb-security-injection-attacks-with-php
  62. http://cn33liz.blogspot.pt/2016/05/bypassing-amsi-using-powershell-5-dll.html
  63. http://en.wooyun.io/2016/02/29/44.html
  64. https://goo.gl/Y6aa6S (+)
  65. http://blog.cr4.sh/2016/02/exploiting-smm-callout-vulnerabilities.html
  66. http://drops.wooyun.org/papers/15430
  67. https://hackerone.com/reports/111192
  68. http://gursevkalra.blogspot.pt/2016/01/ysoserial-commonscollections1-exploit.html
  69. https://hackerone.com/reports/123660
  70. https://threatbutt.com/map/
  71. https://hackerone.com/reports/136169
  72. https://blog.zsec.uk/pwning-pornhub/
  73. https://goo.gl/tNemh7 (+)
  74. https://owtf.github.io/
  75. https://zneak.github.io/fcd/
  76. https://www.greyhathacker.net/?p=500
  77. http://www.powertheshell.com/powershell-obfuscator/
  78. http://halcyon-ide.org/
  79. https://security-base.com:8000/
  80. http://www.gironsec.com/blog/2016/06/backdooring-a-dll/
  81. https://goo.gl/u6fqEf (+)
  82. https://tyranidslair.blogspot.co.uk/2013/02/fun-with-java-serialization-and.html
  83. http://haxx.ml/post/140552592371/remote-code-execution-in-apache-jetspeed-230-and
  84. https://goo.gl/ojUIiP (+)
  85. https://goo.gl/WgmTsi (+)
  86. https://snyk.io/blog/sql-injection-orm-vulnerabilities/
  87. http://blog.kcnabin.com.np/find_my_iphone_can-be-failed/
  88. https://digitalfreedom.io/map/
  89. http://makthepla.net/blog/=/scornhub-bounty
  90. http://austingwalters.com/export-a-command-line-curl-command-to-an-executable/
  91. https://paraschetal.in/writing-your-own-shellcode/
  92. https://www.adamlogue.com/revisiting-xss-payloads-in-png-idat-chunks/
  93. http://blog.blindspotsecurity.com/2016/06/advisory-http-header-injection-in.html
  94. https://gist.github.com/sourceincite/985fd1476b7e1623cdbf7e22f3cc42e8
  95. http://goo.gl/HgflG6 (+)
  96. https://gist.github.com/rygorous/e0f055bfb74e3d5f0af20690759de5a7
  97. http://incolumitas.com/2016/06/08/typosquatting-package-managers/
  98. http://marcoramilli.blogspot.pt/2016/03/recovering-files-from-brand-new.html
  99. http://www.deependresearch.org/2016/04/jboss-exploits-view-from-victim.html
  100. http://www.debuginfo.com/articles/easywindbg.html
  101. http://oalmanna.blogspot.pt/2016/03/startssl-domain-validation.html
  102. http://www.0verl0ad.net/2016/03/bypassing-disablefunctions-y.html
  103. https://datavibe.net/~sneak/20141023/wtf-icloud/
  104. https://evertpot.com/PHP-Sucks/
  105. https://blog.benjojo.co.uk/post/ssh-port-fluxing-with-totp
  106. https://gist.github.com/graceavery/01ec404e555571a4a668c271c8f62e8b
  107. https://blog.kchung.co/reverse-engineering-hid-iclass-master-keys/
  108. https://goo.gl/mH93Rr (+)
  109. http://goo.gl/mmktjE (+)
  110. https://goo.gl/wrqfg0 (+)
  111. https://goo.gl/3eGtjK (+)
  112. https://ghostbin.com/paste/2w26u
  113. http://www.kahusecurity.com/2016/locky-js-and-url-revealer/
  114. https://hackerone.com/reports/128085
  115. https://olivierbeg.com/finding-xss-vulnerabilities-in-flash-files/
  116. https://www.sixdub.net/?p=591
  117. http://blog.jan-ahrens.eu/2014/03/22/threema-protocol-analysis.html
  118. https://goo.gl/oZrJor (+)
  119. https://www.nutmeginfosec.com/anatomy-of-a-javascript-downloader/
  120. https://mborgerson.com/hacking-the-blynclight
  121. https://goo.gl/umSem4 (+)
  122. https://goo.gl/j0Efzh (+)
  123. https://hackerone.com/reports/137229
  124. http://d3adend.org/blog/?p=722
  125. http://jerrygamblin.com/2016/05/31/kalibrowser/
  126. http://blog.knownsec.com/2016/06/php-5-4-34-unserialize-uaf-exploit/
  127. https://bitbucket.org/iwseclabs/gunpack/
  128. https://goo.gl/v8UgSQ (+)
  129. http://www.cosc.canterbury.ac.nz/research/reports/HonsReps/2015/hons_1504.pdf
  130. https://goo.gl/cr8pg6 (+)
  131. http://www.secalert.net/2013/12/13/ebay-remote-code-execution/
  132. http://netanelrub.in/2016/05/17/magento-unauthenticated-remote-code-execution/
  133. https://webtransparency.cs.princeton.edu/webcensus/index.html#
  134. http://jcjc-dev.com/2016/04/08/reversing-huawei-router-1-find-uart/
  135. http://goo.gl/2FEOPl (+)
  136. https://blog.cylance.com/compromising-an-entire-julia-cluster
  137. http://irq5.io/2016/06/22/designing-the-x-ctf-2016-badge/
  138. https://blog.benjojo.co.uk/post/cheap-hdmi-capture-for-linux
  139. https://luc10.github.io/onedrive-an-easter-egg-into-ms-library/
  140. http://blog.bentkowski.info/2016/07/xss-es-in-google-caja.html
  141. https://hackerone.com/reports/131450
  142. https://alexaltea.github.io/hasher/
  143. http://pentestmonkey.net/blog/ssh-with-no-tty
  144. https://modexp.wordpress.com/2016/06/04/winux/
  145. http://srcincite.io/advisories/src-2016-22/
  146. http://onready.me/old_horse_attacks.html
  147. https://gist.github.com/mattifestation/97ceccd93133c7a1d39a1661922fe545
  148. https://blogs.securiteam.com/index.php/archives/2701
  149. https://goo.gl/5iX4at (+)
  150. http://justhaifei1.blogspot.pt/2015/10/watch-your-downloads-risk-of-auto.html
  151. http://goo.gl/hrhPSo (+)
  152. http://infoseczone.net/mssql-union-based-injection-step-step/
  153. http://blog.gosecure.ca/2016/05/26/detecting-hidden-backdoors-in-php-opcache/
  154. https://blog.bugcrowd.com/discovering-subdomains
  155. http://marcoramilli.blogspot.pt/2016/05/process-hollowing.html
  156. https://auth0.com/blog/2016/05/31/cookies-vs-tokens-definitive-guide
  157. https://blog.filippo.io/securing-a-travel-iphone/
  158. http://blog.innerht.ml/rpo-gadgets/
  159. https://www.josipfranjkovic.com/blog/race-conditions-on-web
  160. http://jasminderpalsingh.info/single.php?p=87
  161. https://labs.mwrinfosecurity.com/tools/pivot-with-ping/
  162. https://hub.docker.com/r/jgamblin/tiny-tor/
  163. https://pastebin.com/raw/CC6UPcbZ
  164. http://pastebin.com/hVx08e6U
  165. https://danielgrzelak.com/backdooring-an-aws-account-da007d36f8f9
  166. http://goo.gl/s9tfxL (+)
  167. http://scottgriffy.com/blogs/rat-in-the-shellcode.html
  168. https://itsjack.cc/blog/2016/05/poor-mans-malware-hawkeye-keylogger-reborn/
  169. https://goo.gl/fFR7Gg (+)
  170. http://drops.wooyun.org/tips/16381
  171. https://www.pentestpartners.com/blog/hacking-the-mitsubishi-outlander-phev-hybrid-suv
  172. https://hackerone.com/reports/136531
  173. https://notehub.org/5zo2v
  174. http://haxx.ml/post/142844845111/hacking-mattermost-from-unauthenticated-to-system
  175. https://www.youtube.com/watch?v=jOyfZex7B3E
  176. https://www.anfractuosity.com/projects/cditter/
  177. https://abdullah-iq.blogspot.pt/2016/06/medium-full-account-takeover.html
  178. http://mksben.l0.cm/2016/07/xxn-caret.html
  179. https://www.josipfranjkovic.com/blog/hacking-facebook-csrf-device-login-flow
  180. https://gist.github.com/mattifestation/5d1565348d71b54ad02c44a5b94839f8
  181. http://goo.gl/HYUocq (+)
  182. http://goo.gl/CZ1Sii (+)
  183. http://www.shellntel.com/blog/2016/6/7/weaponizing-nessus
  184. https://habrahabr.ru/post/281374/
  185. https://goo.gl/OnyUTd (+)
  186. https://thusoy.com/2016/mitming-postgres
  187. https://chloe.re/2016/06/16/badonions/
  188. http://blog.gdssecurity.com/labs/2016/6/13/email-injection.html
  189. https://toschprod.wordpress.com/2012/01/31/mitm-4-arp-spoofing-exploit/
  190. https://0x41.no/mr-robot-s02e01-easter-egg/
  191. https://httpoxy.org/
  192. https://goo.gl/SSHshf (+)
  193. https://www.evonide.com/how-we-broke-php-hacked-pornhub-and-earned-20000-dollar/
  194. http://www.binsim.com/
  195. https://goo.gl/K7f9kF (+)
  196. http://www.andreybazhan.com/dbgkit.html
  197. http://www.halfdog.net/Security/2016/DebianEximSpoolLocalRoot/EximUpgrade.c
  198. https://subt0x10.blogspot.pt/2016/06/what-you-probably-didnt-know-about.html
  199. https://blog.zsec.uk/csv-dangers-mitigations/
  200. http://moyix.blogspot.pt/2016/07/fuzzing-with-afl-is-an-art.html
  201. http://home.arcor.de/skanthak/sentinel.html
  202. http://goo.gl/umnWPN (+)
  203. https://goo.gl/gqeJyL (+)
  204. http://xlab.tencent.com/en/2016/06/17/BadTunnel-A-New-Hope/
  205. https://en.blog.nic.cz/2016/06/13/dnssec-signing-with-knot-dns-and-yubikey/
  206. https://agrrrdog.blogspot.pt/2016/06/remote-detection-of-users-av-via-flash.html
  207. https://goo.gl/yVrOhP (+)
  208. https://alexgaynor.net/2016/mar/14/anatomy-of-a-crypto-vulnerability/
  209. http://bugbounty.fail/
  210. https://banmeihack.wordpress.com/2016/07/27/hacking-pokemon-into-candy-crush/
  211. http://akat1.pl/?id=2
  212. http://www.gattack.io/
  213. https://ericrafaloff.com/client-side-redis-attack-poc/
  214. https://gitlab.com/litm/redirect/tree/master
  215. https://goo.gl/78WtUr (+)
  216. https://shubs.io/high-frequency-security-bug-hunting-120-days-120-bugs/
  217. http://theori.io/research/jscript9_typed_array
  218. http://goo.gl/ThDhM8 (+)
  219. https://reverse.put.as/2016/06/25/apple-efi-firmware-passwords-and-the-scbo-myth/
  220. http://xlab.tencent.com/badbarcode/
  221. https://research.g0blin.co.uk/xss-and-wordpress-the-aftermath/
  222. https://bazad.github.io/2016/05/mac-os-x-use-after-free/
  223. http://blog.cr4.sh/2016/06/exploring-and-exploiting-lenovo.html
  224. https://suchakra.wordpress.com/2016/07/03/unravelling-code-injection-in-binaries/
  225. https://magoo.github.io/Blockchain-Graveyard/
  226. https://zwischenzugs.wordpress.com/2016/04/12/hitler-uses-docker-annotated/
  227. https://community.rapid7.com/community/metasploit/blog/2014/04/15/exploiting-csrf-without-javascript
  228. http://breaktoprotect.blogspot.in/2014/04/feedly-android-application-zero-day.html
  229. http://pyrasite.readthedocs.org/en/latest/CLI.html
  230. https://code.google.com/p/pdf-grapher/
  231. http://phrack.org/papers/revisiting-mac-os-x-kernel-rootkits.html
  232. http://www.mehmetince.net/codeigniter-object-injection-vulnerability-via-encryption-key/
  233. http://www.sodnpoo.com/posts.xml/spoofing_the_samsung_smart_tv_internet_check.xml
  234. http://www.debasish.in/2014/04/attacking-audio-recaptcha-using-googles.html
  235. http://2014.hackitoergosum.org/slides/
  236. https://www.youtube.com/watch?v=whEWE6WC1Ew
  237. http://annasagrera.com/on-ascii-youtube-and-letting-go/
  238. https://goo.gl/G3rxy2 (+)
  239. https://avicoder.me/2016/07/22/Twitter-Vine-Source-code-dump/
  240. https://bugs.chromium.org/p/project-zero/issues/detail?id=884
  241. https://labs.nettitude.com/tools/poshc2/
  242. https://benmmurphy.github.io/blog/2016/07/11/rails-webconsole-dns-rebinding/
  243. http://www.forceprojectx.com/services/apps/memory_dumper
  244. http://www.nyxbone.com/malware/odcodc.html
  245. https://deadcode.me/blog/2016/07/01/UPC-UBEE-EVW3226-WPA2-Reversing.html
  246. https://goo.gl/RwShjR (+)
  247. https://goo.gl/Cfzilu (+)
  248. https://goo.gl/VpRb9R (+)
  249. http://anee.me/reversing-an-elf/
  250. https://kjaer.io/extension-malware/
  251. https://premium.wpmudev.org/blog/xml-rpc-wordpress/
  252. http://theori.io/research/cve-2016-0189
  253. https://0x90909090.blogspot.pt/2016/07/analyzing-zip-with-wsf-file-inside.html
  254. https://smealum.github.io/3ds/
  255. http://goo.gl/9drpjq (+)
  256. https://introvertmac.wordpress.com/2016/07/30/hacking-google-for-fun-and-profit/
  257. http://www.martinvigo.com/steal-2999-99-minute-venmo-siri/
  258. https://warroom.securestate.com/bypassing-gmails-malicious-macro-signatures/
  259. https://hackerone.com/reports/131202
  260. https://www.npmjs.com/package/btlejuice
  261. http://www.contextis.com/resources/blog/attacks-https-malicious-pac-files/
  262. http://goo.gl/dh9UDb (+)
  263. https://www.sensepost.com/blog/2016/universal-serial-abuse/
  264. https://rol.im/securegoldenkeyboot/
  265. https://goo.gl/Tn22Hq (+)
  266. https://gist.github.com/cure53/521c12e249478c1c50914b3b41d8a750
  267. http://goo.gl/9z1NXK (+)
  268. https://gist.github.com/Kopachris/b8bb1de2cada4fdde88666e018167926
  269. https://gist.github.com/anonymous/e48209b03f1dd9625a992717e7b89c4f
  270. http://blog.deniable.org/blog/2016/08/09/cracking-orcus-rat/
  271. http://dnstun.com/
  272. https://www.cs.bham.ac.uk/~exr/lectures/opsys/10_11/lectures/os-dev.pdf
  273. https://artsploit.blogspot.pt/2016/08/pprce2.html
  274. https://medium.com/@nmalcolm/hacking-imgur-for-fun-and-profit-3b2ec30c9463#.ql8goaiky
  275. http://goo.gl/4pbewk (+)
  276. http://cryptoanarchic.me/wat.txt
  277. https://blog.silentsignal.eu/2016/08/25/bake-your-own-extrabacon/
  278. https://systemoverlord.com/2016/08/24/posting-json-with-an-html-form.html
  279. https://breakdev.org/how-i-hacked-an-android-app-to-get-free-beer/
  280. https://sysforensics.org/2016/08/jtaging-mobile-phones/
  281. https://blog.xyz.is/2016/webkit-360.html
  282. http://goo.gl/37GYKN (+)
  283. http://stackstatus.net/post/147710624694/outage-postmortem-july-20-2016
  284. http://carnal0wnage.attackresearch.com/2016/08/got-any-rces.html
  285. https://hshrzd.wordpress.com/2016/07/21/how-to-turn-a-dll-into-a-standalone-exe/
  286. http://co9.io/post/148716614744/defcon-24-badge-challenge
  287. https://hackerone.com/reports/156098
  288. http://www.paulosyibelo.com/2016/08/instagram-stored-oauth-xss.html
  289. https://httpsonly.blogspot.pt/2016/08/turning-self-xss-into-good-xss-v2.html
  290. https://c0nradsc0rner.wordpress.com/2016/07/06/cookie-shadow-path-injection/
  291. https://averagesecurityguy.github.io/2016/04/21/cracking-mongodb-passwords/
  292. http://legalhackers.com/advisories/vBulletin-SSRF-Vulnerability-Exploit.txt
  293. https://hackerone.com/reports/131210
  294. http://sh3ifu.com/Breaking-The-Great-Wall-Of-Web-Rafay-Baloch.pdf
  295. https://ret2libc.wordpress.com/2016/04/04/analysing-swf-files-for-vulnerabilities/
  296. http://goo.gl/rP8BTW (+)
  297. http://goo.gl/KlikSg (+)
  298. http://goo.gl/D91R2U (+)
  299. https://hackerone.com/reports/151058
  300. http://www.exploit-monday.com/2016/07/Win10IoTCore-Build14393-EoP.html
  301. https://chloe.re/2016/07/25/bypassing-paths-with-open-redirects-in-csp/
  302. http://pixelat.ion.land/
  303. http://bouk.co/blog/hacking-developers/
  304. https://room362.com/post/2016/snagging-creds-from-locked-machines/
  305. http://goo.gl/x6TVjl (+)
  306. http://goo.gl/pYL8eZ (+)
  307. https://gist.github.com/rvrsh3ll/cc93a0e05e4f7145c9eb
  308. https://sumofpwn.nl/advisory/2016/ajax_load_more_local_file_inclusion_vulnerability.html
  309. http://goo.gl/VaK5Ts (+)
  310. https://sektioneins.de/en/blog/16-09-02-pegasus-ios-kernel-vulnerability-explained.html
  311. http://blog.zorinaq.com/nginx-resolver-vulns/
  312. https://enigma0x3.net/2016/07/22/bypassing-uac-on-windows-10-using-disk-cleanup/
  313. https://sites.utexas.edu/iso/2016/07/21/using-nodejs-to-deobfuscate-malicious-javascript/
  314. http://www.keysniffer.net/
  315. https://osandamalith.com/2016/08/01/making-your-shellcode-undetectable-using-net/
  316. https://stratumsecurity.com/2010/04/26/owasp-2010-adding-it-all-up/
  317. http://goo.gl/AwXfpT (+)
  318. https://lcamtuf.blogspot.com/2016/08/css-mix-blend-mode-is-bad-for-keeping.html
  319. https://blog.fletchto99.com/2016/september/asus-disclosure/
  320. https://goo.gl/kjWNZv (+)
  321. https://blog.didierstevens.com/2016/08/12/mimikatz-golden-ticket-dcsync/
  322. https://gist.github.com/chtg/bac6459587dbb79190d0a4c235901f03
  323. https://gist.github.com/chtg/a2acf86d44315146e85b6f88f4d2b5eb
  324. https://honeybadger.readthedocs.io/en/latest/
  325. https://goo.gl/nj3zNK (+)
  326. https://www.vusec.net/projects/flip-feng-shui/
  327. https://goo.gl/m1JdoI (+)
  328. https://goo.gl/0C91rO (+)
  329. https://httpsonly.blogspot.pt/2016/08/cve-2016-0782-writeup.html
  330. https://goo.gl/JIOvxT (+)
  331. https://linux-audit.com/elf-binaries-on-linux-understanding-and-analysis/
  332. https://blog.exodusintel.com/2016/08/09/vxworks-execute-my-packets/
  333. http://ohshitgit.com/
  334. https://support.microsoft.com/en-us/kb/261186
  335. https://weblog.sh/
  336. https://sasi2103.blogspot.pt/2016/09/combination-of-techniques-lead-to-dom.html
  337. https://goo.gl/DjOEHf (+)
  338. http://www.blackhillsinfosec.com/?p=5230
  339. https://goo.gl/tnW7hD (+)
  340. https://nixaid.com/encrypted-chat-with-netcat/
  341. https://andreas-mausch.github.io/whatsapp-viewer/
  342. https://deadcode.me/blog/2016/09/02/Blind-Java-Deserialization-Commons-Gadgets.html
  343. https://goo.gl/ClLuZH (+)
  344. https://goo.gl/ENPsiI (+)
  345. http://blog.nickbloor.co.uk/2016/08/drupal-coder-module-unauthenticated.html
  346. https://goo.gl/Uqcs96 (+)
  347. https://hostoftroubles.com/
  348. https://tom.vg/2016/08/request-and-conquer/
  349. http://antirez.com/news/96
  350. https://access.redhat.com/blogs/766093/posts/2592591
  351. https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered/
  352. https://44con.com/2016/09/19/getting-started-with-your-hidiot-badge/
  353. http://blog.k3170makan.com/2016/09/abusing-webvtt-and-cors-for-fun-and.html
  354. https://goo.gl/sGPM4p (+)
  355. https://back-flip.blogspot.pt/2016/08/steal-google-account-on-stolen-or.html
  356. https://gist.github.com/freddyb/29eedc12b3ae4b1a26d645ee90a5912d
  357. https://jaq.alibaba.com/community/art/show?articleid=532
  358. https://goo.gl/2tSUyp (+)
  359. https://www.optiv.com/blog/mssql-agent-jobs-for-command-execution
  360. http://lab.truel.it/flash-sandbox-bypass/
  361. https://goo.gl/P0cFa8 (+)
  362. https://sweet32.info/
  363. https://goo.gl/lVm81H (+)
  364. http://www.sjoerdlangkemper.nl/2016/08/29/kayako-xss/
  365. https://www.aidanwoods.com/blog/faulty-login-pages
  366. https://thel3l.me/blog/winprivesc/index.html
  367. http://tinysubversions.com/notes/ethical-ad-blocker/
  368. https://archive.org/details/softwarelibrary_msdos_games
  369. https://diracdeltas.github.io/blog/backdooring-js/
  370. https://5haked.blogspot.pt/2016/10/how-i-hacked-pornhub-for-fun-and-profit.html
  371. https://hackerone.com/reports/61312
  372. https://goo.gl/c2opyI (+)
  373. https://173210.github.io/psp2
  374. http://www.mbsd.jp/blog/20160921_2.html
  375. http://paper.seebug.org/58/
  376. https://goo.gl/Jt751V (+)
  377. https://goo.gl/t7rg3A (+)
  378. http://paper.seebug.org/42/
  379. http://mksben.l0.cm/2016/09/safari-uxss-showModalDialog.html
  380. https://hackerone.com/reports/158148
  381. https://www.jardinesoftware.net/2016/09/12/xxe-in-net-and-xpathdocument/
  382. https://goo.gl/UiIWfL (+)
  383. http://calebmadrigal.com/hackrf-replay-attack-jeep/
  384. https://goo.gl/pkPDb2 (+)
  385. https://blog.tarq.io/node-js-request-smuggling/
  386. http://blog.wesecureapp.com/xss-by-tossing-cookies/
  387. https://www.cgsec.co.uk/powershell-empire-cve-2016-0189-profit/
  388. https://hackerone.com/reports/53004
  389. https://goo.gl/ZQK5fU (+)
  390. https://goo.gl/63HPVG (+)
  391. https://goo.gl/ZxXu7l (+)
  392. http://rednaga.io/2016/09/21/reversing_go_binaries_like_a_pro/
  393. https://www.virtuesecurity.com/blog/jquery-security-model/
  394. http://blog.rewolf.pl/blog/?p=1630
  395. https://goo.gl/6KQMdJ (+)
  396. https://blog.nelhage.com/2011/03/exploiting-pickle/
  397. http://www.gwan.com/blog/20160405.html
  398. http://nedbatchelder.com//blog/201609/computing_primes_with_css.html
  399. http://blog.tjll.net/ssh-kung-fu/
  400. http://blog.gdssecurity.com/labs/2014/4/24/sql-injection-in-dynamically-constructed-images-and-other-sq.html
  401. http://tetraph.com/covert_redirect/oauth2_openid_covert_redirect.html
  402. http://thehelpfulhacker.net/2011/11/15/virtual-box-openbsd-router/
  403. https://www.netspi.com/blog/entryid/223/executing-msf-payloads-via-powershell-webshellery
  404. http://duartes.org/gustavo/blog/post/anatomy-of-a-program-in-memory/
  405. http://www.incapsula.com/blog/world-largest-site-xss-ddos-zombies.html
  406. http://cert.inteco.es/extfrontinteco/img/File/intecocert/EstudiosInformes/INT_Telegram_EN.pdf
  407. http://blog.emaze.net/2014/04/attack-campaign-targeting-struts2.html
  408. http://joxeankoret.com/blog/2014/05/02/a-vulnerability-that-wasnt/
  409. http://programmingexcuses.com/
  410. http://secalert.net/slack-security-bug-bounty.html
  411. https://sites.google.com/site/bughunteruniversity/best-reports/openredirectsthatmatter
  412. https://goo.gl/o6KYtc (+)
  413. https://goo.gl/nG92Fe (+)
  414. https://techanarchy.net/2016/10/extracting-lastpass-site-credentials-from-memory/
  415. http://lightbulbone.com/2016/10/04/intro-to-macos-kernel-debugging.html
  416. https://www.ixiacom.com/company/blog/equation-groups-firewall-exploit-chain
  417. https://goo.gl/oE7r5q (+)
  418. http://www.seg.inf.uc3m.es/~guillermo-suarez-tangil/papers/2016mal-iot.pdf
  419. https://archive.is/TpVVg
  420. https://goo.gl/oHV88F (+)
  421. https://desc0n0cid0.blogspot.pt/2016/09/stack-based-buffer-overflow.html
  422. http://www.ms509.com/?p=439
  423. https://goo.gl/1HSx1l (+)
  424. https://robinlinus.github.io/socialmedia-leak/
  425. https://robots.thoughtbot.com/is-your-site-leaking-password-reset-links
  426. https://henryhoggard.co.uk/blog/Paypal-2FA-Bypass
  427. https://sourceforge.net/projects/rcexploiter/
  428. https://www.leavesongs.com/HTML/chrome-xss-auditor-bypass-collection.html
  429. http://x42.obscurechannel.com/?p=310
  430. https://regala.im/2016/10/05/fixing-burp-ssl-handshake-failed-alert/
  431. https://goo.gl/yzBzCN (+)
  432. http://dirtycow.ninja/
  433. https://www.vusec.net/projects/drammer/
  434. https://hackerone.com/reports/150179
  435. http://paper.seebug.org/91/
  436. https://www.thanassis.space/android.html
  437. https://www.pietroalbini.org/blog/gandi-security-vulnerability-2fa-bypass/
  438. http://www.miasm.re/blog/2016/09/03/zeusvm_analysis.html#first-stages
  439. https://zone13.io/post/Snagging-credentials-over-WiFi-Part1/
  440. https://goo.gl/XczEiJ (+)
  441. http://www.gifcities.org/#/
  442. https://shubs.io/guide-to-building-the-tastic-rfid-thief/
  443. https://codepo8.github.io/logo-o-matic/
  444. http://www.blackhillsinfosec.com/?p=5396
  445. https://hackerone.com/reports/178152
  446. http://blog.x1622.com/2016/01/poc-how-to-steal-httponly-session.html
  447. https://gist.github.com/anonymous/908a087b95035d9fc9ca46cef4984e97
  448. https://osandamalith.com/2016/10/10/fun-with-sqlite-load_extension/
  449. https://bitquark.co.uk/blog/2016/10/03/exfiltrating_files_with_busybox
  450. http://bloggerbust.ca/2016/10/26/browsersmack-a-browser-stack-proxy-vulnerability/
  451. https://goo.gl/4JiEfd (+)
  452. https://goo.gl/LFF2Qa (+)
  453. https://goo.gl/czhcHM (+)
  454. http://www.alexkyte.me/2016/10/how-textsecure-protocol-signal-whatsapp.html
  455. https://vah13.github.io/AVDetection/
  456. http://blog.senr.io/blog/jtag-explained
  457. https://rudk.ws/2016/10/17/reverse-engineering-by-using-chrome/
  458. https://goo.gl/Z7Aly4 (+)
  459. https://devwerks.net/blog/16/how-not-to-use-html-purifier/
  460. https://goo.gl/D8jxL8 (+)
  461. https://www.cs.umd.edu/hcil/members/bshneiderman/nsd/rejection_letter.html
  462. http://www.blacknurse.dk/
  463. http://blog.andrewlang.net/post/152805939304/tumblr-xss-exploit
  464. http://blog.securityfuse.com/2016/11/gmail-account-hijacking-vulnerability.html
  465. http://secalert.net/#CVE-2016-4977
  466. https://www.netzob.org/
  467. https://slashcrypto.org/2016/11/07/Netflix/
  468. https://goo.gl/CXHtg5 (+)
  469. https://hosakacorp.net/p/systemd-user.html
  470. https://goo.gl/KAEZe6 (+)
  471. https://goo.gl/rcf3ao (+)
  472. https://zuh4n.blogspot.co.uk/2016/10/adobe-importance-of-up-to-date.html
  473. https://cyseclabs.com/blog/cve-2016-6187-heap-off-by-one-exploit
  474. http://www.fuzzysecurity.com/tutorials/27.html
  475. http://b.fl7.de/2016/08/d-link-nas-dns-xss-via-smb.html
  476. https://www.invincealabs.com/blog/2016/11/wemo-hardware-bypass/
  477. http://websdr.ewi.utwente.nl:8901/?tune=7030usb
  478. http://386bsd.org/
  479. https://hackerone.com/reports/180074
  480. https://gist.github.com/x-42/3d822d85e6b547e7018c919c6d657e8e
  481. https://kimiyuki.net/blog/2016/09/16/one-gadget-rce-ubuntu-1604/
  482. https://sourceforge.net/projects/vbscan/
  483. https://gallery.technet.microsoft.com/Net-Cease-Blocking-Net-1e8dcb5b
  484. https://www.poweradmin.com/paexec/
  485. http://hmarco.org/bugs/CVE-2016-4484/CVE-2016-4484_cryptsetup_initrd_shell.html
  486. http://d3adend.org/blog/?p=851
  487. https://goo.gl/eWXUvR (+)
  488. https://sethsec.blogspot.pt/2016/11/exploiting-python-code-injection-in-web.html
  489. https://goo.gl/lR1WeY (+)
  490. https://woumn.wordpress.com/2016/09/24/smashing-the-stack-into-a-reverse-shell/
  491. http://www.ioactive.com/Arnaboldi-XML-Schema-Vulnerabilities.pdf
  492. http://www.davidlitchfield.com/BypassingXSSFiltersusingXMLInternalEntities.pdf
  493. https://goo.gl/gme14H (+)
  494. http://zseano.com/tut/4.html
  495. https://sidbala.com/h-264-is-magic/
  496. https://yifan.lu/2016/11/01/taihen-cfw-framework-for-ps-vita/
  497. https://cure53.de/pentest-report_curl.pdf
  498. https://medium.com/@joewalnes/tail-f-to-the-web-browser-b933d9056cc#.4rnmefbo1
  499. https://averagesecurityguy.github.io/2016/10/21/recon-ng-dorks-burp/
  500. https://www.netresec.com/?page=findject
  501. https://slack.engineering/syscall-auditing-at-scale-e6a3ca8ac1b8#.hlfdfpeiv
  502. https://www.utkusen.com/blog/sending-valid-phishing-emails-from-microsoftcom.html
  503. https://goo.gl/ssq3Oo (+)
  504. http://blog.0x3a.com/post/153468210759/monitoring-dns-inside-the-tor-network
  505. https://goo.gl/0wvoBX (+)
  506. http://ropgadget.com/posts/pebwalk.html
  507. https://arno0x0x.wordpress.com/2015/11/27/hacking-voip/
  508. https://pierrekim.github.io/blog/2016-11-01-gpon-ftth-networks-insecurity.html
  509. https://www.n00py.io/2016/10/using-email-for-persistence-on-os-x/
  510. http://graffiti.gaurs.io/
  511. http://jerrygamblin.com/2016/11/12/automated-burp-suite-scanning-and-reporting-to-slack/
  512. http://www.glamenv-septzen.net/en/view/6
  513. https://hackerone.com/reports/182358
  514. http://blog.intothesymmetry.com/2016/11/all-your-paypal-tokens-belong-to-me.html
  515. http://ianduffy.ie/blog/2016/11/26/azure-bug-bounty-pwning-red-hat-enterprise-linux/
  516. http://legalhackers.com/exploits/tomcat-rootprivesc-deb.sh
  517. https://gist.github.com/subTee/c51ea995dfaf919fd4bd36b3f7252486
  518. http://paper.seebug.org/95/
  519. http://research.aurainfosec.io/bypassing-saml20-SSO/
  520. https://goo.gl/bCn3yk (+)
  521. https://www.contrastsecurity.com/security-influencers/dom-xss-in-wix.com
  522. https://g-laurent.blogspot.pt/2016/11/ms16-137-lsass-remote-memory-corruption.html
  523. https://goo.gl/HskhRe (+)
  524. https://eprint.iacr.org/2016/1013.pdf
  525. http://labs.lastline.com/evasive-jscript
  526. https://deadcode.me/blog/2016/11/05/Active-Deauth-Kismet-Wardriving.html
  527. https://gist.github.com/kennwhite/1f3bc4d889b02b35d8aa
  528. https://natmchugh.blogspot.pt/2014/10/how-i-created-two-images-with-same-md5.html
  529. https://goo.gl/QAtMIt (+)
  530. https://insert-script.blogspot.pt/2016/12/firefox-svg-cross-domain-cookie.html
  531. https://goo.gl/jX2CTk (+)
  532. https://sintonen.fi/advisories/tar-extract-pathname-bypass.proper.txt
  533. https://objective-see.com/blog/blog_0x14.html
  534. http://www.adlice.com/google-chrome-secure-preferences/
  535. http://colin.keigher.ca/2016/12/going-viral-on-imgur-with-powershell.html
  536. https://mambrui.github.io/2016/11/rooting-vm
  537. https://blog.paranoidsoftware.com/dirty-cow-cve-2016-5195-docker-container-escape/
  538. https://goo.gl/yCPYpL (+)
  539. https://dougallj.wordpress.com/2016/11/13/exploiting-dolphin-part-1/
  540. https://blog.ripstech.com/2016/roundcube-command-execution-via-email/
  541. https://goo.gl/eIfu9b (+)
  542. https://blog.zimperium.com/analysis-of-multiple-vulnerabilities-in-airdroid/
  543. https://peteris.rocks/blog/htop/
  544. https://laurent22.github.io/so-injections/
  545. https://urlscan.io
  546. https://klikki.fi/adv/yahoo2.html
  547. https://vulnsec.com/2016/netgear-router-rce/
  548. https://humblesec.wordpress.com/2016/12/08/escaping-a-restricted-shell/
  549. https://goo.gl/MLt1p7 (+)
  550. https://goo.gl/xvrb0T (+)
  551. https://gist.github.com/dergachev/7916152
  552. https://jolmos.blogspot.pt/2016/11/rtldecompresbuffer-vulnerability.html
  553. https://goo.gl/CKQPZv (+)
  554. https://blog.lizzie.io/notes-about-cve-2016-7117.html
  555. https://goo.gl/3BHsWQ (+)
  556. http://www.ateijelo.com/blog/2016/09/13/making-an-msx-font
  557. https://labs.detectify.com/2016/12/15/postmessage-xss-on-a-million-sites/
  558. https://goo.gl/ULx7Ud (+)
  559. https://donncha.is/2016/12/compromising-ubuntu-desktop/
  560. https://goo.gl/CTp8We (+)
  561. https://goo.gl/fb63MI (+)
  562. https://nebelwelt.net/publications/files/16STM.pdf
  563. https://goo.gl/zllfk3 (+)
  564. http://blog.skylined.nl/20161206001.html
  565. https://hub.zhovner.com/geek/how-skype-fixes-security-vulnerabilities/
  566. https://c0rni3sm.blogspot.pt/2016/12/fiat-chrysler-automobiles-bug-bounty.html
  567. http://rednaga.io/2016/11/14/hackingteam_back_for_your_androids/
  568. http://www.sec-down.com/wordpress/?p=696
  569. https://goo.gl/xxEiWP (+)
  570. https://goo.gl/aZSbLk (+)
  571. https://www.pelock.com/articles/how-to-write-a-crackme-for-a-ctf-competition
  572. https://www.unforgettable.dk/
  573. http://penturalabs.wordpress.com/2014/05/04/reverse-dom-xss/
  574. http://www.websecresearch.com/2014/05/a-way-to-bypass-authentication.html
  575. http://blog.flowdock.com/2014/05/07/how-we-found-a-directory-traversal-vulnerability-in-rails-routes/
  576. http://makthepla.net/blog/=/plesk-sso-xxe-xss
  577. https://code.google.com/p/wfuzz/
  578. http://www.frida.re/
  579. https://code.google.com/p/volafox/
  580. http://blog.mrg-effitas.com/publishing-of-mrg-effitas-automatic-xor-decryptor-tool/
  581. http://www.blisstonia.com/software/Decrypto/
  582. http://www.thespanner.co.uk/2014/05/06/mxss/
  583. http://www.nirgoldshlager.com/2013/02/how-i-hacked-facebook-oauth-to-get-full.html
  584. http://car-online.fr/files/publications/2014-03-CODASPY/kameleonfuzz-evolutionary_blackbox_XSS_fuzzing-duchene-codaspy_2014-paper.pdf
  585. http://thehackpot.blogspot.ie/2014/04/android-hacking-using-armitage.html
  586. http://rce4fun.blogspot.pt/2014/05/windows-heap-overflow-exploitation.html
  587. http://pastebin.com/raw.php?i=gjkivAf3
  588. https://gist.github.com/quchen/5280339
  589. https://randywestergren.com/persistent-xss-verizons-webmail-client/
  590. https://chloe.re/2016/12/04/dealing-with-user-uploaded-files/
  591. http://tayyabqadir.com/2016/12/17/paypal-2fa-bypass-by-tayyab-qadir/
  592. https://gitlab.com/e271/usblogger/tree/master
  593. https://hackerone.com/reports/142549
  594. https://goo.gl/fsiEqm (+)
  595. https://d0hnuts.com/2016/12/21/basics-of-making-a-rootkit-from-syscall-to-hook/
  596. https://goo.gl/uMEzce (+)
  597. https://goo.gl/SFAHof (+)
  598. https://goo.gl/Vh6ufm (+)
  599. http://blogs.360.cn/360safe/2016/11/29/three-roads-lead-to-rome-2/
  600. http://0xthem.blogspot.pt/2015/03/hijacking-ssh-to-inject-port-forwards.html
  601. https://dhavalkapil.com/blogs/SQL-Attack-Constraint-Based/
  602. https://goo.gl/nzmNqK (+)
  603. https://www.robertputt.co.uk/2016/11/28/learn-from-your-attackers-ssh-honeypot/
  604. http://docker-saigon.github.io/post/Docker-Internals/
  605. https://goo.gl/NE7btw (+)
  606. https://gist.github.com/subTee/c34d0499e232c1501ff9f0a8dd302cbd
  607. http://security.szurek.pl/e107-cms-211-privilege-escalation.html
  608. http://hacksys.vfreaks.com/research/shellcode-of-death.html
  609. http://lucumr.pocoo.org/2016/12/29/careful-with-str-format/
  610. http://asintsov.blogspot.pt/2016/12/bypassing-exploit-protection-of-norton.html
  611. https://goo.gl/f5qb4m (+)
  612. https://goo.gl/eLAj3P (+)
  613. https://www.swordshield.com/2016/10/multi-tool-multi-user-http-proxy/
  614. https://bugs.chromium.org/p/project-zero/issues/detail?id=978
  615. http://www.peter.hartmann.tk/single-post/2016/11/29/Fuzzing-Qt-with-libFuzzer
  616. https://haveyousecured.blogspot.pt/2016/12/attempting-to-detect-responder-with.html
  617. https://subt0x10.blogspot.pt/2016/12/mimikatz-delivery-via-clickonce-with.html
  618. https://threejs.org
  619. http://blog.orange.tw/2017/01/bug-bounty-github-enterprise-sql-injection.html
  620. http://sebastian-lekies.de/csp/bypasses.php
  621. https://goo.gl/Qz8NV1 (+)
  622. https://goo.gl/7diAiw (+)
  623. https://lowleveldesign.wordpress.com/2016/11/30/decrypting-asp-net-4-5/
  624. http://www.hemanthjoseph.com/2016/11/how-i-bypassed-apples-most-secure-find.html
  625. https://siguza.github.io/cl0ver/
  626. https://hackmag.com/security/ad-forest/
  627. http://www.netmux.com/blog/cracking-12-character-above-passwords
  628. http://ramtin-amin.fr/#nvmedma
  629. https://goo.gl/PVbpJs (+)
  630. https://hackerone.com/reports/5534
  631. https://www.foo.be/2016/12/OpenPGP-really-works
  632. http://chris.beams.io/posts/git-commit/
  633. https://finnwea.com/blog/stealing-passwords-from-mcdonalds-users
  634. http://insert-script.blogspot.pt/2016/10/pdf-how-to-steal-pdfs-by-injecting.html
  635. http://4lemon.ru/2017-01-17_facebook_imagetragick_remote_code_execution.html
  636. https://goo.gl/MdCd6S (+)
  637. http://techlog360.com/all-windows-cmd-commands/
  638. http://blog.win-fu.com/2016/11/every-windows-10-in-place-upgrade-is.html
  639. https://digi.ninja/blog/rdp_show_login_page.php
  640. https://gitlab.com/micaksica/CVE-2016-1000304
  641. http://dumpco.re/cve-2016-7434/
  642. https://goo.gl/U57NCx (+)
  643. https://goo.gl/ZA2NUG (+)
  644. http://blog.amossys.fr/intro-to-use-after-free-detection.html
  645. https://goo.gl/abZVVL (+)
  646. https://insinuator.net/2016/12/analyzing-yet-another-smart-home-device/
  647. https://www.curesec.com/blog/article/blog/Tap-039n039-Sniff-185.html
  648. https://www.dsinternals.com/en/impersonating-office-365-users-mimikatz/
  649. https://goo.gl/YXYM3N (+)
  650. https://hackerone.com/reports/187134
  651. http://yolocaust.de/
  652. https://gist.github.com/marcan/a2eafd605d3d6ac76eb10a7c64f736c3
  653. https://goo.gl/90LFIj (+)
  654. https://goo.gl/KuuOMq (+)
  655. https://httpsonly.blogspot.pt/2017/01/0day-writeup-xxe-in-ubercom.html
  656. https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/
  657. https://gist.github.com/anonymous/f0b9a85e25ea097f810b4d79e9e005a5
  658. https://gist.github.com/chtg/4849e0c2cfc1f08eb6532f347594c66c
  659. https://gist.github.com/Wack0/a3435cafa5eb372b190f971190a506b8
  660. http://andresriancho.github.io/nimbostratus/
  661. https://yurichev.com/writings/toy_decompiler.pdf
  662. https://woumn.wordpress.com/2016/12/07/rop-heap-spray-for-a-reverse-shell-in-ie8/
  663. http://sten0.ghost.io/2016/10/13/abusing-dorking-and-robots-txt/
  664. https://nation.state.actor/mcafee.html
  665. https://boredhackerblog.blogspot.pt/2016/02/how-we-broke-into-your-house.html
  666. https://pentest.blog/data-ex-filtration-with-dns-in-sqli-attacks/
  667. https://securitycafe.ro/2017/01/18/practical-jsonp-injection/
  668. https://0x00sec.org/t/remote-exploit-shellcode-without-sockets/1440
  669. http://blog.tihmstar.net/2017/01/how-to-downgrade-without-jailbreak.html
  670. https://goo.gl/eUDIqC (+)
  671. http://astronaut.io/
  672. https://goo.gl/N9Ia4k (+)
  673. https://s1gnalcha0s.github.io/epub/2017/01/25/This-book-reads-you.html
  674. http://phrack.org/papers/cyber_grand_shellphish.html
  675. https://hackerone.com/reports/166942
  676. https://doxmyipwindowstool.codeplex.com/
  677. https://phpinfo.me/2016/07/07/1275.html
  678. http://security.szurek.pl/winpower-v4904-privilege-escalation.html
  679. https://web-in-security.blogspot.pt/2017/01/printer-security.html
  680. https://raz0r.name/articles/universal-isomorphic-web-applications-security/
  681. https://goo.gl/9LGkzY (+)
  682. https://lukasa.co.uk/2016/12/Debugging_Your_Operating_System/
  683. http://blog.thinkst.com/p/canarytokensorg-quick-free-detection.html
  684. https://goo.gl/qFFdEI (+)
  685. https://goo.gl/wrJFoL (+)
  686. http://blog.volema.com/nginx-insecurities.html#.WFMh_WGLSV5
  687. http://blog.frizk.net/2016/12/filevault-password-retrieval.html
  688. http://incept10n.com/
  689. https://www.expeditedssl.com/aws-in-plain-english
  690. https://cmdchallenge.com/
  691. https://goo.gl/9zv6U7 (+)
  692. http://sirdarckcat.blogspot.pt/2017/02/unpatched-0day-jquery-mobile-xss.html
  693. https://goo.gl/fuAQaC (+)
  694. https://sensepost.com/blog/2016/intercepting-passwords-with-empire-and-winning/
  695. https://zerosum0x0.blogspot.pt/2016/05/xml-attack-for-c-remote-code-execution.html
  696. https://goo.gl/8eHB5Y (+)
  697. https://goo.gl/ssYMu2 (+)
  698. https://goo.gl/CYvxms (+)
  699. https://goo.gl/KqHGkN (+)
  700. https://filippo.io/Ticketbleed/
  701. https://hackerone.com/reports/172562
  702. https://techblog.mediaservice.net/2016/10/exploiting-ognl-injection/
  703. https://osandamalith.com/2017/02/03/mysql-out-of-band-hacking/
  704. https://securityresear.ch/2017/02/08/oneplus3-bootloader-vulns/
  705. https://blog.appcanary.com/2017/http-security-headers.html
  706. http://theori.io/research/chakra-jit-cfg-bypass
  707. https://xuset.github.io/planktos/
  708. http://deadpool.sh/2017/RCE-Springs/
  709. https://www.brokenbrowser.com/uxss-ie-htmlfile/
  710. https://goo.gl/nlojkc (+)
  711. https://goo.gl/R9gdqX (+)
  712. http://blog.inspired-sec.com/archive/2017/02/14/Mail-Server-Setup.html
  713. https://goo.gl/vOXIvA (+)
  714. https://goo.gl/ywuBjX (+)
  715. https://what.pwned.me/index.php/2017/01/23/axis-206-pwned/
  716. http://exfil.co/2017/01/17/wiegotcha-rfid-thief/
  717. https://www.x41-dsec.de/lab/advisories/x41-2016-signal/
  718. https://www.tazj.in/en/1486830338
  719. https://goo.gl/X7rYaC (+)
  720. http://blog.ioactive.com/2016/12/in-flight-hacking-system.html
  721. https://www.foo.be/2017/01/Squashfs_As_A_Forensic_Container
  722. http://pwnanisec.blogspot.pt/2017/02/use-after-free-in-google-hangouts.html
  723. https://vulnsec.com/2017/reverse-engineering-a-book-cover/
  724. https://gist.github.com/danielfaust/998441
  725. https://goo.gl/lUkrm7 (+)
  726. https://shattered.it/
  727. https://dhavalkapil.com/blogs/Attacking-the-OAuth-Protocol/
  728. https://thesbros.github.io/2017/02/16/geforce-experience-vulnerability.html
  729. https://goo.gl/Les62U (+)
  730. https://nlnetlabs.nl/projects/dnssec-trigger/
  731. http://newandroidbook.com/tools/jtrace.html
  732. http://bernardodamele.blogspot.pt/2011/09/reverse-shells-one-liners.html
  733. http://security-assessment.com/files/documents/advisory/SplunkAdvisory.pdf
  734. https://ruimarinho.gitbooks.io/yubikey-handbook/content/
  735. https://goo.gl/hE1V1S (+)
  736. https://www.stevencampbell.info/2017/02/configure-pentest-dropbox-dns-tunneling/
  737. https://shiftordie.de/blog/2017/02/18/smtp-over-xxe/
  738. http://blog.blindspotsecurity.com/2017/02/advisory-javapython-ftp-injections.html
  739. https://goo.gl/WW01xo (+)
  740. http://www.cs.vu.nl/~herbertb/download/papers/anc_ndss17.pdf
  741. https://security.tencent.com/index.php/blog/msg/110
  742. https://goo.gl/TBPei2 (+)
  743. https://goo.gl/R3ehjE (+)
  744. https://lamehackersguide.blogspot.pt/2017/02/weaponizing-postscript.html
  745. https://goo.gl/3V9m3m (+)
  746. http://omergil.blogspot.pt/2017/02/web-cache-deception-attack.html
  747. https://www.zyantific.com/blog/bypassing-telekom-fon-hotspot-authentication/
  748. https://www.xorrior.com/Empire-Domain-Fronting/
  749. http://leucosite.com/FireFox-RCE/
  750. https://goo.gl/9Z2HmN (+)
  751. https://akondrat.blogspot.pt/2016/12/pivoting-kerberos-golden-tickets-in.html
  752. https://blog.xyz.is/2016/vita-netps-ioctl.html
  753. https://goo.gl/YjcDMC (+)
  754. https://mijailovic.net/2017/01/22/removing-edge-magazine-drm/
  755. https://mo.github.io/2017/02/20/cross-origin-resource-sharing.html
  756. https://improsec.com/blog//windows-kernel-shellcode-on-windows-10-part-1
  757. https://goo.gl/3pCejL (+)
  758. http://timeofcheck.com/time-based-blind-sqli-on-news-starbucks-com/
  759. https://goo.gl/aFfO6E (+)
  760. https://sagi.io/2016/09/cve-2016-3873-arbitrary-kernel-write-in-nexus-9/
  761. https://team-sik.org/trent_portfolio/password-manager-apps/
  762. https://www.secureworks.com/blog/attacking-windows-smb-zero-day-vulnerability
  763. http://pc.textmod.es/
  764. http://www.oauthsecurity.com/
  765. http://www.securatary.com/Portals/0/Vulnerabilities/PayPal/Paypal%20Manager%20Account%20Hijack.pdf
  766. http://bouk.co/blog/elasticsearch-rce/
  767. http://holloway.co.nz/steg/
  768. https://blog.curesec.com/article/blog/32.html
  769. http://xip.io/
  770. http://www.securityaegis.com/the-big-fat-metasploit-post/
  771. http://samsclass.info/124/proj14/p6x-NTP-DrDOS.htm
  772. http://www.aldeid.com/wiki/Fiddler#Example:_Decrypting_malware_HTTPS_traffic
  773. http://blog.ioactive.com/2014/05/glass-reflections-in-pictures-osint.html
  774. http://www.jakoblell.com/blog/2014/05/07/hacking-contest-rootkit/
  775. http://blog.ptsecurity.com/2014/05/obtaining-passwords-from-cisco-wireless.html
  776. https://www.adafruit.com/blog/2014/04/04/new-product-cupcade-the-raspberry-pi-powered-micro-arcade-cabinet-kit-beta/
  777. https://www.alchemistowl.org/pocorgtfo/spoiler03.html
  778. https://klikki.fi/adv/bttv.html
  779. https://goo.gl/0GUXQJ (+)
  780. https://goo.gl/7yUj5d (+)
  781. https://goo.gl/YrxqHQ (+)
  782. https://www.redteam-pentesting.de/advisories/rt-sa-2016-001.txt
  783. https://www.exploitee.rs/index.php/Western_Digital_MyCloud
  784. https://www.myhackerhouse.com/naenara-browser-3-5-exploit-jackrabbit/
  785. https://squeal.net/bypassing-twitter-account-protection/
  786. https://alephsecurity.com/2017/03/08/nexus9-fiq-debugger/
  787. https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html
  788. https://pages.nist.gov/mobile-threat-catalogue/
  789. https://goo.gl/iVOK1o (+)
  790. https://goo.gl/1Iml0J (+)
  791. https://goo.gl/6t10EZ (+)
  792. https://rftap.github.io/blog/2016/09/01/rftap-wifi.html
  793. https://www.toshellandback.com/2017/02/11/psexec/
  794. http://jamesbvaughan.com/python-twilio-scraping/
  795. https://goo.gl/ObQkkZ (+)
  796. https://thehftguy.com/2017/02/23/docker-in-production-an-update/
  797. https://goo.gl/wJH2GY (+)
  798. https://goo.gl/3mVdcz (+)
  799. https://goo.gl/96ZeIk (+)
  800. https://blog.sourceclear.com/rails_admin-vulnerability-disclosure/
  801. http://pentestdan.com/rop-primer-level-0-explained/
  802. https://goo.gl/7t86Kw (+)
  803. http://www.economyofmechanism.com/github-saml.html
  804. https://securitycafe.ro/2017/02/28/time-based-data-exfiltration/
  805. https://goo.gl/YVYxD4 (+)
  806. https://bierbaumer.net/security/asuswrt/
  807. https://bo0om.ru/telegram-love-phdays-en
  808. https://vez.mrsk.me/freebsd-defaults.txt
  809. https://goo.gl/XqLInP (+)
  810. http://www.redblue.team/2017/02/abusing-google-app-scripting-through.html
  811. http://jackson.thuraisamy.me/oracle-opera.html
  812. https://yurichev.com/blog/minesweeper/
  813. https://rsync.samba.org/how-rsync-works.html
  814. https://goo.gl/r9a3MX (+)
  815. https://goo.gl/n3QisR (+)
  816. http://netanelrub.in/2017/03/20/moodle-remote-code-execution/
  817. https://gist.github.com/subTee/3610a16a54bcbc1fe0ebc46313f5c02e
  818. http://www.hackwhackandsmack.com/?p=1021
  819. https://biterrant.io/
  820. http://www.fuzzysecurity.com/tutorials/28.html
  821. https://goo.gl/RrCmN1 (+)
  822. http://blog.inspired-sec.com/archive/2017/03/17/COM-Moniker-Privesc.html
  823. https://goo.gl/ZEw1eh (+)
  824. https://goo.gl/GB5Hd7 (+)
  825. https://www.hurricanelabs.com/blog/new-xssi-vector-untold-merits-of-nosniff
  826. https://openai.com/blog/adversarial-example-research/
  827. https://blogs.securiteam.com/index.php/archives/3052
  828. http://hwreblog.com/projects/arduino_nand_reader.html
  829. https://goo.gl/gNY8Dv (+)
  830. https://stephensclafani.com/2017/03/21/stealing-messenger-com-login-nonces/
  831. https://artkond.com/2017/03/23/pivoting-guide/
  832. https://goo.gl/5Zq7Hw (+)
  833. https://goo.gl/n4fhc3 (+)
  834. https://saelo.github.io/posts/firefox-script-loader-overflow.html
  835. http://bugkraut.de/posts/tainting
  836. https://www.ibrahim-elsayed.com/?p=150
  837. https://blog.silentsignal.eu/2017/02/17/not-so-unique-snowflakes/
  838. https://goo.gl/Ysh7W7 (+)
  839. https://goo.gl/nOQ2iQ (+)
  840. https://www.invincea.com/2017/03/powershell-exploit-analyzed-line-by-line/
  841. http://bugkraut.de/posts/bounty-txt
  842. https://alephsecurity.com/2017/03/26/oneplus3t-adb-charger/
  843. https://www.dancounsell.com/building-a-hackintosh-pro/
  844. http://cybersquirrel1.com/#
  845. https://goo.gl/MT32ED (+)
  846. https://bugs.chromium.org/p/project-zero/issues/detail?id=1225
  847. http://hexinject.sourceforge.net/
  848. https://gist.github.com/joernchen/f28ec01de20b22bbbee1622a41deb601
  849. https://goo.gl/pIKwVU (+)
  850. https://unmitigatedrisk.com/?p=570
  851. https://razygon.github.io/2016/09/23/iOS-kernel-heap-review-5-10/
  852. https://cobbr.io/ObfuscatedEmpire.html
  853. https://goo.gl/D6mU2f (+) | https://goo.gl/eHsPc1 (+)
  854. https://goo.gl/xcQhzl (+)
  855. https://capacitorset.github.io/mathjs/
  856. https://www.aptive.co.uk/blog/unrestricted-file-upload-testing/
  857. https://bamboofox.github.io/2017/03/20/Synology-Bug-Bounty-2016/
  858. http://offsecbyautomation.com/Automating-Web-Content-Discovery/
  859. https://codewhitesec.blogspot.pt/2017/04/amf.html
  860. https://mastodon.social/
  861. https://calebfenton.github.io/2017/04/05/creating_java_vm_from_android_native_code/
  862. https://www.notsosecure.com/anatomy-hack-sqli-via-crypto/
  863. http://blog.intothesymmetry.com/2017/04/csrf-in-facebookdropbox-mallory-added.html
  864. https://gist.github.com/anonymous/5fd967b3fe5d9201e0ec7a1d35c03a19
  865. https://cedricvb.be/post/tracing-api-calls-in-burp-with-frida/
  866. https://www.uperesia.com/booby-trapped-shortcut-generator
  867. https://goo.gl/JA65ce (+)
  868. https://www.vgrsec.com/post20170402.html
  869. https://goo.gl/xQ8tdz (+)
  870. http://struct.github.io/oilpan_metadata.html
  871. https://blogs.securiteam.com/index.php/archives/3107
  872. https://a13xp0p0v.github.io/2017/03/24/CVE-2017-2636.html
  873. https://goo.gl/GnSddg (+)
  874. https://artkond.com/2017/04/10/cisco-catalyst-remote-code-execution/
  875. https://goo.gl/ObZ5eL (+)
  876. https://goo.gl/buPacq (+)
  877. https://www.brokenbrowser.com/sop-bypass-abusing-read-protocol/
  878. https://goo.gl/TvYytI (+)
  879. https://goo.gl/vi9oqr (+)
  880. http://threatexpress.com/2016/12/slack-notifications-for-cobalt-strike/
  881. https://goo.gl/EfyJxm (+)
  882. https://securedorg.github.io/RE101/
  883. http://www.threathunting.net/
  884. https://martinfowler.com/articles/session-secret.html
  885. https://securitybytes.io/sudont-escape-so-easily-ce8801bf9a4b#.a941nrlj4
  886. https://www.n0tr00t.com/2016/12/30/jsm-Bypass-via-CreateClassLoader.html
  887. https://statuscode.ch/2016/01/subtle-vulnerabilties-with-php-and-curl/
  888. http://eryanbot.com/jtp/2012/06/30/game-hacking-utilizing-code-caves/
  889. https://goo.gl/j0UImT (+)
  890. https://goo.gl/Vfkqdm (+)
  891. http://blog.svenbrauch.de/2017/02/19/homemade-10-mbits-laser-optical-ethernet-transceiver/
  892. https://goo.gl/SXXey1 (+)
  893. https://hackerone.com/reports/220494
  894. https://scotthelme.co.uk/nomx-the-worlds-most-secure-communications-protocol
  895. http://offsecbyautomation.com/Open-Redirection-Bobrov/
  896. https://jaq.alibaba.com/community/art/show?articleid=781
  897. https://blogs.securiteam.com/index.php/archives/2928
  898. https://www.ambionics.io/blog/drupal-services-module-rce
  899. https://goo.gl/E2rgJ6 (+)
  900. https://blog.cugu.eu/post/apfs/
  901. https://goo.gl/QG0FPF (+)
  902. https://www.scip.ch/en/?labs.20170105
  903. http://blog.opensecurityresearch.com/2013/01/windows-dll-injection-basics.html
  904. https://textslashplain.com/2017/01/14/the-line-of-death/
  905. https://goo.gl/NMtcp2 (+)
  906. https://goo.gl/AbEKml (+)
  907. https://www.youtube.com/watch?v=uNjxe8ShM-8
  908. http://xproger.info/projects/OpenLara/
  909. https://www.ssh.com/ssh/port
  910. http://www.paulosyibelo.com/2017/05/twitter-xss-csp-bypass.html
  911. https://hackerone.com/reports/212696
  912. https://goo.gl/HZn7Yb (+)
  913. https://goo.gl/le4nvm (+)
  914. https://improsec.com/blog//bypassing-control-flow-guard-in-windows-10
  915. https://stringbleed.github.io
  916. https://goo.gl/F1xBst (+)
  917. https://www.evilsocket.net/2017/04/27/Android-Applications-Reversing-101/
  918. https://blog.joshlemon.com.au/protecting-your-pdf-files-and-metadata/
  919. http://www.abatchy.com/2017/05/tcp-bind-shell-in-assembly-null.html
  920. https://goo.gl/V6EsOr (+)
  921. https://www.vgrsec.com/post20170219.html
  922. http://blog.jpcert.or.jp/2016/01/windows-commands-abused-by-attackers.html
  923. https://poshsecurity.com/blog/deconstructing-secure-http-without-https
  924. https://theshell.xyz/
  925. https://bugs.chromium.org/p/project-zero/issues/detail?id=1252&desc=5
  926. https://hackerone.com/reports/88719
  927. https://quanyang.github.io/part-1-continuous-pwning/
  928. https://goo.gl/h2dWbh (+)
  929. https://phoenhex.re/2017-05-04/pwn2own17-cachedcall-uaf
  930. https://insinuator.net/2017/05/git-shell-bypass-by-abusing-less-cve-2017-8386/
  931. https://goo.gl/728eER (+)
  932. https://goo.gl/4J95NW (+)
  933. https://micahflee.com/2017/04/breaking-the-security-model-of-subgraph-os/
  934. https://bugs.chromium.org/p/project-zero/issues/detail?id=1096
  935. https://blogs.securiteam.com/index.php/archives/3171
  936. http://snf.github.io/2017/05/04/exploit-protection-i-page-heap/
  937. https://goo.gl/3npUqt (+)
  938. http://nahamsec.com/?p=210
  939. http://blog.shubh.am/how-i-bypassed-2-factor-authentication-on-google-yahoo-linkedin-and-many-others/
  940. http://blog.techorganic.com/2014/05/14/from-fuzzing-to-0-day/
  941. http://cybermashup.com/2014/05/01/jtag-debugging-made-easy-with-bus-pirate-and-openocd/
  942. http://www.room362.com/blog/2014/04/19/executing-code-via-smb-without-psexec/
  943. https://bitbucket.org/mihaila/bintrace/wiki/Home
  944. https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20140508-0_AVG_Remote_Administration_Multiple_critical_vulnerabilities_v10.txt
  945. https://www.trustedsec.com/may-2014/moar-shellz/
  946. https://doar-e.github.io/blog/2014/04/30/corrupting-arm-evt/
  947. https://fail0verflow.com/blog/2014/enhancing-the-avic-5000nex.html
  948. http://habrahabr.ru/company/dsec/blog/222993/
  949. http://int0xcc.svbtle.com/stripping-upatre-trojan-downloader
  950. http://syncthing.net/
  951. http://blogs.msdn.com/b/debuggingtoolbox/archive/2014/05/14/hacking-minesweeper-for-windows-8.aspx
  952. http://blog.cloudflare.com/bpf-the-forgotten-bytecode
  953. https://slashcrypto.org/2017/05/17/5k_Error_Page/
  954. https://goo.gl/ium1x1 (+)
  955. https://goo.gl/QNgi0K (+)
  956. https://goo.gl/9TL0an (+)
  957. https://goo.gl/XQohRS (+)
  958. https://klue.github.io/blog/2017/04/macos_kernel_debugging_vbox/
  959. https://checkmarx.gitbooks.io/go-scp/
  960. https://irssi.org/2017/05/12/fuzzing-irssi/
  961. https://shhnjk.blogspot.pt/2017/05/is-your-epub-reader-secure-enough.html
  962. https://unmitigatedrisk.com/?p=586
  963. https://goo.gl/AuoG68 (+)
  964. https://modexp.wordpress.com/2017/01/24/shellcode-x84/
  965. https://blog.bi.tk/2017/01/20/findbug/
  966. https://goo.gl/7eGSu8 (+)
  967. https://xerub.github.io/ios/kpp/2017/04/13/tick-tock.html
  968. http://www.unixwiz.net/techtips/sql-injection.html
  969. https://goo.gl/KKSSqD (+)
  970. https://goo.gl/DGJIZJ (+)
  971. https://devnull-as-a-service.com/features/
  972. http://kedrisec.com/twitter-publish-by-any-user/
  973. https://www.ambionics.io/blog/oracle-peoplesoft-xxe-to-rce
  974. https://randywestergren.com/xss-sms-hacking-text-messages-verizon-messages/
  975. http://www.debasish.in/2017/05/openxmolar-ms-openxml-format-fuzzing_20.html
  976. http://www.exfiltrated.com/research-BIOS_Based_Rootkits.php
  977. http://blog.timac.org/?p=1570
  978. https://cobbr.io/ScriptBlock-Logging-Bypass.html
  979. http://cloak-and-dagger.org/
  980. https://wald0.com/?p=112
  981. https://goo.gl/Xzy1ql (+)
  982. https://www.elttam.com.au/blog/playing-with-canaries/
  983. https://goo.gl/4oruRY (+)
  984. https://tyranidslair.blogspot.pt/2017/05/exploiting-environment-variables-in.html
  985. https://animal0day.blogspot.co.uk/2017/05/fuzzing-apache-httpd-server-with.html
  986. https://medium.com/@d0znpp/how-to-bypass-libinjection-in-many-waf-ngwaf-1e2513453c0f
  987. https://gist.github.com/winocm/e3eb9c9b061c7414441c45a4938a0c57
  988. http://research.rootme.in/h1-xssi/
  989. https://ysx.me.uk/road-to-unauthenticated-recovery-downloading-github-saml-codes/
  990. https://goo.gl/rkzXun (+)
  991. http://www.thegreycorner.com/2017/01/exploiting-difficult-sql-injection.html
  992. https://hackerone.com/reports/217745
  993. https://goo.gl/OBoFZ1 (+)
  994. https://scarybeastsecurity.blogspot.pt/2017/05/bleed-more-powerful-dumping-yahoo.html
  995. https://goo.gl/vHiyry (+)
  996. http://wphutte.com/avada-5-1-4-stored-xss-and-csrf/
  997. https://winscripting.blog/2017/05/12/first-entry-welcome-and-uac-bypass/
  998. https://goo.gl/p0molg (+)
  999. https://sizzop.github.io/2016/07/05/kernel-hacking-with-hevd-part-1.html
  1000. https://lowleveldesign.org/2017/03/07/how-to-securely-sign-dotnet-assemblies/
  1001. https://ysx.me.uk/a-pair-of-plotly-bugs-stored-xss-and-aws-metadata-ssrf/
  1002. http://blog.martinfenner.org/2014/08/25/using-microsoft-word-with-git/
  1003. http://kubernetesbyexample.com/
  1004. https://www.shodan.io/host/203.254.47.164
  1005. https://vvyper.com/2017/05/22/instagram-stories-ssl/
  1006. https://hackerone.com/reports/231053
  1007. https://medium.com/@th3g3nt3l/how-i-got-5500-from-yahoo-for-rce-92fffb7145e6
  1008. http://www.rpcview.org/index.html
  1009. https://phoenhex.re/2017-06-02/arrayspread
  1010. https://bling.kapsi.fi/blog/no-proc-process-recon.html
  1011. https://goo.gl/5EeZC0 (+)
  1012. https://goo.gl/1HRwSB (+)
  1013. https://msitpros.com/?p=3877
  1014. http://c0rni3sm.blogspot.pt/2017/06/from-js-to-another-js-files-lead-to.html
  1015. https://raz0r.name/vulnerabilities/arbitrary-file-reading-in-next-js-2-4-1/
  1016. https://chao-tic.github.io/blog/2017/05/24/dirty-cow
  1017. https://sploitfun.wordpress.com/2015/02/10/understanding-glibc-malloc/
  1018. https://goo.gl/gJ1LiQ (+)
  1019. https://oded.ninja/2017/05/14/amt-n-ken-hack/
  1020. https://sonniesedge.co.uk/blog/a-day-without-javascript
  1021. http://pentestit.com/wordsteal-steal-ntlm-hashes-remotely/
  1022. https://www.hackerone.com/blog-How-To-Server-Side-Request-Forgery-SSRF
  1023. https://goo.gl/Zy8Nhe (+)
  1024. https://firefart.at/post/turning_piwik_superuser_creds_into_rce/
  1025. https://goo.gl/Tv6uRg (+)
  1026. https://0x00sec.org/t/c-a-simple-runtime-crypter/519
  1027. https://0patch.blogspot.pt/2017/01/micropatching-remote-code-execution-in.html
  1028. http://blog.blindspotsecurity.com/2016/09/nodejs-breaking-jade-pug-dlopen.html
  1029. https://goo.gl/AL1b7q (+)
  1030. https://www.securitysift.com/understanding-wordpress-auth-cookies
  1031. https://medium.com/@br4nsh/from-linux-to-ad-10efb529fae9
  1032. https://goo.gl/ea1gwR (+)
  1033. https://borgandrew.blogspot.pt/2017/01/h1-margin-bottom-0.html
  1034. https://goo.gl/t23oea (+)
  1035. http://el.che.moe/Writeup_VoiceAttack.html
  1036. https://blog.kchung.co/rfid-hacking-with-the-proxmark-3/
  1037. https://habrahabr.ru/company/aladdinrd/blog/329166/
  1038. http://switchbrew.org
  1039. http://www.lofibucket.com/articles/64k_intro.html
  1040. https://angelmmiguel.github.io/svgi/
  1041. https://goo.gl/3dSAS2 (+)
  1042. https://goo.gl/8SMkHF (+)
  1043. http://offsecbyautomation.com/Subdomain-Delegation-Takeover/
  1044. https://sourceware.org/systemtap/
  1045. https://goo.gl/2gCFrE (+)
  1046. https://guidovranken.wordpress.com/2017/06/21/the-openvpn-post-audit-bug-bonanza/
  1047. https://phoenhex.re/2017-06-21/firefox-structuredclone-refleak
  1048. https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
  1049. https://goo.gl/ENZQiQ (+)
  1050. https://bo0om.ru/just-enter-the-space-attacks-en
  1051. https://goo.gl/w38a3h (+)
  1052. https://goo.gl/KnVyxr (+)
  1053. https://oleb.net/blog/2017/01/fun-with-string-interpolation/
  1054. https://mostsecure.pw/
  1055. http://ngailong.com/uber-login-csrf-open-redirect-account-takeover/
  1056. https://goo.gl/WyXvVf (+)
  1057. http://ostinato.org/
  1058. https://securityonline.info/bypass-waf-php-webshell-without-numbers-letters/
  1059. https://goo.gl/ygKLLx (+)
  1060. https://blog.cylance.com/running-executables-on-macos-from-memory
  1061. https://www.bishopfox.com/blog/2017/06/how-i-built-an-xss-worm-on-atmail/
  1062. https://goo.gl/PU7zc2 (+)
  1063. https://yurichev.com/blog/symbolic/
  1064. https://www.contextis.com/resources/blog/hacking-unicorns-web-bluetooth/
  1065. https://goo.gl/ezUM9n (+)
  1066. https://jamescoote.co.uk/phishlulz-tutorial/
  1067. https://jankopecky.net/index.php/2017/04/18/0day-textplain-considered-harmful/
  1068. http://inspirobot.me/
  1069. https://arogozhnikov.github.io/3d_nn/
  1070. https://goo.gl/h7QdzQ (+)
  1071. https://medium.com/@FreedomCoder/following-the-white-rabbit-5e392e3f6fb9
  1072. https://mrpapercut.com/sites/wscript/
  1073. https://www.mzrst.com/
  1074. http://hacking-printers.net
  1075. https://goo.gl/VD8BxF (+)
  1076. http://vegardno.blogspot.pt/2017/03/fuzzing-openssh-daemon-using-afl.html
  1077. https://lowleveldesign.org/2017/07/04/decrypting-tfs-secret-variables/
  1078. https://www.itsec.nl/en/2017/06/26/drive-by-remote-code-execution-by-mamp/
  1079. https://goo.gl/Jsze4P (+)
  1080. https://goo.gl/41PZHT (+)
  1081. https://blog.rubidus.com/2017/02/06/preventing-subdomain-takeover/
  1082. https://dev.to/fenceposterror/hacking-open-source-software-for-fun-and-non-profit
  1083. https://zerosum0x0.blogspot.pt/2017/07/puppet-strings-dirty-secret-for-free.html
  1084. https://blog.haschek.at/post/f2fda
  1085. http://www.righto.com/2017/07/bitcoin-mining-on-vintage-xerox-alto.html
  1086. https://blog.zsec.uk/blind-xxe-learning/
  1087. https://goo.gl/5TNzwu (+)
  1088. https://goo.gl/Y3odmB (+)
  1089. https://gist.github.com/hasherezade/e3b5682fee27500c5dabf5343f447de3
  1090. https://gist.github.com/ryhanson/227229866af52e2d963cf941af135a52
  1091. https://goo.gl/BhW3Lt (+)
  1092. https://goo.gl/GSGgjX (+)
  1093. https://www.rcesecurity.com/2014/07/slae-shell-reverse-tcp-shellcode-linux-x86/
  1094. https://myexploit.wordpress.com/hunt-for-the-domain-admin-da/
  1095. https://krbtgt.pw/oracle-oam-10g-session-hijacking/
  1096. https://goo.gl/is7Tyu (+)
  1097. http://boosterok.com/blog/broadpwn/
  1098. http://www.nmattia.com/posts/2017-03-05-crack-luks-stutter-gnu-parallel.html
  1099. https://medium.com/wemake-services/testing-bash-applications-85512e7fe2de
  1100. https://blog.preempt.com/new-ldap-rdp-relay-vulnerabilities-in-ntlm
  1101. http://acez.re/the-weak-bug-exploiting-a-heap-overflow-in-vmware/
  1102. http://hacker-news.verylegit.link/
  1103. http://aem1k.com/symmetry/
  1104. https://trueschool.se/html/fonts.html
  1105. https://goo.gl/wSKFLS (+)
  1106. https://xakep.ru/2017/07/06/safari-localfile-read/
  1107. https://gist.github.com/jobertabma/e9a383a8ad96baa189b65cdc8d74a845
  1108. https://blog.netspi.com/attacking-javascript-web-service-proxies-burp/
  1109. https://blog.ropnop.com/upgrading-simple-shells-to-fully-interactive-ttys/
  1110. https://goo.gl/uLeBCf (+)
  1111. https://goo.gl/ehHr8U (+)
  1112. https://goo.gl/RmmyFJ (+)
  1113. http://blog.deniable.org/blog/2017/07/16/inject-all-the-things/
  1114. http://wapiflapi.github.io/2015/04/22/single-null-byte-heap-overflow/
  1115. https://pentestarmoury.com/2017/07/19/s3-buckets-for-good-and-evil/
  1116. https://oneupsecurity.com/research/remote-code-execution-in-source-games
  1117. https://www.coresecurity.com/blog/solving-post-exploitation-issue-cve-2017-7308
  1118. http://news.dieweltistgarnichtso.net/posts/gnome-thumbnailer-msi-fail.html
  1119. https://goo.gl/Qc7ZPm (+)
  1120. http://blog.sec-consult.com/2017/06/ghosts-from-past-authentication-bypass.html
  1121. https://goo.gl/YGBuph (+)
  1122. https://goo.gl/vfkPjf (+)
  1123. http://dmitry.gr/index.php?r=05.Projects&proj=25.%20VMU%20Hacking
  1124. http://op-co.de/blog/posts/hacking_the_nx300/
  1125. http://cyvera.com/cve-2014-1776-how-easy-it-is-to-attack-these-days/
  1126. http://insanecoding.blogspot.ro/2014/04/common-libressl-porting-mistakes.html
  1127. https://zyan.scripts.mit.edu/blog/wordpress-fail/
  1128. http://rotlogix.com/2014/05/21/exploiting-local-file-includes-with-liffy/
  1129. http://m-austin.com/blog/?p=118
  1130. http://www.hexacorn.com/blog/2014/05/21/rce-list-of-64-bit-tools/
  1131. https://code.google.com/p/libbde/
  1132. http://eternal-todo.com/blog/cve-2013-2729-exploit-zeusp2p-gameover
  1133. http://www.vupen.com/blog/20140520.Advanced_Exploitation_Firefox_UaF_Pwn2Own_2014.php
  1134. http://www.scriptjunkie.us/2013/11/adding-easy-ssl-client-authentication-to-any-webapp/
  1135. http://www.websec.mx/advisories/view/Generador-de-WPA-Huawei-HG8245-y-HG8247
  1136. http://williamknowles.co.uk/?p=16
  1137. http://www.circl.lu/projects/CIRCLean/
  1138. https://goo.gl/vDEMKL (+)
  1139. https://gerbenjavado.com/the-race-to-the-top-of-a-bug-bounty-program/
  1140. https://goo.gl/jQJK3U (+)
  1141. https://asciinema.org/a/130730
  1142. https://security.gerhardt.link/RCE-in-Factorio/
  1143. https://bling.kapsi.fi/blog/jvm-deserialization-broken-classldr.html
  1144. https://elaineou.com/2017/01/19/how-the-twitter-app-bypasses-paywalls/
  1145. https://goo.gl/s5Eyy4 (+)
  1146. https://goo.gl/kLaawx (+)
  1147. https://pierrekim.github.io/blog/2017-02-09-tplink-c2-and-c20i-vulnerable.html
  1148. https://www.gironsec.com/blog/2017/07/keylogger-using-directx/
  1149. http://rh0dev.github.io/blog/2017/the-return-of-the-jit/
  1150. https://bneg.io/2017/07/26/empire-without-powershell-exe/
  1151. https://goo.gl/aEPUuS (+)
  1152. https://goo.gl/djcEh1 (+)
  1153. https://www.stefanjudis.de/hidden-messages-in-javascript-property-names.html
  1154. https://hackernoon.com/a-collision-too-perfect-279a47fb5d42
  1155. https://doesmysiteneedhttps.com/
  1156. https://blog.innerht.ml/testing-new-features/
  1157. http://blog.orange.tw/2017/07/how-i-chained-4-vulnerabilities-on.html
  1158. https://blog.zsec.uk/rce-starwars/
  1159. https://vallejo.cc/2017/07/16/anti-antidebugging-windbg-scripts/
  1160. https://gist.github.com/marcan/6a2d14b0e3eaa5de1795a763fb58641e
  1161. http://paper.seebug.org/230/
  1162. https://0x00sec.org/t/reverse-engineering-101/1233
  1163. https://goo.gl/h5EJDE (+)
  1164. http://rohk.io/free-bits-on-twitch/
  1165. https://goo.gl/mqi664 (+)
  1166. http://blog.huntingmalware.com/notes/WMI
  1167. https://comsecuris.com/blog/posts/path_of_least_resistance/
  1168. https://scarybeastsecurity.blogspot.pt/2017/03/black-box-discovery-of-memory.html
  1169. https://goo.gl/986jDv (+)
  1170. https://cybersyndicates.com/2017/02/os-x-packet-capture--empire/
  1171. https://medium.com/0xcc/how-to-turn-photoshop-into-a-remote-access-tool-805485a9480
  1172. https://z4ziggy.wordpress.com/2017/07/21/zigfrid-a-passive-rfid-fuzzer/
  1173. https://blog.lessonslearned.org/building-a-more-secure-development-chromebook/
  1174. https://bo0om.ru/xss-everywhere
  1175. https://sites.google.com/site/testsitehacking/10k-host-header
  1176. http://staaldraad.github.io/pentest/phishing/2017/08/02/o356-phishing-with-oauth/
  1177. http://blog.safebuff.com/2016/07/03/SSRF-Tips/
  1178. http://blog.securelayer7.net/thick-client-penetration-testing-1/
  1179. http://www.rvrsh3ll.net/blog/offensive/ssl-domain-fronting-101/
  1180. https://blog.doyensec.com/2017/08/03/electron-framework-security.html
  1181. https://zerosum0x0.blogspot.pt/2017/04/doublepulsar-initial-smb-backdoor-ring.html
  1182. https://goo.gl/FdwEKQ (+)
  1183. https://landave.io/2017/07/bitdefender-remote-stack-buffer-overflow-via-7z-ppmd/
  1184. https://goo.gl/3xEuby (+)
  1185. https://blog.phusion.nl/2015/01/20/docker-and-the-pid-1-zombie-reaping-problem/
  1186. https://ysx.me.uk/managed-apps-and-music-a-tale-of-two-xsses-in-google-play/
  1187. http://www.phreedom.org/research/tinype/
  1188. https://goo.gl/fu93Mg (+)
  1189. https://goo.gl/XAq8qW (+)
  1190. http://lightningsecurity.io/blog/password-not-provided/
  1191. http://redplait.blogspot.pt/2017/08/wincheck-rc858.html
  1192. https://gist.github.com/marcan/23e1ec416bf884dcd7f0e635ce5f2724
  1193. http://illmatics.com/carhacking.html
  1194. https://goo.gl/Yg4QHV (+)
  1195. https://l.avala.mp/?p=241
  1196. https://lowlevelbits.org/reverse-engineering-stickies.app/
  1197. https://www.psattack.com/articles/20170810/application-compatibility-shims/
  1198. https://lolware.net/2017/08/01/capturing-mfa-logons.html
  1199. https://blog.netspi.com/attacking-sso-common-saml-vulnerabilities-ways-find/
  1200. https://goo.gl/P8EdJH (+)
  1201. https://aspe1337.blogspot.pt/2017/04/writeup-of-cve-2017-7199.html
  1202. http://www.exploit-monday.com/2017/07/bypassing-device-guard-with-dotnet-methods.html
  1203. http://hackethereum.com/
  1204. https://gist.github.com/MerryMage/797c523724e2dc02ada86a1cfadea3ee
  1205. http://sheepsec.com/blog/username_enumeration_via_jar.html
  1206. https://hackerone.com/reports/198690
  1207. https://goo.gl/zsevzD (+)
  1208. https://duo.com/blog/hunting-malicious-npm-packages
  1209. https://iayanpahwa.github.io/Reverse-Engineering-IoT-Devices/
  1210. https://toshellandback.com/2017/08/16/mousejack/
  1211. https://0x00sec.org/t/game-hacking-winxp-minesweeper/1266
  1212. http://thecyberrecce.net/2017/02/12/reversing-the-trendnet-ts-402/
  1213. https://zhuanlan.zhihu.com/p/28575189
  1214. https://goo.gl/KBsZtt (+)
  1215. https://goo.gl/ViLaih (+)
  1216. http://nahamsec.com/secure-your-jenkins-instance-or-hackers-will-force-you-to/
  1217. https://ae7.st/g/
  1218. https://dave.cheney.net/2017/08/21/the-here-is-key
  1219. http://gbppr.dyndns.org/~gbpprorg/l0pht/l0pht.html
  1220. https://hackerone.com/reports/207042
  1221. https://medium.com/@arbazhussain/pre-domain-wildcard-cors-exploitation-2d6ac1d4bd30
  1222. https://goo.gl/d15wVv (+)
  1223. https://phoenixpwn.com/
  1224. https://sintonen.fi/advisories/qnap-qts-42-multiple-vulnerabilities.txt
  1225. http://bsmt.me/posts/openxc-reversing/
  1226. https://goo.gl/7grxsj (+)
  1227. https://raw.githubusercontent.com/hatRiot/token-priv/master/abusing_token_eop_1.0.txt
  1228. https://gerbenjavado.com/manual-sql-injection-discovery-tips/
  1229. https://goo.gl/7psV1M (+)
  1230. https://appscreener.us/blog/?code=reading-ios-app-binary-files
  1231. https://goo.gl/2JbZAv (+)
  1232. https://goo.gl/xFHvXr (+)
  1233. https://research.swtch.com/zip
  1234. https://chris.bolin.co/offline/
  1235. http://madeintheusbwebsite.azurewebsites.net
  1236. http://zhchbin.github.io/2017/08/30/Uber-XSS-via-Cookie/
  1237. https://opnsec.com/2017/08/advanced-flash-vulnerabilities-in-youtube/
  1238. https://blog.didierstevens.com/2017/09/05/abusing-a-writable-windows-service/
  1239. https://www.doyler.net/security-not-included/certreq-exfiltration
  1240. https://lgtm.com/blog/apache_struts_CVE-2017-9805
  1241. http://blog.thinkst.com/2017/08/disrupting-aws-s3-logging.html
  1242. http://dmitry.gr/index.php?r=05.Projects&proj=23.%20PSoC4
  1243. https://reactarmory.com/answers/how-can-i-use-css-in-js-securely
  1244. http://www.martinvigo.com/diy-spy-program-abusing-apple-call-relay-protocol/
  1245. https://benkowlab.blogspot.pt/2017/08/from-onliner-spambot-to-millions-of.html
  1246. http://blog.pentestbegins.com/2017/08/05/remote-xss-attack-using-csrf/
  1247. https://goo.gl/JhkeQj (+)
  1248. http://www.ringzerolabs.com/2017/08/bypassing-anti-analysis-technique-in.html
  1249. https://blogs.securiteam.com/index.php/archives/3379
  1250. https://www.imperialviolet.org/2017/08/13/securitykeys.html
  1251. https://blog.quarkslab.com/flash-dumping-part-i.html
  1252. https://goo.gl/DtNjd8 (+)
  1253. https://goo.gl/H8T3kz (+)
  1254. https://goo.gl/tkrdbm (+)
  1255. https://goo.gl/omukkh (+)
  1256. https://goo.gl/54L7rS (+)
  1257. https://rtpbleed.com/
  1258. http://go.armis.com/hubfs/BlueBorne%20Technical%20White%20Paper-1.pdf
  1259. https://goo.gl/3DfDJT (+)
  1260. https://goo.gl/WZXckr (+)
  1261. https://goo.gl/2CgsS4 (+)
  1262. https://courk.fr/index.php/2017/09/10/reverse-engineering-exploitation-connected-clock/
  1263. http://tinyhack.com/2017/09/05/mastercard-internet-gateway-service-hashing-design-flaw/
  1264. https://www.mdsec.co.uk/2017/09/exploiting-cve-2017-8759-soap-wsdl-parser-code-injection/
  1265. https://diablohorn.com/2017/09/09/understanding-practicing-java-deserialization-exploits/
  1266. http://www.exploit-monday.com/2017/08/exploiting-powershell-code-injection.html
  1267. https://jesuscoin.network/
  1268. https://quoteinvestigator.com/2013/03/06/artists-steal/amp/
  1269. https://safiire.github.io/blog/2017/08/19/solving-danish-defense-intelligence-puzzle/
  1270. https://goo.gl/SsWjW6 (+)
  1271. https://goo.gl/NTE4H9 (+)
  1272. https://www.virtuesecurity.com/blog/aws-penetration-testing-s3-buckets/
  1273. https://blog.avuln.com/article/4
  1274. http://patrickhurd.pro/blog/posts/popjsanalysis.html
  1275. http://qiita.com/alfa/items/b0e807ae040fc8f61d20
  1276. https://www.hopperapp.com/blog/?p=219
  1277. https://goo.gl/QTqj8t (+)
  1278. http://guptashubham.com/all-about-hackerone-private-program-terapeak/
  1279. https://wtf.horse/2017/09/19/common-wifi-attacks-explained/
  1280. https://0x10f8.wordpress.com/2017/08/07/reverse-engineering-an-eclipse-plugin/
  1281. https://www.antid0te.com/blog.html
  1282. http://blog.quarkslab.com/make-confide-great-again-no-we-cannot.html
  1283. https://goo.gl/fcmP1Y (+)
  1284. https://dev.to/tkaczanowski/explaining-programming-to-6-years-old-kids
  1285. https://goo.gl/GbJLyc (+)
  1286. https://learn.sparkfun.com/tutorials/gas-pump-skimmers
  1287. https://goo.gl/D2HWmu (+)
  1288. https://goo.gl/mtUa28 (+)
  1289. http://www.shawarkhan.com/2017/08/sarahah-xss-exploitation-tool.html
  1290. https://rails-sqli.org/
  1291. https://un-excogitate.org/dormant-domination
  1292. https://goo.gl/SwBQnX (+)
  1293. http://hatriot.github.io/blog/2017/09/19/abusing-delay-load-dll/
  1294. https://www.incapsula.com/blog/blocking-session-hijacking-on-gitlab.html
  1295. https://specterops.io/assets/resources/SpecterOps_Subverting_Trust_in_Windows.pdf
  1296. http://defencely.com/blog/defencely-clarifies-python-object-injection-exploitation/
  1297. https://www.twistlock.com/2017/06/25/alpine-linux-pt-1-2/
  1298. https://medium.com/@th3g3nt3l/900-xss-in-yahoo-recon-wins-65ee6d4bfcbd
  1299. https://blog.rapid7.com/2013/07/02/a-penetration-testers-guide-to-ipmi/
  1300. https://pokeinthe.io/2017/09/14/http-status-code-handling/
  1301. http://ccsinjection.lepidum.co.jp/blog/2014-06-05/CCS-Injection-en/index.html
  1302. http://radare.today/technical-analysis-of-the-gnutls-hello-vulnerability/
  1303. http://blog.internot.info/2014/05/facebook-skype-to-email-leak-3000-bounty.html
  1304. http://www.sysvalue.com/en/heartbleed-cupid-wireless/
  1305. https://henryhoggard.co.uk/?p=68
  1306. http://moscrack.sourceforge.net/
  1307. https://code.google.com/p/xssf/
  1308. http://blog.j-michel.org/post/86992432269/from-nand-chip-to-files
  1309. http://www.securitybydefault.com/2012/07/backdooring-apache.html
  1310. http://blog.opensecurityresearch.com/2014/05/acquiring-linux-memory-from-server-far.html
  1311. http://www.securityartwork.es/2014/06/04/read-htaccess-file-through-blind-sql-injection/?lang=en
  1312. http://www.labofapenetrationtester.com/2014/06/introducing-antak.html
  1313. http://kukuruku.co/hub/nix/writing-a-file-system-in-linux-kernel
  1314. https://wireedit.com/
  1315. http://www.moserware.com/2009/09/stick-figure-guide-to-advanced.html
  1316. http://blog.blackfan.ru/2017/09/devtwittercom-xss.html
  1317. https://forsec.nl/2017/09/smart-home-remote-command-execution-rce/
  1318. https://wmie.codeplex.com/
  1319. https://goo.gl/X5tmUW (+)
  1320. http://noxxi.de/research/breaking-dkim-on-purpose-and-by-chance.html
  1321. https://phoenhex.re/2017-06-09/pwn2own-diskarbitrationd-privesc
  1322. https://blog.filippo.io/we-need-to-talk-about-session-tickets/
  1323. https://goo.gl/AZ8qRV (+)
  1324. https://halbecaf.com/2017/05/24/exploiting-a-v8-oob-write/
  1325. https://sockpuppet.org/blog/2015/01/15/against-dnssec/
  1326. https://goo.gl/Fk6FpM (+)
  1327. https://blog.ropchain.com/2017/04/03/disarming-emet-5-52/
  1328. https://ro-che.info/articles/2017-09-17-booking-com-manipulation
  1329. https://jordaneldredge.com/projects/winamp2-js/
  1330. http://georgemauer.net/2017/10/07/csv-injection.html
  1331. https://justi.cz/security/2017/10/07/rubygems-org-rce.html
  1332. https://blog.zsec.uk/subdomainhijack/
  1333. https://goo.gl/d6XGkh (+)
  1334. https://goo.gl/96rGuw (+)
  1335. http://www.chokepoint.net/2017/10/exposing-server-ips-behind-cloudflare.html
  1336. https://goo.gl/HEpNnN (+)
  1337. https://smartlockpicking.com/tutorial/my-smart-lock-vendor-disappeared/
  1338. https://goo.gl/z1zesp (+)
  1339. https://blog.liftsecurity.io/2017/04/14/sql-and-more-via-xss-in-pgadmin4/
  1340. https://goo.gl/F7fdBb (+)
  1341. https://sensepost.com/blog/2017/macro-less-code-exec-in-msword/
  1342. https://medium.com/websec/wordpress-sqli-bbb2afcc8e94
  1343. http://clickheretosavetheworld.com/
  1344. https://gavv.github.io/blog/pulseaudio-under-the-hood/
  1345. https://kate.io/blog/git-bomb/
  1346. https://blogs.securiteam.com/index.php/archives/3430
  1347. https://kciredor.com/taking-over-every-ad-on-olx-automated-an-idor-story.html
  1348. https://www.nomotion.net/blog/sharknatto/
  1349. https://warroom.securestate.com/cve-2017-9769/
  1350. https://www.krackattacks.com/
  1351. http://hexdetective.blogspot.pt/2017/02/exploiting-android-s-boot-getting.html
  1352. https://goo.gl/kqbzgz (+)
  1353. http://codepool.me/NET-Reverse-Enginering-Part-1/
  1354. https://goo.gl/Ap47c2 (+)
  1355. https://crocs.fi.muni.cz/public/papers/rsa_ccs17
  1356. https://www.bamsoftware.com/papers/fronting/
  1357. https://blog.flanker017.me/cve-2017-2416-gif-remote-exec/
  1358. https://goo.gl/sSF3up (+)
  1359. https://gist.github.com/1wErt3r/4048722
  1360. http://blog.intothesymmetry.com/2017/10/slack-saml-authentication-bypass.html
  1361. https://goo.gl/hMHdD7 (+)
  1362. http://infosecninja.blogspot.pt/2017/09/android-kiosk-browser-lock-down.html
  1363. http://subt0x10.blogspot.pt/2017/08/msxslexe-working-as-designed.html
  1364. https://goo.gl/5jwWoj (+)
  1365. https://0.me.uk/ev-phishing/
  1366. https://www.fidusinfosec.com/tp-link-remote-code-execution-cve-2017-13772/
  1367. http://bobao.360.cn/learning/detail/4534.html
  1368. http://www.sysadminjd.com/adv170014-ntlm-sso-exploitation-guide/
  1369. https://appelsiini.net/2017/reverse-engineering-location-services/
  1370. https://nickcano.com/reversing-league-of-legends-client/
  1371. https://fail0verflow.com/blog/2017/ps4-namedobj-exploit/
  1372. http://www.geeknik.net/7k9et2d9e
  1373. https://embedi.com/blog/uefi-bios-holes-so-much-magic-dont-come-inside
  1374. https://goo.gl/rYdJdk (+)
  1375. https://goo.gl/xASVx1 (+)
  1376. http://www.dicewarepasswords.com/
  1377. http://webjack.io/
  1378. https://goo.gl/Up218B (+)
  1379. http://stamone-bug-bounty.blogspot.pt/2017/10/dom-xss-auth_14.html
  1380. https://goo.gl/Arvvgp (+)
  1381. https://benkowlab.blogspot.pt/2017/05/feedback-on-how-to-build-smb-honeypot.html
  1382. https://goo.gl/kojasB (+)
  1383. https://edoverflow.com/2017/broken-link-hijacking/
  1384. https://security.tencent.com/index.php/blog/msg/116
  1385. https://lucasg.github.io/2017/10/15/Api-set-resolution/
  1386. https://goo.gl/n6rbcT (+)
  1387. https://goo.gl/STZHRC (+)
  1388. https://goo.gl/jkFJjg (+)
  1389. https://goo.gl/mJoCR2 (+)
  1390. http://agrrrdog.blogspot.pt/2017/03/autobinding-vulns-and-spring-mvc.html
  1391. https://adamcaudill.com/2017/10/04/exploiting-jackson-rce-cve-2017-7525/
  1392. https://www.sneakymonkey.net/2016/10/30/raspberrypi-nsm/
  1393. https://goo.gl/geiujj (+)
  1394. https://philippeharewood.com/posting-gifs-as-anyone-on-facebook/
  1395. https://ysx.me.uk/app-maker-and-colaboratory-a-stored-google-xss-double-bill/
  1396. https://goo.gl/Apc2Mr (+)
  1397. https://diablohorn.com/2017/08/15/brute-forcing-encrypted-web-login-forms/
  1398. https://git.stan.sh/SL-Process/DataBuster-VPN
  1399. https://pentestlab.blog/2017/08/29/command-and-control-dropbox/
  1400. https://goo.gl/DD871b (+)
  1401. https://reverse.put.as/2017/11/07/exploiting-cve-2017-5123/
  1402. https://pleasestopnamingvulnerabilities.com/
  1403. https://gdelugre.github.io/2017/11/06/samba-path-pivot-attack/
  1404. https://jesux.es/exploiting/blueborne-android-6.0.1/
  1405. https://modexp.wordpress.com/2017/10/30/poly-mutex-names/
  1406. http://research.rootme.in/stealing-csvs-crossdomain/
  1407. https://goo.gl/QyY7fX (+)
  1408. https://whereisk0shl.top/Dark%20Composition%20Exploit%20in%20Ring0.html
  1409. http://trillian.mit.edu/~jc/humor/ATT_Copyright_true.html
  1410. https://gamehistory.org/aladdin-source-code/
  1411. http://www.noob.ninja/2017/11/local-file-read-via-xss-in-dynamically.html
  1412. https://justi.cz/security/2017/11/14/couchdb-rce-npm.html
  1413. http://blog.vulspy.com/2017/11/09/Wordpress-4-8-2-SQL-Injection-POC/
  1414. http://rickyhan.com/jekyll/update/2017/11/10/bypassing-recaptcha.html
  1415. https://www.illuminatejs.com
  1416. https://bo0om.ru/chrome-and-safari-uxss
  1417. https://staaldraad.github.io/2017/11/12/polycom-hdx-rce/
  1418. https://goo.gl/zgaNZu (+)
  1419. https://ionize.com.au/stealing-amazon-ec2-keys-via-xss-vulnerability/
  1420. https://rot.fi/2017/11/07/wan-to-lan-exploitation-of-4g-broadband-modem/
  1421. https://goo.gl/oPM722 (+)
  1422. https://goo.gl/k6wTv6 (+)
  1423. https://depthsecurity.com/blog/using-python-to-get-a-shell-without-a-shell
  1424. http://antonioparata.blogspot.pt/2017/11/shed-inspect-net-malware-like-sir.html
  1425. https://xorl.wordpress.com/2017/11/11/cve-2017-13089-wget-http-integer-overflow/
  1426. https://edoverflow.com/2017/ruby-resolv-bug/
  1427. http://korban.net/posts/postgres/2017-11-02-the-case-against-orms/
  1428. https://martinmelhus.com/web-audio-modem/
  1429. https://statuscode.ch/2017/11/from-markdown-to-rce-in-atom/
  1430. https://blog.zsec.uk/rce-chain/
  1431. https://embedi.com/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about
  1432. https://goo.gl/Mh8xdi (+)
  1433. https://ss64.com/ps/
  1434. https://mike-n1.github.io/ExtensionsOverview
  1435. https://goo.gl/sXaCHB (+)
  1436. https://goo.gl/6kXDq6 (+)
  1437. https://openeffect.ca/snifflab-an-environment-for-testing-mobile-devices/
  1438. https://goo.gl/SF3fE2 (+)
  1439. https://digi.ninja/blog/xss_steal_csrf_token.php
  1440. https://goo.gl/UWPKNC (+)
  1441. https://blog.xpnsec.com/becoming-system/
  1442. https://goo.gl/3LbCnL (+)
  1443. https://samczsun.com/privilege-escalation-legalrobot/
  1444. https://diablohorn.com/2017/05/21/quantum-insert-bypassing-ip-restrictions/
  1445. https://blog.conscioushacker.io/index.php/2017/10/25/evading-microsofts-autoruns/
  1446. https://goo.gl/hVo9SC (+)
  1447. https://nickjanetakis.com/blog/run-the-first-edition-of-unix-1972-with-docker
  1448. https://goo.gl/oQexiF (+)
  1449. https://ysx.me.uk/taking-note-xss-to-rce-in-the-simplenote-electron-client/
  1450. https://objective-see.com/blog/blog_0x24.html
  1451. http://c0d3g33k.blogspot.pt/2017/11/story-of-json-xss.html
  1452. https://osandamalith.com/2017/03/24/places-of-interest-in-stealing-netntlm-hashes
  1453. http://jacksonbaker.net/reverse-engineering-the-misfit-bolt-btle-protocol/
  1454. https://medium.com/bindecy/huge-dirty-cow-cve-2017-1000405-110eca132de0
  1455. https://haiderm.com/fully-undetectable-backdooring-pe-files/
  1456. https://goo.gl/k5FhZY (+)
  1457. https://goo.gl/1oGthj (+)
  1458. https://raesene.github.io/blog/2017/05/01/Kubernetes-Security-etcd/
  1459. https://medium.com/@5yx/dde-word-exec-3e57cc45b401
  1460. https://www.xorrior.com/You-Have-The-Right-to-Remain-Cylance/
  1461. https://medium.com/@infodox/pwning-red-team-toys-crunchrat-rce-ce83e1d09ae9
  1462. http://blog.sec-consult.com/2017/04/what-unites-hp-philips-and-fujitsu-one.html
  1463. http://tldr.sh/
  1464. http://www.readylinux.com/
  1465. https://www.darkoperator.com/blog/2017/11/20/some-comments-and-thoughts-on-tradecraft
  1466. https://goo.gl/XrGehX (+)
  1467. https://goo.gl/VdAeoT (+)
  1468. https://www.mailsploit.com/index
  1469. https://goo.gl/oTx3iE (+)
  1470. https://bitrot.sh/post/30-11-2017-domain-fronting-with-meterpreter/
  1471. http://decidedlygray.com/2017/08/10/modifying-and-building-burp-extensions/
  1472. https://blog.elcomsoft.com/2017/11/ios-11-horror-story-the-rise-and-fall-of-ios-security/
  1473. https://goo.gl/FZuEMi (+)
  1474. https://codinguy.net/2013/06/03/insertion-encoderdecoder-shellcode/
  1475. http://blog.bentkowski.info/2017/11/yet-another-google-caja-bypasses-hat.html
  1476. http://az4n6.blogspot.fr/2017/10/finding-and-decoding-malicious.html
  1477. https://www.chrisdcmoore.co.uk/post/oneplus-analytics/
  1478. http://blog.talosintelligence.com/2017/11/exploiting-cve-2016-2334.html
  1479. https://blog.xpnsec.com/windows-warbird-privesc/
  1480. https://www.twistlock.com/2017/11/20/cve-2017-16544-busybox-autocompletion-vulnerability/
  1481. http://karl-voit.at/2016/02/07/accessing-home-ssh-via-tor/
  1482. http://dmitry.gr/?r=05.Projects&proj=07.%20Linux%20on%208bit
  1483. http://c0rni3sm.blogspot.pt/2014/02/youtube-stored-xss-strikes-back.html
  1484. http://blog.saynotolinux.com/2014/02/05/whats-that-smell-sniffing-cross-origin-frames-in-firefox/
  1485. https://blog.whitehatsec.com/flash-307-redirect-game-over/
  1486. https://www.scriptjunkie.us/2014/02/installing-linux-on-a-live-windows-system/
  1487. http://insert-script.blogspot.co.at/2014/02/svg-fun-time-firefox-svg-vector.html
  1488. http://projectshellcode.com/?q=node/12
  1489. http://bugscollector.com/tricks/12/
  1490. http://blog.sucuri.net/2014/02/new-iframe-injections-leverage-png-image-metadata.html
  1491. http://www.troyhunt.com/2014/02/heres-how-bell-was-hacked-sql-injection.html
  1492. http://blogs.law.harvard.edu/zeroday/2014/02/05/so-this-is-what-getting-pwned-is-like/
  1493. http://imgur.com/LiixgJ4
  1494. https://www.schneier.com/blog/archives/2014/02/hacking_airline.html
  1495. https://www.youtube.com/watch?v=tc4ROCJYbm0
  1496. http://www.orenh.com/2014/06/one-token-to-rule-them-all-tale-of.html
  1497. http://c0rni3sm.blogspot.pt/2014/06/xss-in-google-mapmaker.html
  1498. https://cybersmartdefence.com/docs/Paypal-Safely-Double-your-Money.csd
  1499. http://nahamsec.com/?p=267
  1500. https://zyan.scripts.mit.edu/blog/a-boring-xss-dissection/
  1501. http://n0where.net/hexinject/
  1502. https://www.shellterproject.com/introducing-shellter/
  1503. http://blog.cylance.com/a-study-in-bots-lobotomy
  1504. http://iss.oy.ne.ro/Aether
  1505. http://blog.opensecurityresearch.com/2014/05/multi-stagedmulti-form-csrf.html
  1506. http://sirdarckcat.blogspot.pt/2014/05/matryoshka-web-application-timing.html
  1507. http://labs.neohapsis.com/2014/06/02/smarttv-smartphone-dial-an-attack-surface/
  1508. http://xn--thibaud-dya.fr/jenkins_credentials.html
  1509. http://penturalabs.wordpress.com/2014/03/17/iclass-is-not-enough/
  1510. http://piratebox.cc/
  1511. https://robotattack.org/
  1512. https://medium.com/bugbountywriteup/bug-bounty-fastmail-feeda67905f5
  1513. https://goo.gl/v2uyi2 (+)
  1514. http://www.pwntester.com/blog/2013/12/23/rce-via-xstream-object-deserialization38/
  1515. https://goo.gl/1knbkp (+)
  1516. https://www.tarlogic.com/en/blog/exploiting-word-cve-2017-11826/
  1517. https://lewisardern.github.io/2017/12/10/blind-xss/
  1518. https://benkowlab.blogspot.pt/2017/12/an-inside-view-of-password-stealer.html
  1519. https://research.kudelskisecurity.com/2017/11/01/zigbee-security-basics-part-1/
  1520. https://medium.com/@palantir/osquery-across-the-enterprise-3c3c9d13ec55
  1521. https://symeonp.github.io/2017/09/17/fuzzing-winafl.html
  1522. https://goo.gl/RchdtG (+)
  1523. https://goo.gl/GxynDa (+)
  1524. https://dnstrails.com
  1525. https://medium.com/@shinkurt/exploiting-a-tricky-xss-in-zendesk-80bdeaea4dad
  1526. http://www.sxcurity.pro/2017/12/17/hackertarget/
  1527. https://nyansatan.github.io/dualboot/
  1528. https://packettotal.com/
  1529. https://bsdmag.org/freebsd-port-knocking-abdorrahman-homaei/
  1530. https://www.talosintelligence.com/reports/TALOS-2017-0432
  1531. https://goo.gl/k67GVK (+)
  1532. http://riscy.business/2017/12/lenovos-unsecured-objects/
  1533. http://blog.blindspotsecurity.com/2017/12/advanced-sql-server-mitm-attacks.html
  1534. https://goo.gl/7i24Kk (+)
  1535. https://msitpros.com/?p=3909
  1536. http://www.alexlambert.com/2017/12/18/kernel-debugging-for-newbies.html
  1537. https://goo.gl/KUrtkX (+)
  1538. https://www.twosixlabs.com/bluesteal-popping-gatt-safes/
  1539. http://blog.stratumsecurity.com/2016/06/13/websockets-auth/
  1540. https://goo.gl/EKsvWq (+)
  1541. https://wiki.postgresql.org/wiki/Sudoku_solver
  1542. https://ha.cking.ch/s8_data_line_locator/
  1543. https://hawkinsecurity.com/2017/12/13/rce-via-spring-engine-ssti/
  1544. https://www.cyberis.co.uk/burp_macros.html
  1545. https://secrary.com/ReversingMalware/UnpackingShade/
  1546. https://staaldraad.github.io/2017/12/20/netstat-without-netstat/
  1547. https://goo.gl/NpBqrf (+)
  1548. https://goo.gl/R5sLzw (+)
  1549. https://lbarman.ch/blog/stack_smashing/
  1550. https://lanrat.com/tethr/
  1551. http://blog.gaurangbhatnagar.com/2017/12/02/Hacking-a-dating-app.html
  1552. https://laskowski-tech.com/2017/12/19/setting-up-a-honeypot-using-opencanary/
  1553. https://goo.gl/c3uMW2 (+)
  1554. https://qiita.com/_pochi/items/4e20e38deee16a7615e1
  1555. https://www.fireeye.com/blog/threat-research/2017/05/gaining-root-on-lenovo-vibe.html
  1556. http://sshtron.zachlatta.com/
  1557. https://gist.github.com/keo/00f20ef27eddcdae78ab
  1558. https://meltdownattack.com/
  1559. http://blog.blackfan.ru/2018/01/polygooglecom-xss.html
  1560. https://goo.gl/a3jJxR (+)
  1561. http://www.blackhillsinfosec.com/?p=5633
  1562. https://devco.re/blog/2017/12/11/Exim-RCE-advisory-CVE-2017-16943-en/
  1563. http://arnaucode.com/blog/coffeeminer-hacking-wifi-cryptocurrency-miner.html
  1564. https://www.elttam.com.au/blog/goahead/
  1565. http://saleemrashid.com/2017/08/17/extracting-trezor-secrets-sram/
  1566. https://goo.gl/iyryvz (+)
  1567. https://goo.gl/MPbfyS (+)
  1568. https://objective-see.com/blog/blog_0x22.html
  1569. https://goo.gl/BdbbZg (+)
  1570. https://0x0.li/trackmageddon/
  1571. https://damow.net/building-a-thermal-camera/
  1572. https://ml-cheatsheet.readthedocs.io/en/latest/index.html
  1573. https://cr0n1c.wordpress.com/2018/01/08/exploiting-cheap-labor/
  1574. https://rcoh.me/posts/two-factor-auth/
  1575. https://www.xorrior.com/In-Memory-Python-Imports/
  1576. https://nickbloor.co.uk/2018/01/01/rce-with-bmc-server-automation/
  1577. https://siguza.github.io/IOHIDeous/
  1578. http://www.sxcurity.pro/2017/11/27/tricky-CORS/
  1579. https://wpshout.com/complete-guide-sanitizing-escaping/
  1580. https://goo.gl/MGEbmE (+)
  1581. https://www.anquanke.com/post/id/94210
  1582. http://www.shelliscoming.com/2017/05/post-exploitation-mounting-vmdk-files.html
  1583. http://blog.en.elevenpaths.com/2017/12/breaking-out-hsts-and-hpkp-on-firefox.html
  1584. https://www.digitalinterruption.com/single-post/2018/01/04/ToyTalkBugBountyWriteup
  1585. https://medium.com/@palantir/alerting-and-detection-strategy-framework-52dc33722df2
  1586. https://goo.gl/Nkrdni (+)
  1587. https://iknowwhatyoudownload.com/
  1588. https://www.zachaysan.com/writing/2017-12-30-zero-width-characters
  1589. https://blog.kintoandar.com/2018/01/Building-healthier-containers.html
  1590. https://blog.xpnsec.com/evernote-webclipper-uxss/
  1591. http://www.sxcurity.pro/2018/01/11/chaining-yahoo-bugs/
  1592. https://www.josipfranjkovic.com/blog/hacking-facebook-oculus-integration-csrf
  1593. https://gist.github.com/singe/cba85800dd6e701c53d0614d8506b281
  1594. https://goo.gl/aXGp9i (+)
  1595. https://www.nvteh.com/news/problems-with-public-ebs-snapshots
  1596. https://goo.gl/kw77MT (+)
  1597. https://duo.com/blog/understanding-bluetooth-security
  1598. https://blog.fox-it.com/2018/01/11/mitm6-compromising-ipv4-networks-via-ipv6/
  1599. https://goo.gl/tzHsjA (+)
  1600. https://johanengelen.github.io/ldc/2018/01/14/Fuzzing-with-LDC.html
  1601. https://klikki.fi/adv/formidable.html
  1602. https://dhavalkapil.com/blogs/FILE-Structure-Exploitation/
  1603. https://goo.gl/qgb6YU (+)
  1604. http://www.keras4kindergartners.com/
  1605. https://blog.benjojo.co.uk/post/dns-filesystem-true-cloud-storage-dnsfs
  1606. https://www.rcesecurity.com/2017/08/from-lfi-to-rce-via-php-sessions/
  1607. http://blog.orange.tw/2018/01/php-cve-2018-5711-hanging-websites-by.html
  1608. http://az4n6.blogspot.pt/2018/01/mounting-apfs-image-in-linux.html
  1609. https://diablohorn.com/2017/10/26/port-scanning-without-an-ip-address/
  1610. https://pseudolaboratories.github.io/DarkComet-upload-vulnerability/
  1611. https://pentesterslife.blog/2017/11/24/x64-egg-hunting-in-linux-systems/
  1612. https://franklinta.com/2014/08/31/predicting-the-next-math-random-in-java/
  1613. https://blog.zsec.uk/out-of-band-xxe-2/
  1614. https://goo.gl/tDcRZs (+)
  1615. https://whereisk0shl.top/post/2018-01-17
  1616. https://klikki.fi/adv/wpgform.html
  1617. https://ownyourbits.com/2017/10/29/sandbox-your-applications-with-firejail/
  1618. https://blogs.securiteam.com/index.php/archives/3649
  1619. https://makecode.com/
  1620. https://startyourownisp.com/
  1621. http://nullprogram.com/blog/2014/12/23/
  1622. http://blog.jr0ch17.com//2018/No-RCE-then-SSH-to-the-box/
  1623. https://goo.gl/e4HC7r (+)
  1624. http://whitehatstories.blogspot.in/2018/01/how-i-could-have-hacked-facebook.html
  1625. https://homjxi0e.wordpress.com/2018/01/20/whitelisting-bypassing-using-netsh-exec/
  1626. http://www.sploitspren.com/2018-01-26-Windows-Privilege-Escalation-Guide/
  1627. http://blog.swiecki.net/2018/01/fuzzing-tcp-servers.html
  1628. https://goo.gl/7QyUuJ (+)
  1629. https://goo.gl/Wtt6CB (+)
  1630. https://goo.gl/UGB2Ce (+)
  1631. https://depthsecurity.com/blog/exploiting-custom-template-engines
  1632. https://www.codemetrix.net/when-your-dns-leaks-your-infrastructure/
  1633. https://sqlwiki.netspi.com/
  1634. https://bazad.github.io/2017/09/live-kernel-introspection-ios/
  1635. http://blog.ptsecurity.com/2018/01/running-unsigned-code-in-intel-me.html
  1636. https://goo.gl/K7hbDW (+)
  1637. https://landave.io/2018/01/7-zip-multiple-memory-corruptions-via-rar-and-zip
  1638. http://ponzicoin.co/home.html
  1639. https://ponnuki.net/2012/09/kindleberry-pi/
  1640. https://ahussam.me/Amazon-leaking-csrf-token-using-service-worker/
  1641. https://inteltechniques.com/buscador/
  1642. https://xorl.wordpress.com/2018/02/04/ssh-hijacking-for-lateral-movement/
  1643. https://blog.tarq.io/vestacp-root-privilege-escalation/
  1644. https://xorl.wordpress.com/2017/11/20/reverse-engineering-isdebuggerpresent/
  1645. https://goo.gl/8pqJek (+)
  1646. https://goo.gl/646izH (+)
  1647. http://trackwatch.com/windows-kernel-pool-spraying/
  1648. https://goo.gl/8JYRYz (+)
  1649. https://thatoddmailbox.github.io/2017/01/28/iotaseed.html
  1650. https://goo.gl/V3dMKJ (+)
  1651. https://www.n00py.io/2017/01/removing-backdoors-powershell-empire-edition/
  1652. http://www.paulosyibelo.com/2018/02/hotspot-shield-cve-2018-6460-sensitive.html
  1653. https://jsnes.fir.sh/
  1654. https://x8x.net/2017/11/19/home-alarm-vs-bus-pirate/
  1655. https://diagprov.ch/posts/2017/03/a-polyglot-mbrpdfjarzip-cv.html
  1656. https://blog.jensec.co/clickjacking-in-google-root-picker/
  1657. https://sites.google.com/site/testsitehacking/-7-5k-Google-services-mix-up
  1658. https://gist.github.com/PseudoLaboratories/260b6f24844785aacc1e2fb61dd05c01
  1659. https://goo.gl/si8EhL (+)
  1660. https://goo.gl/21Vtnp (+)
  1661. https://mohemiv.com/all/evil-xml/
  1662. http://sploit3r.xyz/blueborne-exploitation-nexus-4/
  1663. http://www.greyhathacker.net/?p=1006
  1664. https://x-c3ll.github.io/posts/javascript-antidebugging/
  1665. https://osandamalith.com/2018/02/11/mysql-udf-exploitation/
  1666. http://baraktawily.blogspot.pt/2018/02/how-to-dos-29-of-world-wide-websites.html
  1667. https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/
  1668. https://www.cybereason.com/blog/new-lateral-movement-techniques-abuse-dcom-technology
  1669. https://www.secforce.com/blog/2014/02/from-cvs-import-to-cmd-exe-via-sql-injection/
  1670. https://blog.pnb.io/2018/02/bruteforcing-linux-full-disk-encryption.html
  1671. http://sandboxescaper.blogspot.pt/2018/02/how-to-escape-sandboxes-without.html
  1672. http://www.tomanthony.co.uk/blog/googlebot-javascript-random/
  1673. https://transfer.sh/
  1674. http://0x90909090.blogspot.pt/2015/07/no-one-expect-command-execution.html
  1675. http://www.insinuator.net/2014/05/django-image-validation-vulnerability/
  1676. http://blog.cyberint.com/2014/05/facebook-hidden-friends-vulnerability.html
  1677. http://blog.includesecurity.com/2014/06/exploit-walkthrough-cve-2014-0196-pty-kernel-race-condition.html
  1678. http://hacksecproject.com/?p=73
  1679. http://immunityservices.blogspot.pt/2014/06/from-patch-to-crash-story-of-ms13-089.html
  1680. http://joe4security.blogspot.pt/2014/06/the-power-of-cookbooks-generic-https.html
  1681. http://itsecurity.telelink.com/dhcp-attacks/
  1682. https://code.google.com/p/ghost-usb-honeypot/
  1683. http://blog.quarkslab.com/usb-fuzzing-basics-from-fuzzing-to-bug-reporting.html
  1684. http://hackerforhire.com.au/data-exfiltration-over-ssl-with-srvdir/
  1685. http://pastebin.com/raw.php?i=9s4TVqZq
  1686. http://lambdaops.com/rm-rf-remains
  1687. https://bughunt1307.herokuapp.com/googlebugs.html
  1688. https://bugs.chromium.org/p/project-zero/issues/detail?id=1524
  1689. http://woshub.com/port-forwarding-in-windows/
  1690. https://malpedia.caad.fkie.fraunhofer.de/
  1691. https://goo.gl/MEEp3F (+)
  1692. https://0x00sec.org/t/malware-reversing-burpsuite-keygen/5167
  1693. https://medium.com/@petergombos/lm-ntlm-net-ntlmv2-oh-my-a9b235c58ed4
  1694. http://riscy.business/2018/02/ida-remote-execution/
  1695. http://konukoii.com/blog/2018/02/16/5-min-tutorial-root-via-uart/
  1696. https://zachgrace.com/2018/02/20/cobalt_strike_redirectors.html
  1697. https://medium.com/@europa_/recoinnassance-7840824b9ef2
  1698. http://blog.frizn.fr/glibc/glibc-heap-to-rip
  1699. https://textslashplain.com/2018/02/14/understanding-the-limitations-of-https/
  1700. https://medium.com/@appmattus/android-security-ssl-pinning-1db8acb6621e
  1701. https://ipx.ac/run
  1702. https://ide.onelang.io/
  1703. https://goo.gl/LAUsok (+)
  1704. https://slashcrypto.org/2018/02/27/TenX_Account_Takeover/
  1705. https://hackerone.com/reports/303061
  1706. https://goo.gl/NnoZPp (+)
  1707. https://goo.gl/YjRkGK (+)
  1708. http://jsyang.ca/hacks/gear-vr-rev-eng/
  1709. https://nickbloor.co.uk/2018/02/28/popping-wordpress/
  1710. http://agrrrdog.blogspot.pt/2018/01/java-deserialization-misusing-ojdbc-for.html
  1711. http://www.freebuf.com/articles/terminal/160041.html
  1712. https://tunnelshade.in/blog/2018/01/afl-internals-compile-time-instrumentation/
  1713. https://krbtgt.pw/smbv3-null-pointer-dereference-vulnerability/
  1714. http://blog.ptsecurity.com/2018/02/new-bypass-and-protection-techniques.html
  1715. https://www.mike-gualtieri.com/posts/stealing-data-with-css-attack-and-defense
  1716. https://disconnect3d.pl/2018/02/24/log-injection-aka-tailing-logs-is-unsafe/
  1717. https://waveforms.surge.sh/waveforms-intro
  1718. https://medium.com/@malcomvetter/responsible-red-teams-1c6209fd43cc
  1719. https://goo.gl/eSAL6F (+)
  1720. https://s1gnalcha0s.github.io/dspl/2018/03/07/Stored-XSS-and-SSRF-Google.html
  1721. https://goo.gl/epujHQ (+)
  1722. https://zeltser.com/analyzing-malicious-documents/
  1723. https://goo.gl/46qXeQ (+)
  1724. https://heap-exploitation.dhavalkapil.com/
  1725. https://goo.gl/S4zdcJ (+)
  1726. https://erpscan.com/press-center/blog/adapting-hashcat-for-sap-half-hashes/
  1727. https://goo.gl/iNxWA1 (+)
  1728. https://blog.varonis.com/understanding-malware-free-hacking-part/
  1729. https://bazad.github.io/2018/03/a-fun-xnu-infoleak/
  1730. https://arxiv.org/pdf/1710.08864.pdf
  1731. https://osandamalith.com/2018/02/01/exploiting-format-strings-in-windows/
  1732. https://hackmd.io/s/rJ-3VKNPG
  1733. http://blog.koehntopp.info/index.php/3075-how-not-to-run-a-ca/
  1734. https://lightningsecurity.io/blog/bypassing-payments-using-webhooks/
  1735. https://www.josipfranjkovic.com/blog/facebook-friendlist-paymentcard-leak
  1736. https://labs.detectify.com/2018/03/14/graphql-abuse/
  1737. https://goo.gl/vNVzN1 (+)
  1738. https://www.eideon.com/2018-03-02-THL03-WMIBackdoors/
  1739. http://blog.japaric.io/safe-dma/
  1740. https://goo.gl/iz1hLP (+)
  1741. https://secdevops.ai/ios-static-analysis-and-recon-c611eaa6d108
  1742. https://goo.gl/ND8WeR (+)
  1743. https://reboare.github.io/lxd/lxd-escape.html
  1744. https://medium.com/@vysec.private/alibaba-cdn-domain-fronting-1c0754fa0142
  1745. https://blog.stealthbits.com/dcshadow-attacking-active-directory-with-rogue-dcs/
  1746. https://medium.com/secjuice/php-ssrf-techniques-9d422cb28d51
  1747. https://infocon.org/
  1748. https://opnsec.com/2018/03/stored-xss-on-facebook/
  1749. https://ahussam.me/Leaking-WordPress-CSRF-Tokens/
  1750. https://hackerone.com/reports/300748
  1751. https://www.unix-ninja.com/p/A_cheat-sheet_for_password_crackers
  1752. http://developers-club.com/posts/250999/
  1753. https://goo.gl/cAHW3N (+)
  1754. https://rastamouse.me/2018/03/laps---part-1/
  1755. https://saleemrashid.com/2018/03/20/breaking-ledger-security-model/
  1756. https://ryan.govost.es/2018/03/09/deepsound.html
  1757. https://staaldraad.github.io/post/2018-03-16-quick-win-with-graphql/
  1758. https://goo.gl/y1y8bn (+)
  1759. https://blog.jessfraz.com/post/building-container-images-securely-on-kubernetes/
  1760. https://oddvar.moe/2018/03/21/persistence-using-runonceex-hidden-from-autoruns-exe/
  1761. https://www.guardicore.com/2018/03/recovering-plaintext-passwords-azure/
  1762. https://goo.gl/64sxc8 (+)
  1763. http://misteralfa-hack.blogspot.pt/2018/03/leaking-facebook-internal-ip.html
  1764. https://codewhitesec.blogspot.pt/2018/03/exploiting-adobe-coldfusion.html
  1765. http://tech.jonathangardner.net/wiki/Why_Java_Sucks
  1766. https://gethead.info/
  1767. https://medium.com/@Alra3ees/google-adwords-3133-7-stored-xss-27bb083b8d27
  1768. https://hawkinsecurity.com/2018/03/24/gaining-filesystem-access-via-blind-oob-xxe/
  1769. https://zero-day.io/modifyexploits/
  1770. https://blog.jli.host/posts/cf-auto-minify/
  1771. https://www.leavesongs.com/PENETRATION/client-session-security.html
  1772. https://goo.gl/fnxgfx (+)
  1773. https://jellyhive.com/activity/posts/2018/03/26/csp-implementations-are-broken/
  1774. https://magisterquis.github.io/2018/03/11/process-injection-with-gdb.html
  1775. https://medium.com/@cloudyforensics/how-to-perform-aws-cloud-forensics-309a03a77aee
  1776. https://goo.gl/93GuBP (+)
  1777. https://goo.gl/5Nu3xo (+)
  1778. https://goo.gl/Vunae1 (+)
  1779. https://ncona.com/2015/02/consuming-a-google-id-token-from-a-server/
  1780. https://jeremyrickard.github.io/post/fun-with-aci/
  1781. https://pjreddie.com/darknet/yolo/
  1782. https://jgthms.com/javascript-in-14-minutes/
  1783. https://ngailong.wordpress.com/2018/02/13/the-mystery-of-postmessage/
  1784. http://bit.ly/2IxLqdT (+)
  1785. http://www.getmantra.com/web-app-security-testing-with-browsers/
  1786. https://syscall.eu/blog/2018/03/12/aigo_part1/
  1787. http://gosecure.net/2018/04/03/beyond-xss-edge-side-include-injection/
  1788. http://bluec0re.blogspot.pt/2018/03/cve-2018-7160-pwning-nodejs-developers.html
  1789. https://blog.ice9.us/2018/04/stealing-credit-cards-from-fuze-bluetooth.html
  1790. https://magisterquis.github.io/2018/03/31/in-memory-only-elf-execution.html
  1791. https://medium.com/@cintainfinita/knocking-down-the-big-door-8e2177f76ea5
  1792. http://blog.orange.tw/2018/03/pwn-ctf-platform-with-java-jrmp-gadget.html
  1793. https://phoenhex.re/2018-03-25/not-a-vagrant-bug
  1794. https://lightbulbone.com/posts/2016/10/dsmos-kext/
  1795. https://krbtgt.pw/windows-remote-assistance-xxe-vulnerability/
  1796. http://bit.ly/2Gz3aJj (+)
  1797. https://holeybeep.ninja/
  1798. http://bit.ly/2q81V8U (+)
  1799. https://www.anishathalye.com/2018/04/03/macbook-touchscreen/
  1800. https://philippeharewood.com/facebook-graphql-csrf/
  1801. http://bit.ly/2v6ODPN (+)
  1802. https://secrary.com/Random/BypassUserHooks/
  1803. http://bit.ly/2HvXjSg (+)
  1804. https://jdow.io/blog/2018/03/18/web-application-penetration-testing-methodology/
  1805. https://blog.fabiopires.pt/running-your-instance-of-burp-collaborator-server/
  1806. http://bit.ly/2GSKOmB (+)
  1807. http://bit.ly/2EGBVGP (+)
  1808. https://medium.com/@yassergersy/xss-to-session-hijack-6039e11e6a81
  1809. https://snyk.io/blog/attacking-an-ftp-client/
  1810. https://www.mindpointgroup.com/blog/pen-test/cloudfront-hijacking/
  1811. https://embedi.com/blog/reflecting-upon-owasp-top-10-iot-vulnerabilities/
  1812. https://clo.ng/blog/osquery_reverse_shell/
  1813. https://medium.com/@jeremy.trinka/event-log-auditing-demystified-75b55879f069
  1814. http://bit.ly/2EFUPhc (+)
  1815. https://osandamalith.com/2018/04/07/haxing-minesweeper/
  1816. https://blog.benjojo.co.uk/post/tor-onions-to-v6-with-iptables-proxy
  1817. http://bit.ly/2HfV9ZS (+)
  1818. http://bit.ly/2HylK3L (+)
  1819. http://bit.ly/2HbjccF (+)
  1820. https://www.dasp.co/
  1821. https://gist.github.com/sirdarckcat/fe8ce94ef25de375d13b7681d851b7b4
  1822. https://pythontips.com/2018/04/15/reverse-engineering-soundcloud-api/
  1823. http://byte-atlas.blogspot.pt/2018/04/apivectors.html
  1824. http://bit.ly/2qL2dCT (+)
  1825. http://bit.ly/2HMh9c9 (+)
  1826. https://ifc0nf1g.xyz/blog/post/pwning-admin-panel-with-recon/
  1827. http://www.duskborn.com/how-to-read-write-llvm-bitcode/
  1828. http://bit.ly/2JbbAU5 (+)
  1829. https://paper.seebug.org/563/
  1830. https://blog.benjojo.co.uk/post/encoding-data-into-dubstep-drops
  1831. https://lightningsecurity.io/blog/linkedin/
  1832. http://bit.ly/2HsCqdK (+)
  1833. http://bit.ly/2vOHq71 (+)
  1834. http://blog.secu.dk/blog/Tunnels_in_a_hard_filtered_network
  1835. https://security.szurek.pl/exploit-bypass-php-escapeshellarg-escapeshellcmd.html
  1836. http://csl.com.co/rid-hijacking/
  1837. http://bit.ly/2KgT5i9 (+)
  1838. https://blog.xpnsec.com/total-meltdown-cve-2018-1038/
  1839. http://touhidshaikh.com/blog/?p=790
  1840. https://arvanaghi.com/blog/reversing-ethereum-smart-contracts/
  1841. http://bit.ly/2JqTRIs (+)
  1842. https://habrahabr.ru/post/272187/
  1843. http://blogs.360.cn/blog/how-to-kill-a-firefox-en/
  1844. http://bit.ly/2HQEpYV (+)
  1845. https://w00tsec.blogspot.pt/2018/04/abusing-mysql-local-infile-to-read.html
  1846. http://bit.ly/2vRctiE (+)
  1847. http://lab.onsec.ru/2014/06/xxe-oob-exploitation-at-java-17.html
  1848. http://blog.rop.io/http-cache-poisoning-explained.html
  1849. http://www.freebuf.com/articles/terminal/36503.html
  1850. https://www.duosecurity.com/blog/duo-security-researchers-uncover-bypass-of-paypal-s-two-factor-authentication
  1851. https://gist.github.com/willurd/5720255
  1852. http://www.sploitmonkey.com/2014/06/introducing-pyhashcat.html
  1853. http://sourceforge.net/projects/zeppoo/
  1854. https://examplecode.github.io/tools/2014/06/20/the-tools-prevent-dns-cache-pollution/
  1855. http://blog.crackpassword.com/2014/06/breaking-into-icloud-no-password-required/
  1856. http://www.labofapenetrationtester.com/2014/06/hacking-jenkins-servers.html
  1857. http://www.harmj0y.net/blog/
  1858. http://hashcrack.org/index.html#190614
  1859. http://yurichev.com/RE-book.html
  1860. https://medium.com/@oleavr/build-a-debugger-in-5-minutes-1-5-51dce98c3544
  1861. https://www.technovelty.org/linux/what-actually-happens-when-you-plug-in-a-usb-device.html
  1862. https://dicesoft.net/projects/wildcard-code-execution-exploit.htm
  1863. https://eligrey.com/blog/google-inbox-spoofing-vulnerability/
  1864. http://bit.ly/2Ib7xua (+)
  1865. http://bit.ly/2rjGMcf (+)
  1866. http://bit.ly/2rjC1zr (+)
  1867. https://erpscan.com/press-center/blog/oracle-ebs-penetration-testing-tool/
  1868. https://www.exploit-db.com/exploits/44553/
  1869. https://telekomsecurity.github.io/2018/04/trovebox-vulnerabilities.html
  1870. https://keenlab.tencent.com/en/2018/04/23/A-bunch-of-Red-Pills-VMware-Escapes/
  1871. https://www.computest.nl/wp-content/uploads/2018/04/connected-car-rapport.pdf
  1872. http://bit.ly/2jqx9oP (+)
  1873. http://www.danielbohannon.com/blog-1/2018/3/19/test-your-dfir-tools-sysmon-edition
  1874. http://bit.ly/2HNPhHA (+)
  1875. https://insert-script.blogspot.pt/2018/05/adobe-reader-pdf-client-side-request.html
  1876. http://blog.nsfocus.net/cve-2018-6574/
  1877. https://0x00rick.com/research/2018/04/20/afl_intro.html
  1878. http://bit.ly/2jt5eVl (+)
  1879. https://www.atredis.com/blog/cylance-privilege-escalation-vulnerability
  1880. http://hanno-rein.de/archives/349
  1881. https://blog.benjojo.co.uk/post/tls-https-server-from-a-yubikey
  1882. https://charles.dardaman.com/js_coinhive_in_excel
  1883. http://blog.mindedsecurity.com/2018/04/dom-based-cross-site-scripting-in.html
  1884. http://bit.ly/2rzhJCi (+)
  1885. https://michael-eder.net/post/2018/native_rdp_pass_the_hash/
  1886. https://goo.gl/JyAG1p (+)
  1887. https://xiaodaozhi.com/exploit/117.html
  1888. http://blog.redactedsec.net/exploits/2018/04/26/nagios.html
  1889. http://bit.ly/2rwqr5c (+)
  1890. https://diablohorn.com/2018/02/04/identify-a-whitelisted-ip-address/
  1891. https://medium.com/101-writeups/hacking-json-web-token-jwt-233fe6c862e6
  1892. http://bit.ly/2wuN0Mn (+)
  1893. http://sploit3r.xyz/cve-2017-13284-injection-in-configuration-file/
  1894. https://medium.com/@vysec.private/domain-fronting-who-am-i-3c982ccd52e6
  1895. http://everdox.net/popss.pdf
  1896. https://gdprchecklist.io/
  1897. http://bit.ly/2KdA5k3 (+)
  1898. https://momo5502.com/blog/?p=34
  1899. http://bit.ly/2rNr5LC (+)
  1900. http://bit.ly/2rKklhB (+)
  1901. https://ivrodriguez.com/reverse-engineer-ios-apps-ios-11-edition-part1/
  1902. https://blog.ensilo.com/ctrl-inject
  1903. http://bit.ly/2KuMPCX (+)
  1904. http://bit.ly/2Iofw7L (+)
  1905. https://gdelugre.github.io/2018/05/10/3gpp-ota-security-evolution/
  1906. https://systemoverlord.com/2018/04/16/the-iot-hackers-toolkit.html
  1907. https://musings.konundrum.org/2018/05/03/debugging-windows-services.html
  1908. https://0xpatrik.com/asset-discovery/
  1909. http://bit.ly/2Kyi5AT (+)
  1910. http://www.insomniacsecurity.com/2018/05/09/boblobblob.html
  1911. https://neonsea.uk/blog/2018/04/15/pwn910nd.html
  1912. https://efail.de/
  1913. http://ryan.govost.es/2018/03/27/sakuracam.html
  1914. https://try.mydatarequest.com/
  1915. https://hackerone.com/reports/341876
  1916. https://sites.google.com/site/testsitehacking/-36k-google-app-engine-rce
  1917. http://newosxbook.com/tools/jtool.html
  1918. https://x1m.nl/posts/laravel-xss-vuln/
  1919. https://jaiverma.github.io/blog/ios-game-hacking
  1920. http://bit.ly/2KT59WD (+)
  1921. http://deniable.org/reversing/symbolic-execution
  1922. http://bit.ly/2GMLZ1V (+)
  1923. https://blog.jli.host/posts/cloudflare-scrape-shield/
  1924. https://security.szurek.pl/gitbucket-unauthenticated-rce.html
  1925. https://medium.com/@canavaroxum/xxe-on-windows-system-then-what-76d571d66745
  1926. http://bit.ly/2s4NrHM (+)
  1927. http://www.harmj0y.net/blog/powershell/command-and-control-using-active-directory/
  1928. https://blog.benjojo.co.uk/post/bgp-battleships
  1929. http://www.computerhistory.org/atchm/adobe-photoshop-source-code/
  1930. https://www.robertxiao.ca/hacking/locationsmart/
  1931. https://hackerone.com/reports/85624
  1932. https://poc-server.com/blog/2018/05/22/rce-by-uploading-a-web-config/
  1933. http://www.orionforensics.com/w_en_page/USB_forensic_tracker.php
  1934. http://bit.ly/2J4uc8r (+)
  1935. https://andresriancho.com/recaptcha-bypass-via-http-parameter-pollution/
  1936. https://justi.cz/security/2018/05/23/cdn-tar-oops.html
  1937. http://bit.ly/2kGAXmA (+)
  1938. http://blogs.360.cn/blog/eos-node-remote-code-execution-vulnerability/
  1939. https://rhinosecuritylabs.com/aws/amazon-aws-misconfiguration-amazon-go/
  1940. https://embedi.com/blog/dji-spark-hijacking/
  1941. https://silviavali.github.io/Electron/only_an_electron_away_from_code_execution
  1942. https://blog.doyensec.com/2018/05/17/graphql-security-overview.html
  1943. http://bit.ly/2xwjIgR (+)
  1944. http://devalias.net/devalias/2018/05/13/usb-reverse-engineering-down-the-rabbit-hole/
  1945. https://gdprhallofshame.com/
  1946. https://resinos.io/
  1947. http://www.maizure.org/projects/printf/index.html
  1948. http://bit.ly/2Lv2eUp (+)
  1949. https://blog.innerht.ml/internet-explorer-has-a-url-problem/#rpoingooglefusiontable
  1950. https://hackertarget.com/tcpdump-examples/
  1951. http://bit.ly/2HrpwYT (+)
  1952. https://staaldraad.github.io/post/2018-06-03-cve-2018-11235-git-rce/
  1953. https://blahcat.github.io/2018/03/11/fuzzing-arbitrary-functions-in-elf-binaries/
  1954. https://www.serializing.me/2018/06/03/rooting-the-technicolor-7210/
  1955. http://bit.ly/2JzKqtY (+)
  1956. http://gosecure.net/2018/05/15/beware-of-the-magic-spell-part-1-cve-2018-1273/
  1957. https://ownyourbits.com/2018/05/23/the-real-power-of-linux-executables/
  1958. https://blogs.securiteam.com/index.php/archives/3689
  1959. https://nytrosecurity.com/2018/05/30/understanding-java-deserialization/
  1960. https://nbulischeck.io/posts/misusing-debugfs-for-in-memory-rce
  1961. http://bigric3.blogspot.pt/2018/05/cve-2018-8120-analysis-and-exploit.html
  1962. https://eklitzke.org/lobotomizing-gnome
  1963. https://wtfutil.com
  1964. http://bit.ly/2JFjwl2 (+)
  1965. https://www.bishopfox.com/blog/2018/06/server-side-spreadsheet-injections/
  1966. http://rift.stacktitan.com/debug-survival-the-compiled-dll/
  1967. https://gist.github.com/ricardojba/ecdfe30dadbdab6c514a530bc5d51ef6
  1968. http://bit.ly/2JT6dNe (+)
  1969. https://blog.umangis.me/persistent-r-w-on-ios-11-2-6/
  1970. https://wojciechregula.blog/your-encrypted-photos-in-macos-cache/
  1971. https://blog.ret2.io/2018/06/05/pwn2own-2018-exploit-development/
  1972. https://blog.ripstech.com/2018/moodle-remote-code-execution/
  1973. https://intoli.com/blog/not-possible-to-block-chrome-headless/
  1974. http://bit.ly/2JOjXp8 (+)
  1975. https://neopg.io/blog/enigmail-signature-spoof/
  1976. https://blog.spaceduck.io/siaberry-1/
  1977. http://bit.ly/2JQFTTP (+)
  1978. http://bit.ly/2JAq4l3 (+)
  1979. https://undercurrents.io/
  1980. https://bernsteinbear.com/blog/how-to-mess-with-your-roommate/
  1981. https://jamchamb.github.io/2018/06/09/animal-crossing-developer-mode.html
  1982. https://sekurak.pl/xss-w-google-colaboratory-obejscie-content-security-policy/
  1983. http://bit.ly/2yFRocH (+)
  1984. http://10degres.net/testing-flash-swf/
  1985. https://codewhitesec.blogspot.com/2018/06/cve-2018-0624.html
  1986. https://www.sxcurity.pro/advanced-cors-techniques/
  1987. https://medium.com/secjuice/waf-evasion-techniques-718026d693d8
  1988. https://payatu.com/guide-linux-privilege-escalation/
  1989. https://blog.sigmaprime.io/solidity-security.html
  1990. https://blog.vulnspy.com/2018/06/21/phpMyAdmin-4-8-x-Authorited-CLI-to-RCE/
  1991. http://bit.ly/2MJqvHL (+)
  1992. http://bit.ly/2tgPERM (+)
  1993. https://www.tarlogic.com/en/blog/red-team-tales-0x01/
  1994. https://www.sec-1.com/blog/2017/office365-activesync-username-enumeration
  1995. http://bit.ly/2KacLqQ (+)
  1996. http://bit.ly/2MxC5V9 (+)
  1997. https://finnwea.com/blog/stealing-passwords-from-mcdonalds-users/
  1998. https://blog.bentkowski.info/2018/06/setting-arbitrary-request-headers-in.html
  1999. https://0xpatrik.com/subdomain-takeover-starbucks/
  2000. http://mattwarren.org/2018/06/15/Tools-for-Exploring-.NET-Internals/
  2001. https://blog.netspi.com/databases-and-clouds-sql-server-as-a-c2/
  2002. http://agarri.fr/docs/ipobf.py
  2003. http://bit.ly/2KgbW0I (+)
  2004. http://bit.ly/2yyota8 (+)
  2005. http://bit.ly/2N7QCrJ (+)
  2006. https://latacora.singles/2018/06/21/loud-subshells.html
  2007. https://www.codewatch.org/blog/?p=453
  2008. http://bit.ly/2tCi7BH (+)
  2009. https://alephsecurity.com/2018/06/26/spectre-browser-query-cache/
  2010. http://bit.ly/2KhAN4f (+)
  2011. https://stek29.rocks/2018/06/26/nvram.html
  2012. https://modexp.wordpress.com/2018/06/08/stop-event-logger/
  2013. https://medium.com/0xcc/bypass-macos-rootless-by-sandboxing-5e24cca744be
  2014. https://srcincite.io/blog/2018/05/21/adobe-me-and-a-double-free.html
  2015. http://bit.ly/2Kup8ec (+)
  2016. http://bit.ly/2KQdVoE (+)
  2017. http://bit.ly/2tXqWX4 (+)
  2018. https://gitlab.com/0x4ndr3/blog/tree/master/JSgen
  2019. https://hansesecure.de/backdooring-pe-file-with-aslr/
  2020. https://alter-attack.net/
  2021. https://lucasg.github.io/2017/06/07/listing-known-dlls/
  2022. http://bit.ly/2tXrs7s (+)
  2023. http://bit.ly/2tYVsjf (+)
  2024. https://www.wst.space/ssl-part1-ciphersuite-hashing-encryption/
  2025. https://www.jeremydaly.com/event-injection-a-new-serverless-attack-vector/
  2026. http://nullprogram.com/blog/2018/06/23/
  2027. https://www.shelliscoming.com/2018/06/windows-reuse-shellcode-based-on.html
  2028. http://bit.ly/2zd0Ap7 (+)
  2029. https://rampageattack.com/
  2030. https://landlock.io/
  2031. http://bit.ly/2tKjNs3 (+)
  2032. http://natashenka.ca/reversing-my-tamagotchi-forever-evolution/
  2033. http://bit.ly/2zd35I1 (+)
  2034. http://blog.securitymouse.com/2014/06/raising-lazarus-20-year-old-bug-that.html
  2035. http://blog.h3xstream.com/2014/06/identifying-xml-external-entity.html
  2036. http://kos.io/outlook/
  2037. http://blog.sucuri.net/2014/06/anatomy-of-a-remote-code-execution-bug-on-disqus.html
  2038. http://blog.nullmode.com/blog/2014/06/28/getting-personal-with-powershell/
  2039. https://toastedcornflakes.github.io/blog/2014/06/28/static-analysis-of-cysca-2014-portknock-using-hopper-disassembler/
  2040. http://www.mafiasecurity..com/install-guides/step-by-step-penetration-test/
  2041. https://bitquark.co.uk/blog/2013/07/23/the_unexpected_dangers_of_preg_replace
  2042. http://www.hackwhackandsmack.com/?p=315
  2043. http://developers.mobage.jp/blog/2014/7/3/jsonsql-injection
  2044. http://moyix.blogspot.co.uk/2014/07/breaking-spotify-drm-with-panda.html
  2045. http://cfenollosa.com/misc/tricks.txt
  2046. http://bit.ly/2L1rTYd (+)
  2047. http://bit.ly/2JgS3RR (+)
  2048. https://x-c3ll.github.io/posts/Frida-Pwn-Adventure-3/
  2049. http://bit.ly/2N7w8P8 (+)
  2050. http://bit.ly/2mfSKBI (+)
  2051. https://www.forcepoint.com/blog/security-labs/analyzing-webassembly-binaries
  2052. https://dyn.com/blog/shutting-down-the-bgp-hijack-factory/
  2053. http://bit.ly/2mfL1mZ (+)
  2054. https://rootkits.xyz/blog/2017/06/kernel-setting-up/
  2055. https://blog.netspi.com/bypass-sql-logon-triggers/
  2056. https://0xpatrik.com/phishing-domains/
  2057. https://objective-see.com/blog/blog_0x34.html
  2058. http://bazad.github.io/2018/07/xpc-string-leak/
  2059. https://www.fastly.com/blog/hijacking-control-flow-webassembly-program
  2060. http://bit.ly/2KQK83a (+)
  2061. https://nahamsec.com/chaining-multiple-vulnerabilities-to-gain-admin-access/
  2062. http://craftinginterpreters.com/
  2063. http://bit.ly/2NLEwF3 (+)
  2064. http://bit.ly/2uC7Yp4 (+)
  2065. https://haiderm.com/how-i-was-able-to-delete-13k-microsoft-translator-projects/
  2066. https://scund00r.com/all/rfid/tutorial/2018/07/12/rfid-theif-v2.html
  2067. https://www.anitian.com/blog/owning-saml/
  2068. http://bit.ly/2LtgXPX (+)
  2069. https://www.endgame.com/blog/technical-blog/hunting-memory-net-attacks
  2070. https://posts.specterops.io/shelling-apache-felix-with-java-bundles-2450d3a099a
  2071. http://bit.ly/2O21CYc (+)
  2072. http://www.mohamedharon.com/2018/01/practical-jsonp-injection.html
  2073. https://nytrosecurity.com/2018/02/26/hooking-chromes-ssl-functions/
  2074. http://bit.ly/2LxaXFU (+)
  2075. https://www.peckshield.com/2018/07/12/tradeRifle/
  2076. http://bit.ly/2O5x7k2 (+)
  2077. https://www.ambionics.io/blog/prestashop-privilege-escalation
  2078. https://j00ru.vexillium.org/2018/07/exploiting-a-windows-10-pagedpool-off-by-one/
  2079. https://jamie.build/how-to-build-an-npm-worm
  2080. https://iandouglasscott.com/2018/07/04/canon-dslr-bluetooth-remote-protocol/
  2081. https://medium.com/@d0nut/exfiltration-via-css-injection-4e999f63097d
  2082. http://bit.ly/2mL4nAZ (+)
  2083. https://opnsec.com/2018/07/into-the-borg-ssrf-inside-google-production-network/
  2084. http://bit.ly/2OgSvmB (+)
  2085. https://hackerone.com/reports/334488
  2086. http://bit.ly/2LDtSSN (+)
  2087. http://blog.sevagas.com/?Advanced-USB-key-phishing
  2088. http://deniable.org/reversing/binary-instrumentation
  2089. https://blog.jse.li/posts/marveloptics-malware/
  2090. https://medium.com/@jonathanbouman/persistent-xss-at-ah-nl-198fe7b4c781
  2091. https://codecat.nl/2018/05/reverse-engineering-and-exploiting-a-game-trainer/
  2092. http://bit.ly/2LqhndN (+)
  2093. https://blog.doyensec.com/2018/07/19/instrumenting-electron-app.html
  2094. https://arp242.net/weblog/yaml_probably_not_so_great_after_all.html
  2095. http://obtruse.syfrtext.com/2018/07/oracle-privilege-escalation-via.html
  2096. https://modexp.wordpress.com/2018/07/12/process-injection-writing-payload/
  2097. https://neonsea.uk/blog/2018/07/21/tmp-to-rce.html
  2098. http://asintsov.blogspot.com/2018/07/cisco-webex-teams-remote-code-execution.html
  2099. https://manpages.bsd.lv/history.html
  2100. http://wouter.coekaerts.be/2018/java-type-system-broken
  2101. https://blog.bentkowski.info/2018/07/vulnerability-in-hangouts-chat-aka-how.html
  2102. https://medium.com/@tomnomnom/crlf-injection-into-phps-curl-options-e2e0d7cfe545
  2103. http://bit.ly/2AGDeZs (+)
  2104. https://gitlab.com/expliot_framework/expliot
  2105. http://bit.ly/2JUBHU1 (+)
  2106. https://asaf.me/2018/07/23/attacking-the-attackers/
  2107. http://bit.ly/2KmNOV4 (+)
  2108. http://bit.ly/2MdGmxp (+)
  2109. https://medium.com/@Wflki/exploiting-electron-rce-in-exodus-wallet-d9e6db13c374
  2110. http://liberty-shell.com/sec/2018/07/28/netshlep/
  2111. http://bit.ly/2AAIPAE (+)
  2112. http://bit.ly/2OEFCmE (+)
  2113. https://movaxbx.ru/2018/07/16/bypass-data-execution-protection-dep/
  2114. https://blog.xpnsec.com/hevd-null-pointer/
  2115. http://bit.ly/2v9IbFk (+)
  2116. https://ntcore.com/?p=488
  2117. https://brewpress.beer/
  2118. https://hackerone.com/reports/260697
  2119. http://bit.ly/2vvsgBc (+)
  2120. http://10degres.net/colorize-your-hunt/
  2121. https://medium.com/@adam.toscher/new-attack-on-wpa-wpa2-using-pmkid-96c3119f7f99
  2122. https://labs.mwrinfosecurity.com/blog/repacking-and-resigning-ios-applications/
  2123. http://bit.ly/2vyB2NU (+)
  2124. http://bit.ly/2OWNkbW (+)
  2125. https://tpx.mx/blog/2018/google-pay-replay-attack.html
  2126. http://bit.ly/2AYffFu (+)
  2127. https://noncombatant.org/application-principals/
  2128. https://edoverflow.com/2018/logic-flaws-in-wot-services
  2129. https://grimhacker.com/2018/03/09/just-a-printer/
  2130. https://neonsea.uk/blog/2018/08/01/hikvision-keygen.html
  2131. http://bit.ly/2OWtGwK (+)
  2132. https://vztekoverflow.com/2018/07/31/tbal-dpapi-backdoor/
  2133. https://manishearth.github.io/blog/2018/02/15/picking-apart-the-crashing-ios-string/
  2134. http://blogs.360.cn/blog/eos-asset-multiplication-integer-overflow-vulnerability/
  2135. https://regexcrossword.com/
  2136. https://www.masswerk.at/nowgobang/2018/anatomy-of-an-rng
  2137. http://matthewearl.github.io/2018/06/28/smb-level-extractor/
  2138. https://portswigger.net/blog/practical-web-cache-poisoning
  2139. http://blog.orange.tw/2018/08/how-i-chained-4-bugs-features-into-rce-on-amazon.html
  2140. http://bit.ly/2MkBTgE (+)
  2141. https://ohpe.github.io/juicy-potato/
  2142. http://www.pwncode.club/2018/08/macro-used-to-spoof-parent-process.html
  2143. https://cofense.com/abusing-microsoft-windows-utilities-deliver-malware-fun-profit/
  2144. https://blog.fox-it.com/2018/08/14/phishing-ask-and-ye-shall-receive/
  2145. http://bit.ly/2MpV8of (+)
  2146. https://hackerone.com/reports/386807
  2147. https://blog.trailofbits.com/2018/08/14/fault-analysis-on-rsa-signing/
  2148. http://bit.ly/2Mhs0QG (+)
  2149. http://bit.ly/2Mx7cnB (+)
  2150. https://rayanfam.com/topics/inside-windows-page-frame-number-part1/
  2151. https://pequalsnp-team.github.io/writeups/analisys_telegram_passport
  2152. https://foreshadowattack.eu
  2153. https://bohops.com/2018/08/04/capturing-netntlm-hashes-with-office-dot-xml-documents/
  2154. http://bit.ly/2KYQngG (+)
  2155. http://bit.ly/2Mg11oJ (+)
  2156. https://shkspr.mobi/blog/2018/08/twitters-secret-guest-mode/
  2157. https://jumpespjump.blogspot.com/2018/08/how-to-build-burner-device-for-def-con.html
  2158. https://ninja.style/post/bcard/
  2159. https://hackerone.com/reports/395296
  2160. https://www.blackhillsinfosec.com/how-to-hack-websockets-and-socket-io/
  2161. https://ntdiff.github.io/
  2162. http://www.kvakil.me/posts/ropchain/
  2163. https://hackerone.com/reports/126522
  2164. http://bit.ly/2NeGNs1 (+)
  2165. http://bit.ly/2wgLB8Q (+)
  2166. https://codewhitesec.blogspot.pt/2018/01/handcrafted-gadgets.html
  2167. https://blogs.securiteam.com/index.php/archives/3736
  2168. http://bit.ly/2w67bOb (+)
  2169. https://shkspr.mobi/blog/2018/01/mailchimp-leaks-your-email-address/
  2170. https://lgtm.com/blog/apache_struts_CVE-2018-11776
  2171. http://bit.ly/2PtttS5 (+)
  2172. http://bit.ly/2BzZKDO (+)
  2173. https://uselesscsp.com/
  2174. http://www.deaddialect.com/articles/2018/8/17/badge-story
  2175. https://hawkinsecurity.com/2018/08/27/traversing-the-path-to-rce/
  2176. https://blog.scrt.ch/2018/08/24/remote-code-execution-on-a-facebook-server/
  2177. https://www.powershellgallery.com/packages/InjectionHunter/1.0.0
  2178. https://hackerone.com/reports/401136
  2179. https://laconicwolf.com/2018/04/13/burp-extension-python-tutorial/
  2180. https://hunter2.gitbook.io/darthsidious/privilege-escalation/alpc-bug-0day
  2181. https://gist.github.com/PaulSec/26251d56134c7fedb2176f2290202546
  2182. https://gist.github.com/williballenthin/1c2bc539041ee3bea7a4c7129072a9ac
  2183. http://bit.ly/2MCbMBL (+)
  2184. https://mike-n1.github.io/Unusual_XSS
  2185. https://objective-see.com/blog/blog_0x36.html
  2186. http://bit.ly/2o0Mm27 (+)
  2187. https://www.voidsecurity.in/2018/08/from-compiler-optimization-to-code.html
  2188. http://bit.ly/2o9oTvT (+)
  2189. https://landgrey.me/struts2-045-debugging/
  2190. https://payatu.com/redteaming-from-zero-to-one-part-1/
  2191. https://b2dfir.blogspot.com/2016/10/touch-screen-lexicon-forensics.html
  2192. https://lowleveldesign.org/2018/08/15/randomness-in-net/
  2193. https://mattwarren.org/2018/08/28/Fuzzing-the-.NET-JIT-Compiler/
  2194. https://www.contrastsecurity.com/security-influencers/cve-2018-15685
  2195. https://bitmidi.com/
  2196. http://bit.ly/2MQEqzs (+)
  2197. https://philippeharewood.com/view-private-instagram-photos/
  2198. https://blog.reigningshells.com/2018/09/hacking-rpi-cam-web-interface.html
  2199. https://bneg.io/2018/01/15/iterm2-customizations-for-hackers/
  2200. https://medium.com/@hakluke/haklukes-guide-to-hacking-without-metasploit-1bbbe3d14f90
  2201. https://hackerone.com/reports/363971
  2202. http://openwall.com/lists/oss-security/2018/05/17/1
  2203. https://engineering.riotgames.com/news/riots-approach-anti-cheat
  2204. https://dangokyo.me/2018/08/26/analysis-on-cve-2017-3000/
  2205. https://phoenhex.re/2018-08-26/csgo-fuzzing-bsp
  2206. https://justi.cz/security/2018/08/28/packagist-org-rce.html
  2207. https://insecure.design/
  2208. http://bit.ly/2oKrYTd (+)
  2209. http://hatriot.github.io/blog/2018/08/22/dell-digital-delivery-eop/
  2210. http://bit.ly/2MQSeK5 (+)
  2211. http://williamshowalter.com/a-universal-windows-bootkit/
  2212. http://bit.ly/2MTheQP (+)
  2213. http://bit.ly/2M2eX0C (+)
  2214. https://rya.nc/bitfi-wallet.html
  2215. https://medium.com/@elkentaro/nothing-to-see-here-the-not-so-charger-62a51e3aab22
  2216. https://hackerone.com/reports/317476
  2217. https://ash-king.co.uk/facebook-bug-bounty-09-18.html
  2218. http://bit.ly/2CS01CN (+)
  2219. https://gitlab.com/technotame/cookie-decrypter
  2220. http://exceptionlevelone.blogspot.pt/2018/02/creating-your-own-ios-1112-jailbreak.html
  2221. https://gist.github.com/maldevel/1d46329e00ab0c076150ddbce90d94cd
  2222. https://quentinkaiser.be/pentesting/2018/09/07/node-red-rce/
  2223. https://www.rfk.id.au/blog/entry/security-bugs-ssrf-via-request-splitting/
  2224. http://reversing.io/posts/introducing-finch/
  2225. https://blogs.projectmoon.pw/2018/08/17/Edge-InlineArrayPush-Remote-Code-Execution/
  2226. http://bit.ly/2xaQu4q (+)
  2227. https://adapt-and-attack.com/2017/11/15/keying-payloads-for-scripting-languages/
  2228. https://gracefulbits.com/2018/07/26/system-call-dispatching-for-windows-on-arm64/
  2229. https://versprite.com/blog/json-deserialization-memory-corruption-vulnerabilities/
  2230. http://bit.ly/2NcA6dG (+)
  2231. https://siguza.github.io/KTRR/
  2232. http://bit.ly/2p3wcpa (+)
  2233. https://int0xcc.svbtle.com/using-concolic-execution-for-static-analysis-of-malware
  2234. https://www.michaelfogleman.com/rush/
  2235. http://nandgame.com/
  2236. http://w00tsec.blogspot.pt/2014/07/foxit-pdf-reader-stored-xss.html
  2237. https://www.sektioneins.de/en/blog/14-07-04-phpinfo-infoleak.html
  2238. http://words.zemn.me/csp
  2239. http://stephensclafani.com/2014/07/08/hacking-facebooks-legacy-api-part-1-making-calls-on-behalf-of-any-user/
  2240. http://www.shelliscoming.com/2014/07/ip-knock-shellcode-spoofed-ip-as.html
  2241. http://www.hackwhackandsmack.com/?p=345
  2242. http://blog.cyberis.co.uk/2013/08/egresser-enumerate-outbound-firewall.html
  2243. https://twindb.com/recover-innodb-table-after-drop-table-innodb/
  2244. http://miki.it/blog/2014/7/8/abusing-jsonp-with-rosetta-flash/
  2245. http://vamsoft.com/downloads/articles/vamsoft-headless-browsers-in-forum-spam.pdf
  2246. http://bogus.jp/wp/?p=1687
  2247. https://community.rapid7.com/community/metasploit/blog/2014/07/07/virtualbox-filename-command-execution-via-gksu
  2248. http://www.acunetix.com/blog/web-security-zone/block-automated-scanners/
  2249. https://community.qualys.com/blogs/securitylabs/2014/02/27/mediawiki-djvu-and-pdf-file-upload-remote-code-execution-vulnerability-cve-2014-1610
  2250. https://gist.github.com/danielrehn/d2e6f2129e5f853c3166
  2251. https://medium.com/@manicho/7af5d5f28038
  2252. https://justi.cz/security/2018/09/13/alpine-apk-rce.html
  2253. https://hackerone.com/reports/408583
  2254. https://medium.com/@jonathanbouman/local-file-inclusion-at-ikea-com-e695ed64d82f
  2255. https://cornerpirate.com/2018/07/24/grep-extractor-a-burp-extender/
  2256. https://gamozolabs.github.io/fuzzing/2018/09/16/scaling_afl.html
  2257. http://bit.ly/2NWlZcd (+)
  2258. https://blog.thomasorlita.cz/vulns/google-csp-evaluator/
  2259. https://rastamouse.me/2017/08/jumping-network-segregation-with-rdp/
  2260. https://uncoder.io/
  2261. https://medium.com/@vishwaraj101/ocr-to-xss-42720d85f7fa
  2262. http://bit.ly/2OHA7mD (+)
  2263. http://blog.nsfocus.net/cve-2018-804-analysis/
  2264. https://www.contextis.com/blog/wap-just-happened-my-samsung-galaxy
  2265. http://bit.ly/2NZYf78 (+)
  2266. http://bit.ly/2poFVXa (+)
  2267. https://blog.cylance.com/cracking-ransomware
  2268. https://rastating.github.io/creating-a-custom-shellcode-encoder/
  2269. https://rhinosecuritylabs.com/aws/aws-privilege-escalation-methods-mitigation/
  2270. http://bit.ly/2wiFctW (+)
  2271. https://oddvar.moe/2018/09/06/persistence-using-universal-windows-platform-apps-appx/
  2272. http://rinseandrepeatanalysis.blogspot.com/2018/09/dde-downloaders-excel-abuse-and.html
  2273. http://tonsky.me/blog/disenchantment/
  2274. https://lcq2.github.io/x86_iphone/
  2275. http://bit.ly/2NMLnC0 (+)
  2276. https://medium.com/@jonathanbouman/reflected-xss-at-philips-com-e48bf8f9cd3c
  2277. http://bit.ly/2Qf34Ha (+)
  2278. https://www.n00py.io/2018/08/bypassing-duo-two-factor-authentication-fail-open/
  2279. https://astr0baby.wordpress.com/2018/09/08/understanding-how-dll-hijacking-works/
  2280. https://blog.secarma.co.uk/labs/hacking-with-git-git-enum-metasploit-module-release
  2281. https://blog.benjojo.co.uk/post/qemu-monitor-socket-rce-vnc
  2282. https://www.hackerone.com/blog/Guide-Subdomain-Takeovers
  2283. http://krystalgamer.me/spidey-breaking/
  2284. https://cyseclabs.com/blog/linux-kernel-heap-spray
  2285. http://bit.ly/2N6yWM5 (+)
  2286. http://www.s3.eurecom.fr/projects/modern-android-phishing/
  2287. http://bit.ly/2R3ohVC (+)
  2288. http://bit.ly/2xGnLEO (+)
  2289. https://medium.com/tenable-techblog/advantech-webaccess-unpatched-rce-ffe9f37f8b83
  2290. http://bit.ly/2xUAdQT (+)
  2291. https://tunnelshade.in/blog/2018/09/hongfuzz-intel-pt-instrumentation/
  2292. https://truepolyglot.hackade.org/
  2293. https://safekeepcybersecurity.github.io/posts/2018/09/carhack_urh/
  2294. https://medium.com/@the4rchangel/email-spoofing-with-netcat-telnet-e558e4a10c1
  2295. https://medium.com/@brs.sgdc/google-stored-xss-in-payments-350cd7ba0d1b
  2296. http://bit.ly/2OzZOsx (+)
  2297. https://www.n00py.io/2018/10/popping-shells-on-splunk/
  2298. https://gitlab.com/gitlab-org/gitlab-ce/issues/49133
  2299. https://jacksonvd.com/pwned-passwords-and-ntlm-hashes/
  2300. https://www.x41-dsec.de/lab/blog/fax/
  2301. https://medium.com/@efkan162/how-i-xssed-uber-and-bypassed-csp-9ae52404f4c5
  2302. https://jordanpotti.com/2018/10/03/violating-your-personal-space-with-webex/
  2303. http://bit.ly/2OUsLMP (+)
  2304. http://bit.ly/2DWsXtT (+)
  2305. https://letsencrypt.org/docs/certificates-for-localhost/
  2306. https://blog.lexfo.fr/cve-2017-11176-linux-kernel-exploitation-part1.html
  2307. https://eli.thegreenplace.net/2011/01/23/how-debuggers-work-part-1/
  2308. https://www.gironsec.com/blog/2018/01/expiring-payloads-in-the-metasploit-framework/
  2309. http://ly0n.me/2015/08/01/writing-exploits-with-an-egghunter-part-1/
  2310. https://blog.smartdec.net/smartdec-smart-contract-audit-beginners-guide-d04cc7f1c571
  2311. http://blog.ptsecurity.com/2018/10/intel-me-manufacturing-mode-macbook.html
  2312. https://www.linuxboot.org/
  2313. http://www.lambdashell.com/
  2314. https://blog.sheddow.xyz/css-timing-attack/
  2315. http://www.sec-down.com/wordpress/?p=809
  2316. http://bit.ly/2OQkWuJ (+)
  2317. https://flatkill.org/
  2318. http://bit.ly/2C601gF (+)
  2319. https://geosn0w.github.io/Jailbreaks-Demystified/
  2320. https://www.nc-lp.com/blog/disguise-phar-packages-as-images
  2321. http://bit.ly/2yxlRWY (+)
  2322. http://bit.ly/2NC71nl (+)
  2323. https://prdeving.wordpress.com/2018/09/21/hiding-malware-in-windows-code-injection/
  2324. https://ewilded.blogspot.pt/2018/01/vulnserver-my-kstet-exploit-delivering.html
  2325. http://bit.ly/2C9esjR (+)
  2326. https://alephsecurity.com/2018/01/22/qualcomm-edl-1/
  2327. http://0xeb.net/2018/03/using-z3-with-ida-to-simplify-arithmetic-operations-in-functions/
  2328. http://telegra.ph/
  2329. https://blog.bejarano.io/hardening-macos.html
  2330. http://bit.ly/2EuxUKF (+)
  2331. http://bit.ly/2EttVhF (+)
  2332. https://hackerone.com/reports/405100
  2333. https://digi.ninja/blog/hiding_bash_history.php
  2334. https://hackernoon.com/how-i-hacked-modern-vending-machines-43f4ae8decec
  2335. http://bit.ly/2AhbatG (+)
  2336. https://oddcoder.com/BROP-102/
  2337. http://bit.ly/2J3ItTT (+)
  2338. https://leucosite.com/Microsoft-Edge-RCE/
  2339. https://www.xorrior.com/persistent-credential-theft/
  2340. http://bit.ly/2NNfkgs (+)
  2341. http://bit.ly/2yLKjDY (+)
  2342. https://paper.seebug.org/716/
  2343. https://medium.com/bugbountywriteup/bug-bounty-mail-ru-234fa6f5a5a
  2344. https://outflank.nl/blog/2018/10/12/sylk-xlm-code-execution-on-office-2011-for-mac/
  2345. https://tls.ulfheim.net/
  2346. http://serveo.net/
  2347. https://www.martinvigo.com/googlemeetroulette/
  2348. https://rpadovani.com/facebook-responsible-disclosure
  2349. https://fosterelli.co/privilege-escalation-via-docker.html
  2350. http://bit.ly/2Jig0ti (+)
  2351. https://bugid.skylined.nl/20181017001.html
  2352. https://alephsecurity.com/2018/10/22/StackOverflowException/
  2353. https://mp.weixin.qq.com/s/ebKHjpbQcszAy_vPocW0Sg
  2354. https://blog.skullsecurity.org/2018/technical-rundown-of-webexec
  2355. http://bit.ly/2PlwTsN (+)
  2356. https://liberty-shell.com/sec/2018/10/20/living-off-the-land/
  2357. https://hackerone.com/reports/348076
  2358. https://gamozolabs.github.io/fuzzing/2018/10/18/terrible_android_fuzzer.html
  2359. https://blog.stratumsecurity.com/2018/10/17/route-53-as-a-pentest-infrastructure/
  2360. https://shadowfile.inode.link/blog/2018/10/source-level-debugging-the-xnu-kernel/
  2361. https://ops.tips/blog/how-linux-tcp-introspection/
  2362. https://research.kudelskisecurity.com/2018/10/23/build-your-own-hardware-implant/
  2363. http://bit.ly/2qnqbnO (+)
  2364. http://bit.ly/2QcNf46 (+)
  2365. https://bitrot.sh/post/01-16-2018-password_spraying_adfs_with_burp/
  2366. http://bit.ly/2DjQT9m (+)
  2367. https://acru3l.github.io/2018/10/20/ropping-through-shady-corners/
  2368. https://jerrygamblin.com/2018/10/29/google-home-insecurity/
  2369. https://www.unix-ninja.com/p/attacking_google_authenticator
  2370. https://www.securepatterns.com/2018/10/cve-2018-14665-xorg-x-server.html
  2371. https://blog.quarkslab.com/playing-with-the-windows-notification-facility-wnf.html
  2372. https://sandboxescaper.blogspot.com/2018/10/reversing-alpc-where-are-your-windows.html
  2373. https://rhaidiz.net/2018/10/25/dribble-stealing-wifi-password-via-browsers-cache-poisoning
  2374. https://lgtm.com/blog/apple_xnu_icmp_error_CVE-2018-4407
  2375. http://bit.ly/2zkcxpG (+)
  2376. http://bit.ly/2Jx7RBw (+)
  2377. http://bit.ly/2ETzzKg (+)
  2378. https://mango.pdf.zone/stealing-chrome-cookies-without-a-password
  2379. https://hackerone.com/reports/303730
  2380. https://serializethoughts.com/2018/10/07/bypassing-android-flag_secure-using-frida/
  2381. https://danshumway.com/blog/gamasutra-vulnerabilities/
  2382. https://habr.com/post/429004/
  2383. https://wbenny.github.io/2018/11/04/wow64-internals.html
  2384. https://blog.xpnsec.com/rundll32-your-dotnet/
  2385. http://bit.ly/2QoKsol (+)
  2386. http://bit.ly/2ROJSRt (+)
  2387. https://www.tarlogic.com/en/blog/red-team-tales-0x02-from-sqli-to-domain-admin/
  2388. https://paper.seebug.org/737/
  2389. https://lgtm.com/blog/icecast_snprintf_CVE-2018-18820
  2390. https://poppopret.blogspot.com/2011/09/playing-with-mof-files-on-windows-for.html
  2391. https://marcan.st/2017/12/debugging-an-evil-go-runtime-bug/
  2392. https://apapedulimu.click/clickjacking-on-google-myaccount-worth-7500/
  2393. https://xlab.tencent.com/en/2018/11/13/cve-2018-4277/
  2394. https://medium.com/@mrnikhilsri/oob-xxe-in-prizmdoc-cve-2018-15805-dfb1e474345c
  2395. https://strm.sh/post/abusing-insecure-docker-deployments/
  2396. https://shkspr.mobi/blog/2018/11/domain-hacks-with-unusual-unicode-characters/
  2397. https://blog.xyz.is/2018/enso.html
  2398. https://ibm.co/2FqIXoO (+)
  2399. http://blogs.360.cn/post/VBScript_vul_EN.html
  2400. https://security-bits.de/posts/2018/11/11/exposed_sonos_interface.html
  2401. https://wwws.nightwatchcybersecurity.com/2018/11/11/cve-2018-15835/
  2402. https://www.ixiacom.com/company/blog/trinity-p2p-malware-over-adb
  2403. https://maxkersten.nl/binary-analysis-course/malware-analysis/dot-net-rat/
  2404. https://medium.com/tenable-techblog/uac-bypass-by-mocking-trusted-directories-24a96675f6e
  2405. http://bit.ly/2RWjjtj (+)
  2406. https://medium.com/@mattharr0ey/lateral-movement-using-url-protocol-e6f7d2d6cf2e
  2407. https://twobithistory.org/2018/11/12/cat.html
  2408. http://bit.ly/2DSeKgK (+)
  2409. http://bit.ly/2R6zbcG (+)
  2410. https://out-of-tree.io/
  2411. https://diary.shift-js.info/js-comment-block/
  2412. https://ionize.com.au/multiple-transports-in-a-meterpreter-payload/
  2413. https://www.hahwul.com/2018/11/waf-bypass-xss-payload-only-hangul.html
  2414. https://justi.cz/security/2018/11/14/gvisor-lpe.html
  2415. https://tinyhack.com/2018/11/21/reverse-engineering-pokemon-go-plus/
  2416. https://fireshellsecurity.team/restricted-linux-shell-escaping-techniques/
  2417. http://bit.ly/2zn0f0F (+)
  2418. http://bit.ly/2DCUGy1 (+)
  2419. https://www.elttam.com.au/blog/ruby-deserialization/
  2420. http://bit.ly/2DTokQm (+)
  2421. https://blog.cotten.io/hacking-gmail-with-weird-from-fields-d6494254722f
  2422. https://menschers.com/2018/10/30/what-is-cve-2018-8493/
  2423. https://wojciechregula.blog/your-signal-messages-can-leak-via-locked-screen-on-macos/
  2424. http://signedmalware.org/
  2425. https://nginxconfig.io/
  2426. https://medium.com/@copyconstruct/socat-29453e9fc8a6
  2427. https://vinicius777.github.io/blog/2014/07/14/truecrypt-privilege-escalation/
  2428. http://www.tripwire.com/state-of-security/featured/analysis-for-phpmyadmin-xss-cve-2014-1879/
  2429. http://blog.sucuri.net/2014/07/disclosure-insecure-nonce-generation-in-wptouch.html
  2430. https://home.regit.org/2014/06/pshitt-collect-passwords-used-in-ssh-bruteforce/
  2431. http://www.commonexploits.com/penetration-testing-scripts/
  2432. http://www.viper.li/
  2433. http://blogs.telerik.com/fiddler/posts/14-07-10/capturing-traffic-via-virtual-router
  2434. https://archive.org/details/OISFOhioInformationSecurityForum2014
  2435. http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Hacking-POS-Terminal-for-Fun-and-Non-profit/ba-p/6540620
  2436. http://www.vulcanproxy.com/
  2437. http://drimel.org/2014/07/14/shellcode-analysis-like-a-semi-pro/
  2438. http://deadliestwebattacks.com/2013/10/21/a-default-base-of-xss/
  2439. https://gcc.gnu.org/bugzilla/show_bug.cgi?id=30475
  2440. http://vimeo.com/4530161
  2441. http://tholman.com/giflinks/
  2442. https://slashcrypto.org/2018/11/28/eBay-source-code-leak/
  2443. https://www.ory.sh/sign-in-with-user-impersonation-oauth2-openid-connect
  2444. https://medium.com/@Bank_Security/undetectable-c-c-reverse-shells-fab4c0ec4f15
  2445. https://medium.com/@petergombos/smb-named-pipe-pivoting-in-meterpreter-462580fd41c5
  2446. https://l.avala.mp/?p=285
  2447. https://saleemrashid.com/2018/11/26/breaking-into-bitbox/
  2448. http://bit.ly/2RnTVNd (+)
  2449. http://bit.ly/2zzlQmu (+)
  2450. https://medium.com/@SweetRollBandit/aws-slurp-github-takeover-f8c80b13e7b5
  2451. https://blog.timac.org/2018/1126-deobfuscated-libmobilegestalt-keys-ios-12/
  2452. http://bit.ly/2rbKlBV (+)
  2453. http://bit.ly/2P8u5v1 (+)
  2454. http://bit.ly/2TPBLWx (+)
  2455. https://gcemetery.co/
  2456. http://bit.ly/2FXmMGS (+)
  2457. https://pwning.re/2018/12/04/github-desktop-rce/
  2458. https://medium.com/@r0t1v/pwning-jboss-seam-2-like-a-boss-da5a43da6998
  2459. https://secrary.com/Random/injectionwithoutinjection/
  2460. https://www.justinoblak.com/2018/12/02/Smashing-AFL.html
  2461. https://dylankatz.com/digging-in-to-scp-command-injection/
  2462. https://blog.intothesymmetry.com/2018/12/billion-laugh-attack-in.html
  2463. http://bit.ly/2zJXw1o (+)
  2464. https://geosn0w.github.io/Debugging-macOS-Kernel-For-Fun/
  2465. https://secureidentity.se/delete-domain-admin-accounts/
  2466. https://salmg.net/2018/12/01/intro-to-nfc-payment-relay-attacks/
  2467. http://bit.ly/2SARmI9 (+)
  2468. https://medium.com/tenable-techblog/remotely-exploiting-zoom-meetings-5a811342ba1d
  2469. https://modexp.wordpress.com/2018/10/30/arm64-assembly/
  2470. https://www.voidsecurity.in/2018/11/virtualbox-nat-dhcpbootp-server.html
  2471. https://gist.github.com/grugq/03167bed45e774551155
  2472. http://bit.ly/2KYmIpj (+)
  2473. https://jamchamb.github.io/2018/12/03/gamecube-memory-card-raspi.html
  2474. https://www.honoki.net/2018/12/from-blind-xxe-to-root-level-file-read-access/
  2475. https://www.betterhacker.com/2018/12/rce-in-hubspot-with-el-injection-in-hubl.html
  2476. https://landgrey.me/influxdb-api-unauthorized-exploit/
  2477. https://ardern.io/2018/12/07/angularjs-bxss/
  2478. https://www.corben.io/XSS-to-XXE-in-Prince/
  2479. http://bit.ly/2RW53kT (+)
  2480. https://medium.com/@SecurityBender/exploiting-a-hql-injection-895f93d06718
  2481. https://cyber.wtf/2018/03/28/dissecting-olympic-destroyer-a-walk-through/
  2482. https://dev.to/antogarand/why-facebooks-api-starts-with-a-for-loop-1eob
  2483. http://bit.ly/2EutRx7 (+)
  2484. https://www.fidusinfosec.com/remote-code-execution-cve-2018-5767/
  2485. https://blog.intothesymmetry.com/2018/12/persistent-xsrf-on-kubernetes-dashboard.html
  2486. https://medium.com/javascript-security/avoiding-xss-in-react-is-still-hard-d2b5c7ad9412
  2487. https://www.cybereason.com/blog/fauxpersky-credstealer-malware-autohotkey-kaspersky-antivirus
  2488. http://fabiensanglard.net/dreamcast_hacking/
  2489. https://www.reaperbugs.com/index
  2490. https://mohemiv.com/all/exploiting-xxe-with-local-dtd-files/
  2491. https://blog.avatao.com/How-I-could-steal-your-photos-from-Google/
  2492. https://hackerone.com/reports/426944
  2493. http://bit.ly/2Rd09mc (+)
  2494. https://medium.com/@jamie.shaw/pass-the-cache-to-domain-compromise-320b6e2ff7da
  2495. https://www.joachim-bauch.de/tutorials/loading-a-dll-from-memory/
  2496. https://blog.cm2.pw/length-restricted-xss/
  2497. http://bit.ly/2Rf4FAG (+)
  2498. https://bnbdr.github.io/posts/swisscheese/
  2499. https://blog.sektor7.net/#!res/2018/pure-in-memory-linux.md
  2500. https://samcurry.net/reading-asp-secrets-for-17000/
  2501. http://bit.ly/2PMOBl7 (+)
  2502. https://bordplate.no/blog/en/post/interactive-rop-tutorial/
  2503. http://bit.ly/2S8mfU9 (+)
  2504. http://blog.digital-forensics.it/2017/04/brush-up-on-dropbox-dbx-decryption.html
  2505. http://bit.ly/2LrTRKk (+)
  2506. https://security.szurek.pl/kallithea-0-3-4-incorrect-access-control-and-xss.html
  2507. https://smallstep.com/blog/everything-pki.html
  2508. https://leucosite.com/WebExtension-Security/
  2509. http://bit.ly/2SmvFf6 (+)
  2510. https://jtnydv.xyz/2018/12/24/basic-xpath-injection/
  2511. https://no1zy.hatenablog.com/entry/static-analysis-of-javascript-for-bughunters
  2512. https://blog.ropnop.com/serverless-toolkit-for-pentesters/
  2513. https://0xrick.github.io/BinaryExploitation-BOF/
  2514. http://bit.ly/2Q7lnNO (+)
  2515. https://blog.cm2.pw/ms-edge-http-access-control-cors-bypass/
  2516. http://bit.ly/2SoL9iP (+)
  2517. https://blog.certfa.com/posts/the-return-of-the-charming-kitten/
  2518. http://bit.ly/2Q8Lzbb (+)
  2519. https://blog.k3170makan.com/2018/11/glibc-heap-exploitation-basics.html
  2520. https://blog.erratasec.com/2018/10/systemd-is-bad-parsing-and-should-feel.html
  2521. https://mksben.l0.cm/2018/05/cve-2018-5175-firefox-csp-strict-dynamic-bypass.html
  2522. https://www.ipify.org/
  2523. https://hackerone.com/reports/397478
  2524. https://abiondo.me/2019/01/02/exploiting-math-expm1-v8/
  2525. http://bit.ly/2Vox9aJ (+)
  2526. https://www.iceswordlab.com/2018/07/25/kdhack/
  2527. http://www.pwn3d.org/posts/7821231-gxpn-prep-2basic-scapy-review
  2528. https://nebelwelt.net/blog/20181231-BOP.html
  2529. http://bit.ly/2Vth6bm (+)
  2530. https://www.davidwong.fr/tls13/
  2531. https://www.lolhax.org/2019/01/02/extracting-keys-f00d-crumbs-raccoon-exploit/
  2532. https://www.imperialviolet.org/2019/01/01/zkattestation.html
  2533. http://bit.ly/A-Long-Evening-With-macOSs-Sandbox (+)
  2534. http://bit.ly/2AvBujp (+)
  2535. https://akijosberryblog.wordpress.com/2019/01/01/malicious-use-of-microsoft-laps/
  2536. https://www.secjuice.com/php-rce-bypass-filters-sanitization-waf/
  2537. https://blog.talosintelligence.com/2018/05/telegrab.html
  2538. http://misbehaving.site/
  2539. https://gamehistory.org/simcity/
  2540. https://hackerone.com/reports/409850
  2541. http://bit.ly/2RoDTqv (+)
  2542. http://bit.ly/2AER4JH (+)
  2543. https://www.roguesecurity.in/2018/12/02/a-guide-for-windows-penetration-testing/
  2544. https://medium.com/bugbountywriteup/ping-power-icmp-tunnel-31e2abb2aaea
  2545. https://wietzebeukema.nl/blog/spoofing-google-search-results
  2546. https://wunderwuzzi23.github.io/blog/passthecookie.html
  2547. https://mn3m.info/posts/suid-vs-capabilities/
  2548. https://niemand.com.ar/2019/01/01/how-to-hook-directx-11-imgui/
  2549. http://bit.ly/2QDF93N (+)
  2550. https://sites.google.com/view/ltefuzz
  2551. https://www.veracode.com/blog/research/exploiting-jndi-injections-java
  2552. https://tyranidslair.blogspot.com/2018/12/abusing-mount-points-over-smb-protocol.html
  2553. https://revers.engineering/syscall-hooking-via-extended-feature-enable-register-efer/
  2554. https://ericchiang.github.io/post/containers-from-scratch/
  2555. https://research.checkpoint.com/hacking-fortnite/
  2556. http://bit.ly/2RVTUDO (+)
  2557. https://0xdf.gitlab.io/2018/11/02/pwk-notes-tunneling.html
  2558. https://default-password.info/
  2559. https://netsec.ws/?p=262
  2560. http://bit.ly/2APgbtm (+)
  2561. http://bit.ly/2FDzxoy (+)
  2562. https://niemand.com.ar/2019/01/13/creating-your-own-wallhack/
  2563. https://scorpiosoftware.net/2019/01/15/fun-with-appcontainers/
  2564. http://bit.ly/2MhbFrV (+)
  2565. https://blogs.cisco.com/security/smb-and-the-return-of-the-worm
  2566. http://bit.ly/2Hig3bq (+)
  2567. https://blog.benpri.me/2019/01/13/why-you-shouldnt-be-using-bcrypt-and-scrypt/
  2568. https://sysdig.com/blog/privilege-escalation-kubernetes-dashboard/
  2569. http://www.greyhathacker.net/?p=1041
  2570. https://dontkillmyapp.com/
  2571. https://devhints.io/
  2572. https://blog.haschek.at/2018/the-curious-case-of-the-RasPi-in-our-network.html
  2573. https://justi.cz/security/2019/01/22/apt-rce.html
  2574. https://medium.com/tenable-techblog/rooting-nagios-via-outdated-libraries-bb79427172
  2575. http://bit.ly/2HuSb4y (+)
  2576. https://medium.com/@int0x33/upload-htaccess-as-image-to-bypass-filters-71dfcf797a86
  2577. https://www.inputzero.io/2019/01/fuzzing-http-servers.html
  2578. https://neonsea.uk/blog/2018/12/26/firewall-includes.html
  2579. http://bit.ly/2UgpUQO (+)
  2580. http://bit.ly/2FZ8hAT (+)
  2581. http://bit.ly/2FMAKdN (+)
  2582. http://bit.ly/2Mudulx (+)
  2583. https://enigma0x3.net/2019/01/21/razer-synapse-3-elevation-of-privilege/
  2584. https://dirkjanm.io/abusing-exchange-one-api-call-away-from-domain-admin/
  2585. https://medium.com/@_mattata/packet-editing-live-connections-with-python-c0ed221dafcd
  2586. https://www.mdsec.co.uk/2019/01/abusing-office-web-add-ins-for-fun-and-limited-profit/
  2587. http://bit.ly/2FMev7U (+)
  2588. https://lgtm.com/blog/ghostscript_typeconfusion
  2589. https://bogner.sh/2019/01/querying-virustotal-from-excel/
  2590. https://www.ezequiel.tech/2019/01/75k-google-cloud-platform-organization.html
  2591. http://bit.ly/2Wxv50A (+)
  2592. https://gist.github.com/sarazasasa/9450d63f96e7ff799824fc98fc7f3b43
  2593. https://egre55.github.io/system-properties-uac-bypass/
  2594. https://gist.github.com/3xocyte/0dc0bd4cb48cc7b4075bdc90a1ccc7d3
  2595. https://insert-script.blogspot.com/2019/01/adobe-reader-pdf-callback-via-xslt.html
  2596. https://engineering.linecorp.com/en/blog/air-go-apk-signing/
  2597. https://www.contextis.com/en/blog/basic-electron-framework-exploitation
  2598. https://lab.wallarm.com/xxe-that-can-bypass-waf-protection-98f679452ce0
  2599. http://bit.ly/2sYgLQY (+)
  2600. https://www.adyta.pt/en/2019/01/29/writeup-samsung-app-store-rce-via-mitm-2/
  2601. https://shenaniganslabs.io/2019/01/28/Wagging-the-Dog.html
  2602. http://bit.ly/2DLSrIl (+)
  2603. https://blog.scrt.ch/2019/01/24/magento-rce-local-file-read-with-low-privilege-admin-rights/
  2604. https://alsid.com/company/news/abusing-s4u2self-another-sneaky-active-directory-persistence
  2605. http://bit.ly/2sYg76j (+)
  2606. https://medium.com/tenable-techblog/reversing-the-rachio3-smart-sprinkler-controller-ae7fc06aab9
  2607. https://evolt.org/node/564
  2608. https://alexhude.github.io/2019/01/24/hacking-leica-m240.html
  2609. http://sethsec.blogspot.gr/2014/07/crossdomain-bing.html
  2610. http://www.skycure.com/blog/malicious-profiles-the-sleeping-giant-of-ios-security/
  2611. https://bitbucket.org/orbit-burg/nfc-emv/wiki/Home
  2612. http://lab.onsec.ru/2014/07/pamsteal-plugin-released.html
  2613. http://shell-storm.org/shellcode/
  2614. http://penturalabs.wordpress.com/2014/07/18/execute-shellcode-bypassing-anti-virus/
  2615. http://igurublog.wordpress.com/downloads/script-sandfox/
  2616. https://archive.today/23mBC
  2617. https://lilithlela.cyberguerrilla.org/?p=6620
  2618. http://www.irongeek.com/i.php?page=videos/bsidescleveland2014/mainlist
  2619. http://hashcrack.org/page?n=21072014
  2620. https://www.netspi.com/blog/entryid/235/stealing-unencrypted-ssh-agent-keys-from-memory
  2621. https://www.pentestgeek.com/2014/07/22/phishing-frenzy-hta-powershell-attacks-with-beef/
  2622. http://bit.ly/2BpGab7 (+)
  2623. http://bit.ly/2UNSyZH (+)
  2624. https://www.shawarkhan.com/2019/01/hijacking-accounts-by-retrieving-jwt.html
  2625. https://gist.github.com/mehaase/63e45c17bdbbd59e8e68d02ec58f4ca2
  2626. http://bit.ly/2MT26jg (+)
  2627. http://bit.ly/2UKEKis (+)
  2628. https://versprite.com/blog/hacking-remote-start-system/
  2629. https://vulnmind.io/i-heard-you-like-eop-to-system/
  2630. https://maskop9.wordpress.com/2019/02/06/analysis-of-jacksbot-backdoor/
  2631. https://doar-e.github.io/blog/2019/01/28/introduction-to-turbofan/
  2632. https://acru3l.github.io/2019/02/02/exploiting-mb-anti-exploit/
  2633. https://medium.com/@mattharr0ey/round-of-use-winrm-code-execution-xml-6e3219d3e31
  2634. http://bit.ly/2MTPDfh (+)
  2635. http://bit.ly/2MUUJrx (+)
  2636. https://blog.benjojo.co.uk/post/eve-online-bgp-internet
  2637. https://outpost24.com/blog/X-forwarded-for-SQL-injection
  2638. https://ysamm.com/?p=185
  2639. http://bit.ly/2SyIqaE (+)
  2640. https://gist.github.com/adamyordan/96da0ad5e72cbc97285f2df340cac43b
  2641. https://plainsec.org/how-to-bypass-instagram-ssl-pinning-on-android-v78/
  2642. http://bit.ly/2TQYTmW (+)
  2643. https://shenaniganslabs.io/2019/02/13/Dirty-Sock.html
  2644. http://bit.ly/2BCPZSX (+)
  2645. https://perception-point.io/resources/research/cve-2019-0539-root-cause-analysis/
  2646. https://medium.com/@x41x41x41/unauthenticated-ssrf-in-oracle-ebs-765bd789a145
  2647. https://offensi.com/2019/01/31/lfi-in-apigee-portals/
  2648. https://medium.com/tenable-techblog/make-it-rain-with-mikrotik-c90705459bc6
  2649. https://www.secjuice.com/modsecurity-web-application-firewall-dns-over-https/
  2650. https://lgtm.com/blog/ghostscript_CVE-2018-19134_exploit
  2651. https://www.secureauth.com/labs/advisories/asus-drivers-elevation-privilege-vulnerabilities
  2652. https://cantunsee.space/
  2653. https://leucosite.com/Microsoft-Office-365-Outlook-XSS/
  2654. https://medium.com/@elberandre/1-000-ssrf-in-slack-7737935d3884
  2655. http://bit.ly/2U0BPCz (+)
  2656. https://pwn.no0.be/exploitation/wifi/wpa_enterprise/
  2657. http://bit.ly/2tvFFaS (+)
  2658. https://bordplate.no/blog/en/post/debugging-a-windows-service/
  2659. https://medium.com/@localh0t/unveiling-amazon-s3-bucket-names-e1420ceaf4fa
  2660. https://medium.com/@rvrsh3ll/hardening-your-azure-domain-front-7423b5ab4f64
  2661. https://erfur.github.io/down_the_rabbit_hole_pt1/
  2662. https://toshellandback.com/2015/11/24/ms-priv-esc/
  2663. http://bit.ly/2GWaCx9 (+)
  2664. https://vmcall.github.io/reversal/2019/02/10/battleye-anticheat.html
  2665. http://bit.ly/2IsFpny (+)
  2666. https://research.checkpoint.com/extracting-code-execution-from-winrar/
  2667. https://0x00sec.org/t/using-uri-to-pop-shells-via-the-discord-client/11673/2
  2668. http://bit.ly/2NhVGup (+)
  2669. https://www.bishopfox.com/news/2019/02/openmrs-insecure-object-deserialization/
  2670. https://blog.orange.tw/2019/01/hacking-jenkins-part-1-play-with-dynamic-routing.html
  2671. https://worldwideweb.cern.ch/
  2672. https://ysamm.com/?p=240
  2673. http://bit.ly/2tDRA6O (+)
  2674. https://medium.com/intigriti/abusing-autoresponders-and-email-bounces-9b1995eb53c2
  2675. https://www.inputzero.io/2019/02/fuzzing-webkit.html
  2676. https://rootsh3ll.com/evil-twin-attack/
  2677. https://thebabush.github.io/dumbo-llvm-based-dumb-obfuscator.html
  2678. http://bit.ly/2XpR4qN (+)
  2679. https://www.ambionics.io/blog/drupal8-rce
  2680. https://gitlab.com/invuls/iot-projects/iotsecfuzz
  2681. http://bit.ly/2GODica (+)
  2682. http://thunderclap.io/
  2683. http://bit.ly/2IGJKUf (+)
  2684. https://www.pdf-insecurity.org
  2685. https://eklitzke.org/the-cbc-padding-oracle-problem
  2686. http://www.jackson-t.ca/lg-driver-lpe.html
  2687. https://paper.seebug.org/822/
  2688. https://movaxbx.ru/2019/02/20/triaging-the-exploitability-of-ie-edge-crashes/
  2689. http://bit.ly/2NxPIWm (+)
  2690. https://medium.com/@logicbomb_1/chain-of-hacks-leading-to-database-compromise-b2bc2b883915
  2691. https://noclip.website/
  2692. http://www.kwasstuff.altervista.org/RIP/index.html
  2693. https://staaldraad.github.io/post/2019-03-02-universal-rce-ruby-yaml-load/
  2694. https://www.vulnano.com/2019/03/facebook-messenger-server-random-memory.html
  2695. https://ghidra-sre.org/
  2696. https://0x90909090.blogspot.com/2019/02/executing-payload-without-touching.html
  2697. https://disloops.com/cloudfront-hijacking/
  2698. http://bit.ly/2XIF4AQ (+)
  2699. http://blog.ptsecurity.com/2019/02/detecting-web-attacks-with-seq2seq.html
  2700. https://www.veracode.com/blog/research/exploiting-spring-boot-actuators
  2701. https://movaxbx.ru/2019/02/16/windows-process-injection-sharing-the-payload/
  2702. https://blog.0day.rocks/hiding-through-a-maze-of-iot-devices-9db7f2067a80
  2703. http://bit.ly/2HjDsaQ (+)
  2704. http://bit.ly/2TB245t (+)
  2705. http://blogs.360.cn/post/Binder_Kernel_Vul_EN.html
  2706. https://js1k.com/2019-x/demos
  2707. https://blog.littlevgl.com/2019-02-02/use-ipod-nano6-lcd-for-littlevgl
  2708. https://hackerone.com/reports/411140
  2709. https://hackerone.com/reports/398799
  2710. https://medium.com/@rootxharsh_90844/vimeo-ssrf-with-code-execution-potential-68c774ba7c1e
  2711. https://pentest.blog/n-ways-to-unpack-mobile-malware/
  2712. https://ijustwannared.team/2019/03/11/browser-pivot-for-chrome/
  2713. https://hausec.com/2019/03/05/penetration-testing-active-directory-part-i/
  2714. https://d4stiny.github.io/Reading-Physical-Memory-using-Carbon-Black/
  2715. http://woshub.com/copying-large-files-using-bits-and-powershell/
  2716. https://webrtchacks.com/fuzzing-janus/
  2717. https://pulsesecurity.co.nz/articles/TPM-sniffing
  2718. https://www.stuffithoughtiknew.com/2019/02/detecting-bloodhound.html
  2719. http://bit.ly/2UGmozO (+)
  2720. https://licenciaparahackear.github.io/en/posts/bypassing-a-restrictive-js-sandbox/
  2721. https://redtimmysec.wordpress.com/2019/03/07/flexpaper-remote-code-execution/
  2722. http://bit.ly/2T4IBWA (+)
  2723. http://travisaltman.com/windows-privilege-escalation-via-weak-service-permissions/
  2724. http://blogs.360.cn/post/RootCause_CVE-2019-0808_EN.html
  2725. https://rhinosecuritylabs.com/application-security/exploiting-cve-2018-1335-apache-tika/
  2726. https://archivebox.io/
  2727. https://litherum.blogspot.com/2019/03/addition-font.html
  2728. https://hackerone.com/reports/470520
  2729. http://bit.ly/2ulwA56 (+)
  2730. https://medium.com/@terjanq/cross-site-content-and-status-types-leakage-ef2dab0a492
  2731. http://bit.ly/2Fo9zDP (+)
  2732. https://medium.com/@benoit.sevens/windows-10-emulation-with-qemu-f41870ed464d
  2733. https://medium.com/@0x0FFB347/writing-a-custom-shellcode-encoder-31816e767611
  2734. https://polict.net/blog/CVE-2018-17057
  2735. http://bit.ly/2HwT1wN (+)
  2736. https://blog.tint0.com/2019/03/a-saga-of-code-executions-on-zimbra.html
  2737. https://jarlob.github.io/en/blog/not-a-bug-sqli
  2738. https://liberty-shell.com/sec/2019/03/12/dll-hijacking/
  2739. https://lgtm.com/blog/facebook_fizz_CVE-2019-3560
  2740. http://offsec.provadys.com/intro-to-file-operation-abuse-on-Windows.html
  2741. https://medium.com/tenable-techblog/mikrotik-firewall-nat-bypass-b8d46398bf24
  2742. http://bit.ly/2ULRPsg (+)
  2743. https://blog.assetnote.io/bug-bounty/2019/03/19/rce-on-mozilla-zero-day-webpagetest/
  2744. https://proofofcalc.com/cve-2019-6453-mIRC/
  2745. https://blog.regehr.org/archives/1653
  2746. https://securitytxt.org/
  2747. https://www.niceideas.ch/roller2/badtrash/entry/deciphering-the-bengladesh-bank-heist
  2748. https://hackerone.com/reports/297478
  2749. http://bit.ly/2OqLKz2 (+)
  2750. https://medium.com/tenable-techblog/owning-the-network-with-badusb-72daa45d1b00
  2751. https://mogwailabs.de/blog/2019/03/repacking-ios-applications/
  2752. https://raw.githubusercontent.com/pedrib/PoC/master/advisories/nuuo-cms-ownage.txt
  2753. http://bit.ly/2YujGj1 (+)
  2754. http://bit.ly/2Ow20ij (+)
  2755. https://outflank.nl/blog/2018/10/06/old-school-evil-excel-4-0-macros-xlm/
  2756. http://bit.ly/2JJXpdQ (+)
  2757. https://securelist.com/hacking-microcontroller-firmware-through-a-usb/89919/
  2758. https://medium.com/0xcc/one-liner-safari-sandbox-escape-exploit-91082ddbe6ef
  2759. https://medium.com/@princechaddha/an-unusal-bug-on-braintree-paypal-b8d3ec662414
  2760. https://blog.zecops.com/vulnerabilities/analysis-and-reproduction-of-cve-2019-7286/
  2761. http://bit.ly/2UXZAM1 (+)
  2762. https://medium.com/@howard.poston/mapping-the-owasp-top-ten-to-blockchain-69c904394e69
  2763. https://nullprogram.com/blog/2019/03/22/
  2764. https://blog.jessfraz.com/post/digging-into-risc-v-and-how-i-learn-new-things/
  2765. https://hackerone.com/reports/511044
  2766. https://mahmoudsec.blogspot.com/2019/04/handlebars-template-injection-and-rce.html
  2767. https://blog.doyensec.com/2019/04/03/subverting-electron-apps-via-insecure-preload.html
  2768. http://bit.ly/2TVqqTJ (+)
  2769. https://masthoon.github.io/exploit/2019/03/29/cygeop.html
  2770. https://digi.ninja/blog/domain_fronting.php
  2771. https://gkbrk.com/2019/01/reverse-engineering-the-godot-file-format/
  2772. https://modexp.wordpress.com/2019/03/07/process-injection-print-spooler/
  2773. https://cfreal.github.io/carpe-diem-cve-2019-0211-apache-local-root.html
  2774. https://www.drewgreen.net/vulnerabilities-in-tightrope-media-systems-carousel/
  2775. https://snyk.io/blog/severe-security-vulnerability-in-bowers-zip-archive-extraction/
  2776. https://www.secjuice.com/finding-real-ips-of-origin-servers-behind-cloudflare-or-tor/
  2777. https://medium.com/tenable-techblog/filezilla-untrusted-search-path-bc3a7b3ae51e
  2778. http://bit.ly/2UzN9c0 (+)
  2779. http://bit.ly/2HXhjAb (+)
  2780. https://www.zoomeye.org/topic?id=ZoomEye-series-report-VE-en
  2781. https://hackerone.com/reports/381356
  2782. https://medium.com/@d0nut/better-exfiltration-via-html-injection-31c72a2dae8b
  2783. http://bit.ly/2X5eTCX (+)
  2784. https://blog.zsec.uk/el-injection-rce/
  2785. https://rastamouse.me/2019/01/gpo-abuse-part-1/
  2786. http://bit.ly/2Ksl6HR (+)
  2787. http://tomasuh.github.io/2018/12/28/retefe-unpack.html
  2788. http://bit.ly/2Uvj2DH (+)
  2789. https://www.shielder.it/blog/nagios-xi-5-5-10-xss-to-root-rce/
  2790. https://wpa3.mathyvanhoef.com/
  2791. https://habr.com/en/post/446238/
  2792. https://blog.exodusintel.com/2019/04/03/a-window-of-opportunity/
  2793. https://www.notsosecure.com/exploiting-ssrf-in-aws-elastic-beanstalk/
  2794. https://mp.weixin.qq.com/s/OissE9gAVkKmAXuiIUeOLA
  2795. http://cturt.github.io/pinball.html
  2796. http://www.righto.com/2019/04/iconic-consoles-of-ibm-system360.html
  2797. https://soroush.secproject.com/blog/2014/07/upload-a-web-config-file-for-fun-profit/
  2798. http://ibrahimbalic.com/2014/sqlmap-ile-csrf-bypass/
  2799. http://tomforb.es/exploiting-xpath-injection-vulnerabilities-with-xcat-1
  2800. http://www.relentless-coding.org/projects/jsdetox/
  2801. http://hive.ccs.neu.edu/
  2802. https://lzo.securitymouse.com/lzo
  2803. http://blog.oddbit.com/2014/07/21/tracking-down-a-kernel-bug-wit/
  2804. http://googleprojectzero.blogspot.pt/2014/07/pwn4fun-spring-2014-safari-part-i_24.html
  2805. http://atredispartners.blogspot.pt/2014/07/atredis-blackhat-2014-contest-after_24.html
  2806. http://diablohorn.wordpress.com/2014/07/26/writing-your-own-blind-sqli-script/
  2807. http://blogs.mcafee.com/mcafee-labs/dropping-files-temp-folder-raises-security-concerns
  2808. http://slides.com/mscasharjaved/on-breaking-php-based-cross-site-scripting-protections-in-the-wild#/
  2809. http://www.ghacks.net/2014/07/28/repair-extract-broken-rar-archives/
  2810. http://gsmmap.org/
  2811. https://blog.underdogsecurity.com/rce_in_origin_client/
  2812. https://hackerone.com/reports/369451
  2813. http://bit.ly/2KMwUF1 (+)
  2814. https://gist.github.com/glenux/3e705387e30f229c242ea153de6e6a4d
  2815. http://bit.ly/2ItRHvg (+)
  2816. https://hackerone.com/reports/473888
  2817. https://krbtgt.pw/dacl-permissions-overwrite-privilege-escalation-cve-2019-0841/
  2818. https://www.shielder.it/blog/exploit-apache-solr-through-opencms/
  2819. https://dejandayoff.com/the-danger-of-exposing-docker.sock/
  2820. https://parzelsec.de/timing-attacks-with-machine-learning/
  2821. http://bit.ly/2vgAlsN (+)
  2822. http://bit.ly/2Gydmz1 (+)
  2823. http://newosxbook.com/articles/OTA.html
  2824. https://hackerone.com/reports/110293
  2825. https://www.labofapenetrationtester.com/2019/04/abusing-PAM.html
  2826. http://bit.ly/2Xk9t7l (+)
  2827. https://jerrington.me/posts/2019-01-29-self-hosted-ngrok.html
  2828. https://ysamm.com/?p=256
  2829. https://scriptinjection.blogspot.com/2019/04/oe-classic-280-rce-via-stored-xss.html
  2830. https://hackerone.com/reports/422043
  2831. http://bit.ly/2GBOOEW (+)
  2832. http://bit.ly/2GFK4PU (+)
  2833. https://medium.com/@terjanq/xss-auditor-the-protector-of-unprotected-f900a5e15b7b
  2834. http://bit.ly/2XLQOlb (+)
  2835. https://habr.com/en/post/449182/
  2836. http://bit.ly/2W6YqOK (+)
  2837. https://blog.trailofbits.com/2019/01/22/fuzzing-an-api-with-deepstate-part-1/
  2838. http://bit.ly/2L061xq (+)
  2839. https://consensys.github.io/smart-contract-best-practices/known_attacks/
  2840. https://blog.quarkslab.com/android-application-diffing-engine-overview.html
  2841. http://bit.ly/2UHi2Yp (+)
  2842. https://blog.doyensec.com/2019/04/24/rubyzip-bug.html
  2843. https://sensepost.com/blog/2019/understanding-peap-in-depth/
  2844. https://www.linkedin.com/pulse/micro-patching-vulnerabilities-tutorial-0patch-t-k/
  2845. https://http3-explained.haxx.se/en/
  2846. https://wybiral.github.io/code-art/projects/tiny-mirror/
  2847. https://hackerone.com/reports/210779
  2848. http://bit.ly/2VE8WQE (+)
  2849. http://bit.ly/2Y1LhHa (+)
  2850. https://research.801labs.org/developing-a-dll-injector/
  2851. http://bit.ly/2Jbahrp (+)
  2852. https://www.darkmatter.ae/blogs/security-flaws-uncovered-in-sony-smart-tvs/
  2853. https://paper.seebug.org/910/
  2854. http://eternalsakura13.com/2019/04/29/CVE-2016-5198/
  2855. https://securityriskadvisors.com/blog/aws-iam-exploitation/
  2856. https://capsule8.com/blog/exploiting-systemd-journald-part-1/
  2857. https://edoverflow.com/2019/ci-knew-there-would-be-bugs-here/
  2858. https://medium.com/tenable-techblog/eight-devices-one-exploit-f5fc28c70a7c
  2859. https://d4stiny.github.io/Remote-Code-Execution-on-most-Dell-computers/
  2860. http://bit.ly/2GWPxAL (+)
  2861. http://www.tomanthony.co.uk/blog/xss-attacks-googlebot-index-manipulation/
  2862. http://bit.ly/2IYijVt (+)
  2863. https://www.virtuesecurity.com/tale-of-a-wormable-twitter-xss/
  2864. https://hackerone.com/reports/563870
  2865. http://bit.ly/2H9qH0X (+)
  2866. http://bit.ly/2Lxly8o (+)
  2867. http://bit.ly/2LyXKks (+)
  2868. https://www.tarlogic.com/en/blog/attacking-selenium-grid/
  2869. http://bit.ly/2LwQ1mK (+)
  2870. http://bit.ly/2Hbwowt (+)
  2871. http://bit.ly/2PUMZr3 (+)
  2872. https://hackerone.com/reports/509924
  2873. http://blog.0x42424242.in/2019/03/vstarcam-investigational-security.html
  2874. http://bit.ly/2JaLkNv (+)
  2875. http://bit.ly/2Jbl0Da (+)
  2876. https://medium.com/0xcc/rootpipe-reborn-part-ii-e5a1ffff6afe
  2877. https://www.nc-lp.com/blog/reverse-engineering-games-for-fun-and-ssrf-part-1
  2878. https://classic.minecraft.net
  2879. https://www.my-internet-explorer.com/
  2880. https://hackerone.com/reports/419883
  2881. https://hackerone.com/reports/450365
  2882. https://zeropwn.github.io/2019-05-13-xss-to-rce/
  2883. https://security.lauritz-holtmann.de/advisories/cve-2019-11832/
  2884. https://gist.github.com/jupenur/e5d0c6f9b58aa81860bf74e010cf1685
  2885. https://astr0baby.wordpress.com/2019/01/26/custom-meterpreter-loader-in-2019/
  2886. https://mdsattacks.com/
  2887. https://thewover.github.io/Introducing-Donut/
  2888. https://zombieloadattack.com/
  2889. https://wojciechregula.blog/post/stealing-bear-notes-with-url-schemes/
  2890. http://bit.ly/2Ep1u23 (+)
  2891. https://modexp.wordpress.com/2019/05/10/dotnet-loader-shellcode/
  2892. http://bit.ly/2WQBt2E (+)
  2893. https://rce4fun.blogspot.com/2019/05/panda-antivirus-local-privilege.html
  2894. http://bit.ly/2LY1qfw (+)
  2895. https://landgrey.me/richfaces-cve-2018-14667/
  2896. https://gist.github.com/wybiral/c8f46fdf1fc558d631b55de3a0267771
  2897. https://liveoverflow.com/the-origin-of-script-kiddie-hacker-etymology/
  2898. https://www.wpadblock.com/
  2899. https://hackerone.com/reports/341908
  2900. http://bit.ly/2WjQywF (+)
  2901. https://medium.com/tenable-techblog/stealing-downloads-from-slack-users-be6829a55f63
  2902. https://snikt.net/blog/2019/05/22/to-fuzz-a-websocket/
  2903. https://medium.com/@ghostlulzhacks/wayback-machine-e678a3567ec
  2904. http://lordofpwn.kr/index.php/writeup/cve-2019-8506-javascriptcore-exploit/
  2905. https://medium.com/@fs0c131y/how-to-brick-all-samsung-phones-6aae4389bea
  2906. https://www.tarlogic.com/en/blog/backdoors-modulos-apache/
  2907. https://zeropwn.github.io/2019-05-22-fun-with-uri-handlers/
  2908. https://hackerone.com/reports/505424
  2909. https://www.darkmatter.ae/papers-articles/from-zero-to-tfp0-part-1-prologue/
  2910. http://bit.ly/2JY17yV (+)
  2911. http://bit.ly/2EroJZ4 (+)
  2912. https://theevilbit.github.io/posts/vmware_fusion_11_guest_vm_rce_cve-2019-5514/
  2913. https://web-in-security.blogspot.com/2019/02/how-to-spoof-pdf-signatures.html
  2914. https://shenaniganslabs.io/2019/05/21/LXD-LPE.html
  2915. https://keikai.io/blog/p/currency-exchange
  2916. http://bit.ly/2M6nDrV (+)
  2917. https://petergarner.net/notes/index.php?thisnote=20180202-Travels+with+a+Pi
  2918. https://ysamm.com/?p=272
  2919. https://portswigger.net/blog/abusing-jquery-for-css-powered-timing-attacks
  2920. https://medium.com/@subTee/flying-toruk-makto-b1bff8f6603c
  2921. https://www.fcvl.net/vulnerabilities/macosx-gatekeeper-bypass
  2922. http://bit.ly/2wyCHUx (+)
  2923. http://bit.ly/2IcgEc2 (+)
  2924. https://habr.com/en/company/drweb/blog/452076/
  2925. https://phoenhex.re/2019-05-15/non-jit-bug-jit-exploit
  2926. https://labs.spotify.com/2013/06/18/creative-usernames/
  2927. https://blog.devsecurity.eu/en/blog/dnspy-deserialization-vulnerability
  2928. https://blog.devsecurity.eu/en/blog/joplin-electron-rce
  2929. https://whereisk0shl.top/post/2019-05-11
  2930. https://bnbdr.github.io/posts/wd/
  2931. http://standa-note.blogspot.com/2018/02/amsi-bypass-with-null-character.html
  2932. http://bit.ly/2EH1I4m (+)
  2933. https://techblog.mediaservice.net/2019/03/a-journey-into-iot-hardware-hacking-uart/
  2934. https://www.magiclantern.fm/
  2935. http://bit.ly/2Wr8O7v (+)
  2936. https://www.inputzero.io/2019/06/hacking-smart-tv.html
  2937. http://bit.ly/2I0PuWB (+)
  2938. http://bit.ly/31aZJz2 (+)
  2939. https://www.tarlogic.com/en/blog/how-to-attack-kerberos/
  2940. http://bit.ly/2K3whps (+)
  2941. http://homepages.laas.fr/rcayre/mirage-documentation/index.html
  2942. https://orangewirelabs.wordpress.com/2019/05/30/hacking-ios-xamarin-apps-with-frida/
  2943. http://bit.ly/2Ipk2Ab (+)
  2944. http://bit.ly/31fBbVN (+)
  2945. https://theevilbit.github.io/posts/getting_root_with_benign_appstore_apps/
  2946. http://www.catch22.net/tuts/undocumented-createprocess
  2947. http://bit.ly/2Z5lwGu (+)
  2948. https://0x41.cf/infosec/2019/05/28/skype-web-plugin-ez-rce.html
  2949. http://bit.ly/2WsWu7t (+)
  2950. https://leakfree.wordpress.com/2015/03/12/php-object-instantiation-cve-2015-1033/
  2951. https://blog.duszynski.eu/domain-hijack-through-http-301-cache-poisoning/
  2952. https://www.fireeye.com/blog/threat-research/2019/06/hunting-com-objects.html
  2953. https://medium.com/@lerner98/skiptracing-reversing-spotify-app-3a6df367287d
  2954. https://secretgeek.github.io/html_wysiwyg/html.html
  2955. https://medium.com/@notdan/curl-slight-of-hand-exploit-hysteria-29a82e5851d
  2956. https://blog.ripstech.com/2019/mybb-stored-xss-to-rce/
  2957. https://appio.dev/vulns/googleplex-com-blind-xss/
  2958. https://rce.wtf/2019/06/10/w2k.html
  2959. https://rambleed.com/
  2960. https://habr.com/ru/company/dsec/blog/454592/
  2961. https://medium.com/@two06/fun-with-frida-5d0f55dd331a
  2962. https://www.sneakymonkey.net/2019/05/22/trickbot-analysis/
  2963. http://bit.ly/2WiM2KD (+)
  2964. https://eybisi.run/Mobile-Malware-Analysis-Overlay-and-How-to-Counter-it/
  2965. http://bit.ly/2ID9Y6Y (+)
  2966. https://payatu.com/microsoft-edge-extensions-host-permission-bypass-cve-2019-0678/
  2967. https://howhttps.works/
  2968. https://harrisonsand.com/imsi-catcher/
  2969. https://wookey-project.github.io/
  2970. https://medium.com/@mr_hacker/a-5000-idor-f4268fffcd2e
  2971. http://bit.ly/2ZzYurC (+)
  2972. hhttps://www.jaiminton.com/cheatsheet/DFIR/
  2973. http://bit.ly/2x8SGJe (+)
  2974. https://blog.redteam.pl/2019/04/dns-based-threat-hunting-and-doh.html
  2975. https://hackerone.com/reports/576504
  2976. https://jaiverma.github.io/blog/ac-hack
  2977. https://theofficialflow.github.io/2019/06/18/trinity.html
  2978. https://blog.xpnsec.com/evading-sysmon-dns-monitoring/
  2979. http://bit.ly/2ItogYP (+)
  2980. https://xor.cat/2019/06/19/fortinet-forticam-vulns/
  2981. http://bit.ly/2x2tKmW (+)
  2982. https://www.twistlock.com/labs-blog/breaking-out-of-coresos-rkt-3-new-cves/
  2983. https://habr.com/ru/company/pt/blog/448378/
  2984. https://dmsec.io/hacking-thousands-of-websites-via-third-party-javascript-libraries/
  2985. https://dassur.ma/things/c-to-webassembly/
  2986. https://blog.benjojo.co.uk/post/dive-into-the-world-of-dos-viruses
  2987. http://m4x0n3.blogspot.pt/2014/07/password-reset-code-bruteforce-account.html
  2988. https://plus.google.com/+AlexisImperialLegrandGoogle/posts/f9gm2G2BH5g
  2989. http://habrahabr.ru/post/231369/
  2990. http://www.matriux.com/index.php?page=home
  2991. http://lcamtuf.coredump.cx/p0f3/
  2992. http://lcamtuf.blogspot.gr/2014/08/a-bit-more-about-american-fuzzy-lop.html
  2993. http://www.garage4hackers.com/entry.php?b=3072
  2994. http://blog.ptsecurity.com/2014/08/cell-phone-tapping-how-it-is-done-and.html
  2995. http://blog.internot.info/2014/06/paypals-2-factor-authentication2fa-good.html
  2996. http://blog.dornea.nu/2014/08/05/android-dynamic-code-analysis-mastering-droidbox/
  2997. http://www.dirk-loss.de/python-tools.htm
  2998. http://usbdescriptors.com/
  2999. https://hackademic.co.in/youtube-bug/
  3000. https://www.cyberark.com/threat-research-blog/outlook-for-android-xss/
  3001. https://alephsecurity.com/2019/06/17/xnu-qemu-arm64-1/
  3002. https://www.wzdftpd.net/blog/rust-fuzzers.html
  3003. https://labs.jumpsec.com/2019/06/20/bypassing-antivirus-with-golang-gopher-it/
  3004. http://bit.ly/2XyprhR (+)
  3005. https://objective-see.com/blog/blog_0x43.html
  3006. https://www.gironsec.com/blog/2019/06/yet-another-botnet-writeup/
  3007. https://ledger-donjon.github.io/Ellipal-Security/
  3008. http://bit.ly/2LnK35Z (+)
  3009. https://exp101t.blogspot.com/2019/04/cve-2017-5121-escape-analysis.html
  3010. https://dolosgroup.io/blog/2019/6/20/pillaging-the-jenkins-treasure-chest
  3011. http://bit.ly/2NeWeVf (+)
  3012. https://blog.duszynski.eu/tor-ip-disclosure-through-http-301-cache-poisoning/
  3013. https://blog.jessfraz.com/post/why-open-source-firmware-is-important-for-security/
  3014. http://www.enforcementtracker.com/
  3015. https://playclassic.games/
  3016. https://hackerone.com/reports/562335
  3017. https://shhnjk.blogspot.com/2019/07/intro-to-chromes-gold-features.html
  3018. https://ssl-config.mozilla.org/
  3019. https://gitlab.com/kennbroorg/iKy
  3020. https://blog.ripstech.com/2019/magento-rce-via-xss/
  3021. https://decoder.cloud/2019/07/04/creating-windows-access-tokens/
  3022. https://nytrosecurity.com/2019/06/30/writing-shellcodes-for-windows-x64/
  3023. https://kripken.github.io/blog/binaryen/2019/06/11/fuzz-reduce-productivity.html
  3024. https://medium.com/bugbountywriteup/knocking-the-idor-6f80e8126ee4
  3025. https://ktln2.org/2019/04/30/from-zero-to-hero/
  3026. http://bit.ly/2LxSeNn (+)
  3027. http://bit.ly/2Jnc235 (+)
  3028. http://bit.ly/2xyhr1G (+)
  3029. https://medium.com/@alex91ar/debugging-the-samsung-android-kernel-part-1-ab2a9b87c162
  3030. https://vulnerablecontainers.org/
  3031. https://www.youtube.com/watch?v=VwH6B7aJYDU
  3032. https://hackerone.com/reports/403417
  3033. http://bit.ly/32mecsz (+)
  3034. https://blog.rakeshmane.com/2019/07/u-xss-in-operamini-for-ios-browser-0-day.html
  3035. https://chryzsh.github.io/exploiting-privexchange/
  3036. https://www.cambus.net/fuzzing-dns-zone-parsers/
  3037. http://lordofpwn.kr/index.php/writeup/cve-2019-5825-v8-exploit/
  3038. https://withatwist.dev/strong-password-rubygem-hijacked.html
  3039. http://bit.ly/2KXINHu (+)
  3040. https://www.secjuice.com/abusing-php-query-string-parser-bypass-ids-ips-waf/
  3041. https://enigma0x3.net/2019/07/05/cve-2019-13142-razer-surround-1-1-63-0-eop/
  3042. https://medium.com/tenable-techblog/an-exploit-chain-against-citrix-sd-wan-709db08fb4ac
  3043. https://medium.com/tenable-techblog/an-analysis-of-arlo-6f1b691236b5
  3044. https://staaldraad.github.io/post/2019-07-11-bypass-docker-plugin-with-containerd/
  3045. https://ledger-donjon.github.io/Unfixable-Key-Extraction-Attack-on-Trezor/
  3046. https://medium.com/netscape/hacking-it-out-when-cors-wont-let-you-be-great-35f6206cc646
  3047. http://bit.ly/2XYhMdc (+)
  3048. https://www.bamsoftware.com/hacks/zipbomb/
  3049. https://techblog.eyeson.team/post/memelearning/
  3050. https://thezerohack.com/hack-any-instagram
  3051. https://medium.com/@ruvlol/rce-in-jira-cve-2019-11581-901b845f0f
  3052. http://bit.ly/2Lrs6o8 (+)
  3053. https://gist.github.com/realoriginal/3a00478efd67b554f09f739380e2c3ba
  3054. http://bit.ly/2JBDGuB (+)
  3055. http://bit.ly/2LtS6PJ (+)
  3056. https://www.corben.io/atlassian-crowd-rce/
  3057. https://sysrant.com/500-bounty-man-in-the-middle-on-slack/
  3058. https://medium.com/@sansyrox/hacking-tinders-premium-model-43f9f699d44
  3059. https://phoenhex.re/2019-07-10/ten-months-old-bug
  3060. http://bit.ly/2Lz6lD1 (+)
  3061. https://staaldraad.github.io/post/2019-07-16-cve-2019-13139-docker-build/
  3062. http://bit.ly/2XVf4B6 (+)
  3063. https://harry.garrood.me/blog/malicious-code-in-purescript-npm-installer/
  3064. https://medium.com/@ScatteredSecrets/how-to-crack-billions-of-passwords-6773af298172
  3065. http://bit.ly/2JN677F (+)
  3066. https://latacora.micro.blog/2019/07/16/the-pgp-problem.html
  3067. https://ardern.io/2019/06/20/payload-bxss/
  3068. http://bit.ly/2GtDPyi (+)
  3069. https://blog.ropnop.com/docker-for-pentesters/
  3070. http://bit.ly/2YiYOd9 (+)
  3071. http://bit.ly/2Ohxb4A (+)
  3072. https://paper.seebug.org/990/
  3073. https://zero.lol/2019-07-21-axway-securetransport-xml-injection/
  3074. https://blog.assetnote.io/bug-bounty/2019/07/17/rce-on-zoom/
  3075. http://bit.ly/2GtMW1R (+)
  3076. https://trustfoundry.net/basic-rop-techniques-and-tricks/
  3077. https://blog.doyensec.com/2019/07/22/jackson-gadgets.html
  3078. https://blog.trailofbits.com/2019/07/19/understanding-docker-container-escapes/
  3079. https://mthbernardes.github.io/rce/2018/03/14/abusing-h2-database-alias.html
  3080. https://pentest.blog/android-malware-analysis-dissecting-hydra-dropper/
  3081. http://orbis.stanford.edu/
  3082. http://bit.ly/2Mdl3Pt (+)
  3083. http://bit.ly/2YIS8cQ (+)
  3084. http://bit.ly/2Mx0ygL (+)
  3085. http://bit.ly/2ypIexV (+)
  3086. https://raw-data.gitlab.io/post/autoit_fud/
  3087. https://86hh.github.io/cfg2.html
  3088. https://rhinosecuritylabs.com/aws/mfa-phishing-on-aws/
  3089. https://akayn.github.io/2019/07/25/PwningWebkit.html
  3090. http://bit.ly/332Tnmm (+)
  3091. https://medium.com/0xcc/what-the-heck-is-tcp-port-18800-a16899f0f48f
  3092. http://bit.ly/2Yvu8FK (+)
  3093. http://bit.ly/2MvQhkY (+)
  3094. https://maxkersten.nl/binary-analysis-course/binary-types/browser-plug-in/
  3095. https://d4stiny.github.io/Local-Privilege-Escalation-on-most-Dell-computers/
  3096. http://bit.ly/2Oy9Rzu (+)
  3097. https://bo0om.ru/telegram-bugbounty-writeup
  3098. https://amonitoring.ru/article/steamclient-0day/
  3099. http://bit.ly/2GWT1UK (+)
  3100. http://bit.ly/2ZJVcCs (+)
  3101. https://m0chan.github.io/2019/07/31/How-To-Attack-Kerberos-101.html
  3102. http://bit.ly/2YTEBuS (+)
  3103. https://tactifail.wordpress.com/2019/07/26/three-vulns-for-the-price-of-one/
  3104. https://blog.flanker017.me/galaxy-leapfrogging-pwning-the-galaxy-s8/
  3105. http://bit.ly/2YwaWMQ (+)
  3106. http://bit.ly/33kIexb (+)
  3107. https://icyphox.sh/blog/fb50/
  3108. https://paper.seebug.org/993/
  3109. https://gravitational.com/blog/how-saml-authentication-works/
  3110. http://mahmoudsec.blogspot.com/2019/08/exploiting-out-of-band-xxe-using.html
  3111. http://blog.orange.tw/2019/07/attacking-ssl-vpn-part-1-preauth-rce-on-palo-alto.html
  3112. https://vimeo.com/341663153
  3113. http://www.nothingsecurity.com/
  3114. https://www.baseapp.com/iot/antenna-tuning-for-beginners/
  3115. https://appio.dev/vulns/clickjacking-xss-on-google-org/
  3116. https://medium.com/rangeforce/meteor-blind-nosql-injection-29211775cd01
  3117. https://blog.jse.li/posts/chrome-76-incognito-filesystem-timing/
  3118. https://go-re.tk
  3119. https://a13xp0p0v.github.io/2019/08/10/cfu.html
  3120. https://modexp.wordpress.com/2019/08/12/windows-process-injection-knowndlls/
  3121. https://raesene.github.io/blog/2019/08/10/making-it-rain-shells-in-Kubernetes/
  3122. https://siguza.github.io/APRR/
  3123. http://bit.ly/2Hbr77Q (+)
  3124. https://medium.com/cruise/container-platform-security-7a3057a27663
  3125. https://zero.lol/2019-08-11-the-year-of-linux-on-the-desktop/
  3126. http://bit.ly/2YQMhTl (+)
  3127. http://www.peppermalware.com/2019/07/analysis-of-frenchy-shellcode.html
  3128. http://bit.ly/2KGOVBa (+)
  3129. https://research.checkpoint.com/select-code_execution-from-using-sqlite/
  3130. https://initblog.com/2019/switcheroo/
  3131. https://www.janmeppe.com/blog/regex-for-noobs/
  3132. https://salibra.com/p/buying-tea-with-wechat-pay-d3931febd2be
  3133. http://bit.ly/2KM6v8c (+)
  3134. https://hackerone.com/reports/637194
  3135. https://secrary.com/Random/anti_re_simple/
  3136. https://hausec.com/2019/08/12/offensive-lateral-movement/
  3137. https://heapspray.io/automating-pentests-with-webdriver.html
  3138. https://blog.firosolutions.com/exploits/webmin/
  3139. http://bit.ly/33VrwoL (+)
  3140. https://nullprogram.com/blog/2019/07/10/
  3141. http://bit.ly/31PNCa6 (+)
  3142. https://knobattack.com
  3143. https://davejingtian.org/2019/07/17/usb-fuzzing-a-usb-perspective/
  3144. http://bit.ly/2Zkb1Px (+)
  3145. https://wojciechregula.blog/post/dangerous-get-task-allow-entitlement/
  3146. https://amonitoring.ru/article/onemore_steam_eop_0day/
  3147. https://gts3.org/2019/cve-2019-0609.html
  3148. https://www.tarlogic.com/en/blog/vulnerabilities-in-ampache/
  3149. https://blog.regehr.org/archives/1687
  3150. https://jordanpotti.com/2019/08/26/phishing-with-saml-and-sso-providers/
  3151. http://bit.ly/2ZyvrrT (+)
  3152. https://gist.github.com/nstarke/ed0aba2c882b8b3078747a567ee00520
  3153. https://osandamalith.com/2019/08/27/running-shellcode-directly-in-c/
  3154. http://bit.ly/2MJy1pg (+)
  3155. https://gist.github.com/TarlogicSecurity/2f221924fef8c14a1d8e29f3cb5c5c4a
  3156. http://bit.ly/2ZkSZkW (+)
  3157. http://bit.ly/2L3Sq69 (+)
  3158. http://bit.ly/2Ugodnw (+)
  3159. https://blog.semmle.com/uboot-rce-nfs-vulnerability/
  3160. https://verifpal.com/
  3161. https://labs.mwrinfosecurity.com/blog/autocad-designing-a-kill-chain/
  3162. https://samczsun.com/the-0x-vulnerability-explained/
  3163. https://blog.bi0s.in/2019/08/18/Pwn/Browser-Exploitation/cve-2019-11707-writeup/
  3164. https://palant.de/2019/08/19/kaspersky-in-the-middle-what-could-possibly-go-wrong/
  3165. https://medium.com/tenable-techblog/rooting-routeros-with-a-usb-drive-16d7b8665f90
  3166. http://hatriot.github.io/blog/2019/08/22/exploiting-leaked-process-and-thread-handles/
  3167. https://winworldpc.com/library/operating-systems
  3168. https://iximiuz.com/en/posts/from-docker-container-to-bootable-linux-disk-image/
  3169. http://www.windytan.com/2019/08/capturing-pal-video-with-sdr-and-few.html
  3170. http://www.primalsecurity.net/python-tutorials/
  3171. https://bitbucket.org/mattinfosec/wordhound/
  3172. https://fuzion24.github.io/android/gradle/xposed/jar/java/build/sdk/2014/08/15/android-gradle-xposed/
  3173. http://dustri.org/b/torbrowserbundleorg.html
  3174. http://www.room362.com/blog/2014/08/14/milkman-creating-processes-as-any-currently-logged-in-user/
  3175. https://www.miknet.net/security/optimizing-birthday-attack/
  3176. http://www.ioactive.com/pdfs/Remote_Automotive_Attack_Surfaces.pdf
  3177. http://docs.cs.up.ac.za/programming/asm/derick_tut/syscalls.html
  3178. https://isc.sans.edu/forums/diary/Web+Server+Attack+Investigation+-+Installing+a+Bot+and+Reverse+Shell+via+a+PHP+Vulnerability/18543
  3179. http://jvns.ca/blog/2014/08/12/what-happens-if-you-write-a-tcp-stack-in-python/
  3180. https://doegox.github.io/ElectronicColoringBook/
  3181. https://hackerone.com/reports/498052
  3182. https://ysamm.com/?p=280
  3183. https://hackerone.com/reports/446593
  3184. https://www.corben.io/jenkins-to-full-pwnage/
  3185. https://www.contextis.com/en/blog/common-language-runtime-hook-for-persistence
  3186. https://mogwailabs.de/blog/2019/04/attacking-rmi-based-jmx-services/
  3187. https://research.securitum.com/security-analysis-of-portal-element/
  3188. https://blog.trailofbits.com/2019/09/02/rewriting-functions-in-compiled-binaries/
  3189. http://bit.ly/2lGFkBx (+)
  3190. http://bit.ly/2k22O3H (+)
  3191. https://gist.github.com/roycewilliams/cf7fce5777d47a8b22265515dba8d004
  3192. http://bit.ly/2k53EwL (+)
  3193. https://leveldown.de/blog/tensorflow-sidechannel-analysis/
  3194. https://medium.com/@byte_St0rm/adventures-in-the-wonderful-world-of-amsi-25d235eb749c
  3195. https://losttraindude.itch.io/zfrag
  3196. https://pfery.com/create-your-own-portable-rfid-pentest-kit/
  3197. https://habr.com/en/post/466801/
  3198. https://leucosite.com/Microsoft-Edge-uXSS/
  3199. https://www.komodosec.com/post/an-accidental-ssrf-honeypot-in-google-calendar
  3200. https://incogbyte.github.io/pathtraversal/
  3201. http://bit.ly/2kxhWGM (+)
  3202. http://bit.ly/2kGM0Q0 (+)
  3203. https://giuliocomi.blogspot.com/2019/08/insecure-secrets-encryption-at-rest.html
  3204. https://simjacker.com/
  3205. http://bit.ly/2lSCoSp (+)
  3206. https://blog.openzeppelin.com/libra-vulnerability-summary/
  3207. http://blogs.360.cn/post/When-GC-Triggers-Callback.html
  3208. https://blog.aquasec.com/dns-spoofing-kubernetes-clusters
  3209. https://blog.cystack.net/subdomain-takeover/
  3210. https://xlab.tencent.com/en/2019/09/12/deep-analysis-of-cve-2019-8014/
  3211. http://bit.ly/2meGnJr (+)
  3212. http://bit.ly/2mc1A6F (+)
  3213. https://www.vusec.net/projects/netcat/
  3214. http://blog.lambdaconcept.com/doku.php?id=research:graywire
  3215. http://allenchou.net/2019/08/trigonometry-basics-sine-cosine/
  3216. https://blog.ripstech.com/2019/bitbucket-path-traversal-to-rce/
  3217. https://iwantmore.pizza/posts/cve-2019-10392.html
  3218. http://bit.ly/2lWASis (+)
  3219. https://0x00sec.org/t/reversing-hackex-an-android-game/16243
  3220. https://teamrot.fi/2019/05/23/self-hosted-burp-collaborator-with-custom-domain
  3221. https://vavkamil.cz/2019/09/11/serverless-blind-xss-hunter-with-cloudflare-workers/
  3222. http://bit.ly/2kI1fbK (+)
  3223. https://blog.semmle.com/android-deserialization-vulnerabilities/
  3224. http://bit.ly/2kRpyUv (+)
  3225. https://carvesystems.com/news/command-injection-with-usb-peripherals/
  3226. https://docs.google.com/document/d/1XWzlOOuoTE7DUK60qTk1Wz1VNhbPaHqKEzyxPfyW4GQ
  3227. https://dirkjanm.io/azure-ad-privilege-escalation-application-admin/
  3228. https://research.securitum.com/server-side-template-injection-on-the-example-of-pebble/
  3229. http://bit.ly/2lX3yI2 (+)
  3230. https://blog.openzeppelin.com/bypassing-smart-contract-timelocks/
  3231. http://bit.ly/2lZczQP (+)
  3232. https://aem1k.com/oo/
  3233. https://smallstep.com/blog/everything-pki/
  3234. https://hackerone.com/reports/692603
  3235. https://medium.com/@terjanq/dom-clobbering-techniques-8443547ebe94
  3236. https://samcurry.net/analysis-of-cve-2019-14994/
  3237. http://bit.ly/2kGLOjK (+)
  3238. https://blog.grimm-co.com/post/guided-fuzzing-with-driller/
  3239. https://modexp.wordpress.com/2019/08/30/minidumpwritedump-via-com-services-dll/
  3240. https://pentestlab.blog/2019/09/11/microsoft-exchange-mailbox-post-compromise/
  3241. http://bit.ly/2mW6FjW (+)
  3242. https://interrupt.memfault.com/blog/ble-throughput-primer
  3243. https://alephsecurity.com/2019/09/02/Z3-for-webapp-security/
  3244. https://ackcent.com/blog/in-depth-freemarker-template-injection/
  3245. https://adapt-and-attack.com/2019/08/29/proxying-com-for-stable-hijacks/
  3246. https://medium.com/@memn0ps/http-request-smuggling-cl-te-7c40e246021c
  3247. https://blog.xpnsec.com/bypassing-macos-privacy-controls/
  3248. https://medium.com/@akshukatkar/rce-with-flask-jinja-template-injection-ea5d0201b870
  3249. http://bit.ly/2lXfyJy (+)
  3250. https://medium.com/@vickieli/how-to-find-more-idors-ae2db67c9489
  3251. http://bit.ly/2ltl8DK (+)
  3252. https://hsivonen.fi/string-length/
  3253. https://nathandavison.com/blog/haproxy-http-request-smuggling
  3254. https://frederik-braun.com/firefox-ui-xss-leading-to-rce.html
  3255. http://bit.ly/2o9MCPZ (+)
  3256. https://frichetten.com/blog/bypass-guardduty-pentest-alerts
  3257. https://enciphers.github.io/Mobexler/
  3258. https://pentestlab.blog/2017/06/07/uac-bypass-fodhelper/
  3259. http://bit.ly/2nfcQ3d (+)
  3260. http://bit.ly/2pCAqHL (+)
  3261. http://bit.ly/2oN3uvR (+)
  3262. https://awakened1712.github.io/hacking/hacking-whatsapp-gif-rce/
  3263. https://starlabs.sg/advisories/19-8038/
  3264. http://bit.ly/2VaTQ2d (+)
  3265. https://sysenter-eip.github.io/VBParser
  3266. http://bit.ly/2pIHGCh (+)
  3267. https://thesw4rm.gitlab.io/nfqueue_c2/2019/09/15/Command-and-Control-via-TCP-Handshake/
  3268. https://medium.com/intigriti/gotcha-taking-phishing-to-a-whole-new-level-72eda9e30bef
  3269. https://eddiez.me/spotify-vacuum/
  3270. http://rl337.org/2012/07/31/in-java-when-is-math-abs-negative/
  3271. http://bit.ly/2oOXGSq (+)
  3272. https://hackerone.com/reports/631956
  3273. https://5alt.me/2019/10/HackMD%20Stored%20XSS%20and%20HackMD%20Desktop%20RCE/
  3274. https://medium.com/bugbountywriteup/sql-injection-to-lfi-to-rce-536bed29a862
  3275. https://nightowl131.github.io/AAPG/
  3276. https://theappanalyst.com/bird.html
  3277. http://bit.ly/33ljTql (+)
  3278. https://securing.github.io/SCSVS/
  3279. https://alex.kaskaso.li/post/revisiting-email-spoofing
  3280. http://bit.ly/2B5NZSt (+)
  3281. http://bit.ly/2IEgpay (+)
  3282. https://medium.com/swlh/php-type-juggling-vulnerabilities-3e28c4ed5c09
  3283. https://xerub.github.io/ios/iboot/2018/05/10/de-rebus-antiquis.html
  3284. https://x-c3ll.github.io//posts/CVE-2018-7081-RCE-ArubaOS/
  3285. https://www.preempt.com/blog/drop-the-mic-2-active-directory-open-to-more-ntlm-attacks/
  3286. https://collapseos.org/
  3287. http://www.pouet.net/prod.php?which=83222
  3288. http://bit.ly/2Mtnpbj (+)
  3289. http://bit.ly/2J0wSpP (+)
  3290. http://bit.ly/2IXw455 (+)
  3291. https://redteamzone.com/ThinVNC/
  3292. https://iwantmore.pizza/posts/meterpreter-psattack.html
  3293. https://www.praetorian.com/blog/running-a-net-assembly-in-memory-with-meterpreter
  3294. https://medium.com/@netscylla/pentesters-guide-to-oracle-hacking-1dcf7068d573
  3295. https://osandamalith.com/2019/10/12/bypassing-the-webarx-web-application-firewall-waf/
  3296. http://bit.ly/2VQ3ac8 (+)
  3297. http://bit.ly/31oU5bi (+)
  3298. https://www.sudo.ws/alerts/minus_1_uid.html
  3299. http://bit.ly/32s7JMc (+)
  3300. https://dmaasland.github.io/posts/mcafee.html
  3301. https://hernan.de/blog/2019/10/15/tailoring-cve-2019-2215-to-achieve-root/
  3302. https://blog.paloaltonetworks.com/2019/10/cloud-kubernetes-vulnerabilities/
  3303. https://dirkjanm.io/office-365-network-attacks-via-insecure-reply-url/
  3304. http://bit.ly/2IF9X3f (+)
  3305. https://christopher-vella.com/2019/09/06/recent-edr-av-observations/
  3306. http://bit.ly/33BSlx5 (+)
  3307. http://bit.ly/35KORdl (+)
  3308. https://jvns.ca/blog/2019/10/03/sql-queries-don-t-start-with-select/
  3309. https://buer.haus/2019/10/18/a-tale-of-exploitation-in-spreadsheet-file-conversions/
  3310. https://www.shielder.it/blog/exploiting-an-old-novnc-xss-cve-2017-18635-in-openstack/
  3311. https://x-c3ll.github.io//posts/CSS-Injection-Primitives/
  3312. http://bit.ly/2Jg9J2v (+)
  3313. https://cturt.github.io/ps2-yabasic.html
  3314. https://habr.com/en/company/dsec/blog/472762/
  3315. http://bit.ly/2PhNa1k (+)
  3316. https://research.securitum.com/jwt-json-web-token-security/
  3317. http://bit.ly/32Ja1XH (+)
  3318. http://bit.ly/2qJmUmx (+)
  3319. http://bit.ly/2BL3Ypn (+)
  3320. https://medium.com/@MalFuzzer/dissecting-ardamax-keylogger-f33f922d2576
  3321. https://medium.com/@philiptsukerman/activation-contexts-a-love-story-5f57f82bccd
  3322. http://www.snaponair.com/
  3323. https://binji.github.io/posts/raw-wasm-making-a-maze-race/
  3324. http://bit.ly/34kr6aJ (+)
  3325. https://research.securitum.com/prototype-pollution-rce-kibana-cve-2019-7609/
  3326. http://bit.ly/2BVSEqP (+)
  3327. https://lab.wallarm.com/race-condition-in-web-applications/
  3328. http://bit.ly/365EwsH (+)
  3329. https://pulsesecurity.co.nz/advisories/untitled-goose-game-deserialization
  3330. http://www.hydrogen18.com/blog/reddit-android-app-leaks-images.html
  3331. https://medium.com/tenable-techblog/routeros-chain-to-root-f4e0b07c0b21
  3332. http://bit.ly/2qchqQY (+)
  3333. https://hackerone.com/reports/629892
  3334. http://bit.ly/2NrrxcA (+)
  3335. https://incolumitas.com/2019/10/19/model-based-fuzzing-of-the-WPA3-dragonfly-handshake/
  3336. https://hellveticafont.com/
  3337. https://byuu.net/compact-discs/structure
  3338. https://rastating.github.io/opsec-in-the-after-life/
  3339. https://blog.teddykatz.com/2019/11/05/github-oauth-bypass.html
  3340. http://bit.ly/2PWO3g0 (+)
  3341. https://dualuse.io/blog/curryfinger/
  3342. https://labs.f-secure.com/blog/ou-having-a-laugh/
  3343. https://www.riccardoancarani.it/bloodhound-tips-and-tricks/
  3344. https://pentestlab.blog/2019/11/05/persistence-powershell-profile/
  3345. https://bcdevices.github.io/zephyr/ble/2019/10/30/zephyr-ble-testing.html
  3346. http://bit.ly/2qsNu39 (+)
  3347. http://bit.ly/2NoUXsX (+)
  3348. https://blog.netspi.com/escape-nodejs-sandboxes/
  3349. https://reverse.put.as/2019/10/29/crafting-an-efi-emulator/
  3350. https://medium.com/@lerner98/rage-against-the-maschine-3357be1abc48
  3351. https://iwantmore.pizza/posts/cve-2019-1414.html
  3352. https://nathandavison.com/blog/abusing-http-hop-by-hop-request-headers
  3353. https://argus-sec.com/remote-attack-bosch-drivelog-connector-dongle/
  3354. https://maxkersten.nl/binary-analysis-course/malware-analysis/corona-ddos-bot/
  3355. https://blog.vastart.dev/2019/10/stack-overflow-cve-2019-17424.html
  3356. http://whythefuckwasibreached.com/
  3357. https://lightcommands.com/
  3358. http://homakov.blogspot.pt/2014/02/how-i-hacked-github-again.html
  3359. http://insertco.in/2014/02/10/how-i-hacked-instagram/
  3360. http://blog.spiderlabs.com/2014/02/cve-2014-0050-exploit-with-boundaries-loops-without-boundaries.html
  3361. http://neosysforensics.blogspot.com.es/2010/02/la-papelera-de-reciclaje-en-windows.html
  3362. https://bitbucket.org/blackaura/browserfuzz
  3363. http://jeanphix.me/Ghost.py/
  3364. http://16s.us/docs/sshlog/
  3365. https://www.us-cert.gov/ncas/alerts/TA14-017A
  3366. http://www.lauradhamilton.com/random-lessons-online-poker-exploit
  3367. http://blog.alguien.at/2014/02/hackeando-el-router-zte-zxv10-w300-v21.html
  3368. https://archive.org/details/shmoocon-2014
  3369. http://www.devttys0.com/2014/02/cracking-linksys-crypto/
  3370. https://www.youtube.com/watch?v=waEeJJVZ5P8
  3371. http://www.digitaljournal.com/news/world/13-year-old-defies-big-brother-and-refuses-to-be-fingerprinted/article/370009
  3372. http://blog.opensecurityresearch.com/2014/08/learning-exploitation-with-fsexploitme.html
  3373. http://ccsir.org/how-to-ddos-through-facebook-datacenter-with-almost-1gbs-theyve-started-to-care/
  3374. https://pypi.python.org/pypi/ooniprobe
  3375. http://recon.cx/2014/video/
  3376. https://www.youtube.com/watch?v=___jEOjGCOY
  3377. https://jordan-wright.github.io/blog/2013/11/07/how-to-pentest-iphone-apps-with-burp/
  3378. https://www.netsparker.com/blog/web-security/ruby-on-rails-security-basics/
  3379. http://zenhax.com/viewtopic.php?f=16&t=87
  3380. http://w00tsec.blogspot.pt/2014/08/scan-internet-screenshot-all-things.html
  3381. http://www.bsdnow.tv/tutorials/openvpn
  3382. http://www.nsaplayset.org/
  3383. http://h4des.org/blog/index.php?/archives/345-Introducing-alertR-Open-Source-alerting-system.html
  3384. https://www.google.com/?hl=xx-hacker&gws_rd=ssl
  3385. https://fletchto99.dev/2019/november/slack-vulnerability/
  3386. https://blog.teddykatz.com/2019/11/12/github-actions-dos.html
  3387. https://terjanq.github.io/Bug-Bounty/Google/cache-attack-06jd2d2mz2r0/index.html
  3388. https://mike-n1.github.io/Chain_XSS
  3389. https://pentestlab.blog/2019/11/13/persistence-accessibility-features/
  3390. http://tpm.fail/
  3391. http://re.alisa.sh/notes/iBoot-address-space.html
  3392. https://decoder.cloud/2019/11/13/from-arbitrary-file-overwrite-to-system/
  3393. https://c0nradsc0rner.com/2016/07/03/ecb-byte-at-a-time/
  3394. http://bit.ly/374r7S9 (+)
  3395. http://bit.ly/2qW7JpO (+)
  3396. https://shenaniganslabs.io/2019/11/12/Ghost-Potato.html
  3397. http://bit.ly/34ZdguH (+)
  3398. http://bit.ly/2NMg74t (+)
  3399. http://bit.ly/2CLkyWI (+)
  3400. https://portswigger.net/research/cracking-recaptcha-turbo-intruder-style
  3401. http://bit.ly/34b23Hk (+)
  3402. https://www.notsosecure.com/oob-exploitation-cheatsheet/
  3403. http://bit.ly/2Qh4qUT (+)
  3404. http://bit.ly/2OwK1Zv (+)
  3405. http://bit.ly/2QB0ChD (+)
  3406. http://bit.ly/37ntoIl (+)
  3407. https://medium.com/@two06/amsi-as-a-service-automating-av-evasion-2e2f54397ff9
  3408. https://timvisee.com/blog/stealing-private-keys-from-secure-file-sharing-service/
  3409. http://bit.ly/37uwOJl (+)
  3410. https://blog.silentsignal.eu/2019/04/18/drop-by-drop-bleeding-through-libvips/
  3411. https://www.shelliscoming.com/2019/11/retro-shellcoding-for-current-threats.html
  3412. https://pomb.us/build-your-own-react/
  3413. https://webassembly-security.com/polyglot-webassembly-module-html-js-wasm/
  3414. https://jcjc-dev.com/2019/11/11/esp32-arduino-bluetooth-halloween-costume/
  3415. https://research.securitum.com/xss-in-amp4email-dom-clobbering/
  3416. https://ysamm.com/?p=343
  3417. https://0xeb-bp.github.io/blog/2019/11/21/practical-guide-pass-the-ticket.html
  3418. https://blog.xpnsec.com/exploring-mimikatz-part-1/
  3419. https://blog.benjojo.co.uk/post/userspace-usb-drivers
  3420. https://blog.orange.tw/2019/11/HiNet-GPON-Modem-RCE.html
  3421. https://staaldraad.github.io/post/2019-11-24-argument-injection/
  3422. https://mrexodia.github.io/reversing/2019/09/28/Analyzing-keyboard-firmware-part-1
  3423. https://dreadlocked.github.io/2019/10/25/kentico-cms-rce/
  3424. https://medium.com/bugbountywriteup/breaking-down-sha-256-algorithm-2ce61d86f7a3
  3425. https://blog.flanker017.me/examining-and-exploiting-android-vendor-binder-services-part1/
  3426. https://bkerler.github.io/2019/11/15/bring-light-to-the-darkness/
  3427. http://bit.ly/2R13owE (+)
  3428. https://kiwec.net/blog/posts/beating-c-with-brainfuck/
  3429. http://bit.ly/2Dqvj13 (+)
  3430. https://s0lly.itch.io/cellivization
  3431. http://bit.ly/2rjDZDX (+)
  3432. https://about.gitlab.com/blog/2019/11/29/shopping-for-an-admin-account/
  3433. http://bit.ly/2OS4n0D (+)
  3434. https://h0mbre.github.io/Learn-C-By-Creating-A-Rootkit
  3435. http://bit.ly/2OTDeuv (+)
  3436. https://blog.talosintelligence.com/2019/11/hunting-for-lolbins.html
  3437. https://puzzor.github.io/Linksys-Velop-Vulneraibility-Series
  3438. https://rushter.com/blog/public-ssh-keys/
  3439. http://bit.ly/2PlmQSi (+)
  3440. https://medium.com/@drakkars/hacking-an-android-tv-in-2-minutes-7b6f29518ff3
  3441. https://m417z.com/The-De-anonymization-of-the-Technion-Confessions-Admin/
  3442. https://medium.com/swlh/hacking-xml-data-a64c870b0988
  3443. https://sensepost.com/blog/2019/obtaining-shells-via-logitech-unifying-dongles/
  3444. http://xyproblem.info/
  3445. https://www.imbushuo.net/blog/archives/725
  3446. https://www.dylanpaulus.com/2019-11-24-how-fb-avoids-adblockers/
  3447. https://hipotermia.pw/bb/http-desync-idor
  3448. https://amonitoring.ru/article/origin_lpe_disclosure/
  3449. https://www.ragestorm.net/blogs/?p=486
  3450. https://www.coalfire.com/The-Coalfire-Blog/December-2019/Deserialized-Double-Dirty
  3451. https://x-c3ll.github.io/posts/Pivoting-MySQL-Proxy/
  3452. https://www.vdalabs.com/2019/09/25/windows-credential-theft-rdp-internet-explorer-11/
  3453. https://itm4n.github.io/cdpsvc-dll-hijacking/
  3454. https://medium.com/@ricardoiramar/reusing-cookies-23ed4691122b?
  3455. https://diverto.github.io/2019/11/18/Cracking-LUKS-passphrases
  3456. https://www.0x90.zone/multiple/reverse/2019/11/28/Anviz-pwn.html
  3457. http://bit.ly/2skmNhQ (+)
  3458. https://www.mdsec.co.uk/2019/12/macos-filename-homoglyphs-revisited/
  3459. https://promon.co/security-news/strandhogg/
  3460. https://medium.com/@ss23/php-autloading-local-file-inclusion-by-design-71aafe627877
  3461. https://n4r1b.netlify.com/en/posts/2019/11/understanding-wdboot-windows-defender-elam/
  3462. https://decoder.cloud/2019/12/06/we-thought-they-were-potatoes-but-they-were-beans/
  3463. https://starship.rs/
  3464. https://ivrodriguez.com/introducing-security-plist/
  3465. https://eng.getwisdom.io/hacking-github-with-unicode-dotless-i/
  3466. https://medium.com/@dPhoeniixx/vimeo-upload-function-ssrf-7466d8630437
  3467. https://brandonhinkel.com/breaking-hardened-mifare-proxmark3/
  3468. https://aboutdfir.com/jailbreaking-checkra1n-configuration/
  3469. https://pentest.blog/explore-hidden-networks-with-double-pivoting/
  3470. https://medium.com/maverislabs/cve-2019-17123-cbc946c99f8
  3471. https://osintcurio.us/2019/07/16/searching-instagram/
  3472. https://decoder.cloud/2019/12/18/from-dropboxupdater-to-nt-authoritysystem/
  3473. https://medium.com/@rootxharsh_90844/abusing-feature-to-steal-your-tokens-f15f78cebf74
  3474. https://nagarrosecurity.com/blog/interactive-buffer-overflow-exploitation
  3475. https://know.bishopfox.com/research/cve-2019-18935-remote-code-execution-in-telerik-ui
  3476. https://blog.tetrane.com/2019/11/17/Analyzing_an_Out_of_Bounds_read_in_a_TTF_font_file.html
  3477. https://lab.wallarm.com/securing-and-attacking-graphql-part-1-overview/
  3478. https://dsfile-analysis.blogspot.com/2019/12/normal-0-false-false-false-en-us-x-none.html
  3479. https://bowero.nl/blog/2019/12/15/c-what-the-fuck/
  3480. https://neilkakkar.com/unix.html
  3481. https://yurichev.com/blog/SA_XOR/
  3482. https://leucosite.com/Edge-Chromium-EoP-RCE/
  3483. http://bit.ly/34Rnm0g (+)
  3484. https://iwantmore.pizza/posts/meterpreter-ppid-spoofing.html
  3485. https://anee.me/reversing-a-real-world-249-bytes-backdoor-aadd876c0a32
  3486. http://bit.ly/35UMgNM (+)
  3487. https://blog.umangis.me/a-deep-dive-into-ios-code-signing/
  3488. https://offensi.com/2019/12/16/4-google-cloud-shell-bugs-explained-introduction/
  3489. https://medium.com/@R0X4R/graphql-idor-leads-to-information-disclosure-175eb560170d
  3490. https://know.bishopfox.com/blog/5-privesc-attack-vectors-in-aws
  3491. https://securitylab.github.com/research/ubuntu-whoopsie-daisy-overview
  3492. http://bit.ly/2ZstdI5 (+)
  3493. https://mp.weixin.qq.com/s/okU2y0izfnKXXtXG3EfLkQ
  3494. https://bertjwregeer.keybase.pub/2019-12-10%20-%20error_page%20request%20smuggling.pdf
  3495. https://fredericb.info/2016/10/amlogic-s905-soc-bypassing-not-so.html
  3496. https://www.blackhillsinfosec.com/how-to-hack-hardware-using-uart/
  3497. http://bit.ly/2Mulp3y (+)
  3498. https://alephsecurity.com/2019/12/29/revised-homograph-attacks/
  3499. http://bit.ly/2tnUn78 (+)
  3500. https://jpdias.me/infosec/hardware/2019/12/26/uberhid.html
  3501. https://m0chan.github.io/2019/07/30/Windows-Notes-and-Cheatsheet.html
  3502. https://gist.github.com/ykoster/4d2c3792d438e04bb73529017a6e1177
  3503. https://sec.alexflor.es/post/minipwn/
  3504. https://blog.zeddyu.info/2019/12/08/HTTP-Smuggling-en/
  3505. https://whereisk0shl.top/post/a-simple-story-of-dssvc
  3506. http://bit.ly/36ecGdz (+)
  3507. http://bit.ly/2PYAQmQ (+)
  3508. https://blog.quarkslab.com/a-deep-dive-into-samsungs-trustzone-part-1.html
  3509. https://keenlab.tencent.com/en/2020/01/02/exploiting-wifi-stack-on-tesla-model-s/
  3510. https://blog.jonlu.ca/posts/experiments-and-growth-hacking
  3511. https://medium.com/@frycos/yet-another-net-deserialization-35f6ce048df7
  3512. http://bit.ly/36kD8lE (+)
  3513. https://tech.michaelaltfield.net/2020/01/02/buskill-laptop-kill-cord-dead-man-switch/
  3514. http://bit.ly/2FBDJUC (+)
  3515. http://bit.ly/2tGKrG0 (+)
  3516. https://community.turgensec.com/ssh-hacking-guide/
  3517. https://pentestlab.blog/2020/01/07/persistence-appinit-dlls/
  3518. https://webassembly-security.com/fuzzing-wasm-javascript-dharma-chrome-v8/
  3519. https://cablehaunt.com/
  3520. https://www.ambionics.io/blog/php-mt-rand-prediction
  3521. https://gravitational.com/blog/ssh-handshake-explained/
  3522. http://bit.ly/2R6XSau (+)
  3523. https://www.pentagrid.ch/en/blog/fuzzing_java_with_jqf/
  3524. https://duo.com/labs/research/secure-boot-in-the-era-of-the-t2
  3525. https://redfast00.github.io/12-31-2019/reverse-engineering-uefi.html
  3526. https://medium.com/@ryancor/reverse-engineering-encrypted-code-segments-b01aead67701
  3527. https://medium.com/@catalyst256/osint-certificate-transparency-lists-a603c9d2b776
  3528. https://www.allysonomalley.com/2020/01/06/saying-goodbye-to-my-favorite-5-minute-p1/
  3529. http://rubyplants.com/
  3530. http://www.p01.org/defender_of_the_favicon/
  3531. https://immunant.com/blog/2020/01/quake3/
  3532. https://blog.isec.pl/all-is-xss-that-comes-to-the-net/
  3533. http://bit.ly/2FRi1fo (+)
  3534. https://yeggor.github.io/UEFI_BinDiff/
  3535. https://blog.redteam.pl/2019/12/chrome-portal-element-fuzzing.html
  3536. http://windows-internals.com/cet-on-windows/
  3537. http://bit.ly/2NxAz8G (+)
  3538. https://alephsecurity.com/2020/01/14/ruckus-wireless/
  3539. http://bit.ly/371T6l9 (+)
  3540. https://httptoolkit.tech/blog/debugging-https-without-global-root-ca-certs/
  3541. https://medium.com/tenable-techblog/lets-reverse-engineer-discord-1976773f4626
  3542. http://bit.ly/2TubqiN (+)
  3543. https://medium.com/@alexkaskasoli/pull-based-cd-pipelines-for-security-4e044b403f56
  3544. https://darvincitech.wordpress.com/2019/12/23/detect-frida-for-android/
  3545. https://pentest.blog/advisory-seagate-central-storage-remote-code-execution/
  3546. https://blog.jse.li/posts/torrent/
  3547. https://citizen428.net/blog/learning-fsharp-writing-a-raytracer/
  3548. http://deadliestwebattacks.com/2013/12/03/selector-the-almighty-subjugator-of-elements/
  3549. http://marc.durdin.net/2014/09/risks-with-third-party-scripts-on-internet-banking-sites/
  3550. http://securitysucks.info/exploit-phps-mail-to-get-remote-code-execution/
  3551. https://www.cert.org/blogs/certcc/post.cfm?EntryID=203
  3552. http://xmodulo.com/2014/08/sniff-http-traffic-command-line-linux.html
  3553. https://gist.github.com/jedisct1/e63d46822b9d95fe6702
  3554. http://www.exploresecurity.com/wp-content/uploads/custom/SSL_manual_cheatsheet.html
  3555. http://blog.tadaweb.com/2014/08/how-to-find-not-so-secret-documents-with-search-engines/
  3556. http://blog.dornea.nu/2014/08/21/howto-debug-android-apks-with-eclipse-and-ddms/
  3557. http://h30499.www3.hp.com/t5/Fortify-Application-Security/The-BREACH-attack-explained/ba-p/6605030
  3558. https://konklone.com/post/why-google-is-hurrying-the-web-to-kill-sha-1
  3559. http://www.skfu.xxx/2014/09/ps4-state-of-things-part-i-titleids.html
  3560. https://medium.com/@tareksiddiki/story-of-a-beg-bounty-hunter-e9a1f58ddf9e
  3561. http://fuzzinginfo.files.wordpress.com/2012/05/ben_nagy_how_to_fail_at_fuzzing.pdf
  3562. https://code.google.com/p/corkami/source/detail?r=1906
  3563. https://hufman.github.io/stories/bmwconnectedapps
  3564. http://bit.ly/2GiohNo (+)
  3565. http://bit.ly/37kXXxT (+)
  3566. https://decoder.cloud/2020/01/20/from-hyper-v-admin-to-system/
  3567. https://gist.github.com/nstarke/a611a19aab433555e91c656fe1f030a9
  3568. http://bit.ly/38AguGU (+)
  3569. https://www.ayrx.me/analyzing-kony-mobile-applications
  3570. https://posts.specterops.io/mimidrv-in-depth-4d273d19e148
  3571. https://0xsha.io/posts/mass-exploitation-hunting-while-sleeping
  3572. https://securitylab.github.com/research/chromium-ipc-vulnerabilities
  3573. https://penthertz.com/blog/testing-LoRa-with-SDR-and-handy-tools.html
  3574. https://sidechannel.tempestsi.com/the-cypher-injection-saga-9698d19bed4
  3575. https://web-in-security.blogspot.com/2020/01/cve-2020-2655-jsse-client.html
  3576. http://bit.ly/2tJ0ROo (+)
  3577. https://www.perimeterx.com/blog/analyzing_magecart_malware_from_zero_to_hero/#
  3578. https://trmm.net/Charliewatch
  3579. http://bit.ly/30SbdYr (+)
  3580. https://lapcatsoftware.com/articles/Safari-runs-disabled-extensions.html
  3581. https://nathandavison.com/blog/exploiting-email-address-parsing-with-aws-ses
  3582. https://hackerone.com/reports/759247
  3583. https://rderik.com/blog/using-lldb-for-reverse-engineering/
  3584. https://hacker.house/lab/windows-defender-bypassing-for-meterpreter/
  3585. http://bit.ly/2uOWK3r (+)
  3586. https://www.crummie5.club/pwning-a-pwned-citrix/
  3587. https://www.onsecurity.co.uk/blog/abusing-kerberos-from-linux
  3588. http://bit.ly/38XUNRn (+)
  3589. https://insert-script.blogspot.com/2020/01/internet-explorer-mhtml-why-you-should.html
  3590. http://bit.ly/3aT2ObT (+)
  3591. https://blog.gypsyengineer.com/en/security/cve-2020-1925-ssrf-in-apache-olingo.html
  3592. https://medium.com/@maxi./finding-and-exploiting-cve-2018-7445-f3103f163cc1
  3593. https://posts.specterops.io/attacking-azure-azure-ad-and-introducing-powerzure-ca70b330511a
  3594. https://www.mdsec.co.uk/2020/01/deep-dive-to-citrix-adc-remote-code-execution-cve-2019-19781/
  3595. https://littlegptracker.com/
  3596. https://bad-radio.solutions/notes_nrf51822
  3597. https://medium.com/@vmsp/blocking-your-adblocker-967d1c6e48f2
  3598. http://bit.ly/2SmJ7Rn (+)
  3599. https://www.perimeterx.com/tech-blog/2020/whatsapp-fs-read-vuln-disclosure/
  3600. https://techblog.mediaservice.net/2020/01/ok-google-bypass-the-authentication/
  3601. https://www.n00py.io/2020/02/exploiting-ldap-server-null-bind/
  3602. https://landgrey.me/blog/11/
  3603. https://blog.assetnote.io/bug-bounty/2020/02/01/expanding-attack-surface-react-native/
  3604. http://bit.ly/2GWYw5F (+)
  3605. https://blog.doyensec.com/2020/02/03/heap-exploit.html
  3606. http://bit.ly/31xKocu (+)
  3607. https://www.sudo.ws/alerts/pwfeedback.html
  3608. https://blog.kitor.pl/blog/avocent-ip-kvm-any-sip-hack
  3609. http://bit.ly/2GZpbij (+)
  3610. https://sandboxescaper.blogspot.com/2019/12/chasing-polar-bears-part-one.html
  3611. http://blog.ant0i.net/2020/02/down-rabbit-hole-of-harvested-personal.html
  3612. https://habr.com/en/post/486856/
  3613. http://www.simonweckert.com/googlemapshacks.html
  3614. https://www.hackerhealth.net/
  3615. https://medium.com/bugbountywriteup/haxing-minesweeper-e79ece9f5d16
  3616. http://b.fl7.de/2014/09/amazon-stored-xss-book-metadata.html
  3617. http://blog.nativeflow.com/the-futex-vulnerability
  3618. http://cultofthedyingsun.wordpress.com/2014/09/12/death-by-magick-number-fingerprinting-kippo-2014/
  3619. http://www.pugo.org/project/pshttpd/
  3620. http://vicenteaguileradiaz.com/tools/
  3621. http://www.nosqlmap.net/
  3622. http://media.ccc.de/browse/conferences/mrmcd/mrmcd14/
  3623. http://www.contextis.co.uk/resources/blog/hacking-canon-pixma-printers-doomed-encryption/
  3624. https://www.youtube.com/playlist?list=PLmfJypsykTLVGqTWJMu4ybJPiew7PUkH2
  3625. http://blog.spiderlabs.com/2014/09/leveraging-lfi-to-get-full-compromise-on-wordpress-sites.html
  3626. http://blog.opensecurityresearch.com/2014/09/hostapd-wpe-now-with-more-pwnage.html
  3627. http://insert-script.blogspot.co.at/2014/09/sitekiosk-breakout.html
  3628. http://dfir.org/?q=node/8/
  3629. http://www.whited00r.com/
  3630. http://pwnable.kr/
  3631. http://pathonproject.com/zb/?5b343c33591c9cc9#Pc9t/zKg8zWJUNkqqvYhuuL7Lofz8PGTX7R3qat0i/8=
  3632. http://blog.binamuse.com/2014/09/coregraphics-memory-corruption.html
  3633. http://avlidienbrunn.se/angular.txt
  3634. https://erenyagdiran.github.io/I-was-just-asked-to-crack-a-program-Part-1/
  3635. https://code.google.com/p/miasm/
  3636. http://breenmachine.blogspot.ca/2014/09/transfer-file-over-dns-in-windows-with.html
  3637. http://forensic.n0fate.com/?page_id=1180
  3638. http://thehackernews.com/2014/09/hacking-ebay-accounts.html
  3639. http://www.cloudscan.me/2014/09/cve-2014-4406-apple-sa-2014-09-17-5-os.html
  3640. http://www.martinvigo.com/a-look-into-lastpass/
  3641. https://blog.cloudflare.com/keyless-ssl-the-nitty-gritty-technical-details/
  3642. http://countuponsecurity.com/2014/09/22/malicious-documents-pdf-analysis-in-5-steps/
  3643. http://www.theamazingking.com/crypto.php
  3644. http://javahacker.com/a-javascript-challenge-for-nordic-js/
  3645. https://gist.github.com/ethicalhack3r/cb06f575c6ba28644e9a
  3646. http://www.rafayhackingarticles.net/2014/10/a-tale-of-another-sop-bypass-in-android.html
  3647. http://hexed.it/
  3648. http://lansec.net/project/scoutbot/
  3649. http://marketplace.eclipse.org/content/contrast-eclipse
  3650. http://pastebin.com/VyMs3rRd
  3651. http://d.uijn.nl/?p=32
  3652. http://marc.info/?l=qmail&m=141183309314366&w=2
  3653. https://diablohorn.wordpress.com/2011/10/19/8009-the-forgotten-tomcat-port/
  3654. http://opensecuritytraining.info/HTID.html
  3655. https://dnsleaktest.com/
  3656. http://blog.cobaltstrike.com/2014/10/01/user-driven-attacks/
  3657. https://shirt.codes/
  3658. http://www.cs.bham.ac.uk/~exr/lectures/opsys/10_11/lectures/os-dev.pdf
  3659. http://www.righto.com/2014/09/mining-bitcoin-with-pencil-and-paper.html
  3660. http://www.futuresouth.us/yahoo_hacked.html
  3661. http://blog.valverde.me/2014/01/03/reverse-engineering-my-bank's-security-token
  3662. http://handleopenurl.com/scheme
  3663. http://www.powershellmagazine.com/2014/10/03/building-netcat-with-powershell/
  3664. http://www.irongeek.com/i.php?page=videos/derbycon4/mainlist
  3665. http://blog.logrhythm.com/security/do-you-trust-your-computer/
  3666. http://www.cyrozap.com/2014/09/29/reversing-the-symantec-vip-access-provisioning-protocol/
  3667. http://vagmour.eu/persistence-1/
  3668. http://thejh.net/misc/website-terminal-copy-paste
  3669. http://nahamsec.com/2014/10/a-tale-of-2-yahoo-bug-bounty-reports/
  3670. https://tosdr.org/
  3671. http://q.viva64.com/
  3672. https://plus.google.com/+AlexisImperialLegrandGoogle/posts/gJDrVSuteUT
  3673. http://ceukelai.re/?p=11
  3674. http://googleonlinesecurity.blogspot.pt/2014/10/this-poodle-bites-exploiting-ssl-30.html
  3675. http://www.bsk-consulting.de/2014/10/04/smart-dll-execution-malware-analysis-sandbox-systems/
  3676. http://seclists.org/fulldisclosure/2014/Oct/53
  3677. https://www.drupal.org/SA-CORE-2014-005
  3678. http://securityaffairs.co/wordpress/29104/hacking/authentication-vulnerability-paypal-mobile.html
  3679. http://blog.toft.io/exploiting-unsecure-web-servers-with-svn-directories/
  3680. http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Hacking-my-smart-TV-an-old-new-thing/ba-p/6645844
  3681. http://www.appliednsm.com/introducing-flowbat/
  3682. http://conference.hitb.org/hitbsecconf2014kul/materials/
  3683. https://sysforensics.org/2014/10/forensics-in-the-amazon-cloud-ec2.html
  3684. http://applidium.com/en/news/hacking_the_navigo/
  3685. https://www.securusglobal.com/community/2014/10/13/bypassing-wafs-with-svg/
  3686. https://gist.github.com/anonymous/64ba9e34a018ebd86f70
  3687. http://openideals.com/2014/10/13/linux-commands-for-bluetooth-namespace-messaging/
  3688. http://www.websecuritylog.com/2014/10/facebook--bug-bounty.html
  3689. http://brutelogic.wordpress.com/2014/10/14/an-ssh-short-story-hack/
  3690. http://blog.detectify.com/post/100600514143/hostile-subdomain-takeover-using-heroku-github-desk
  3691. https://corkami.googlecode.com/svn/trunk/src/angecryption/
  3692. https://dutzi.github.io/tamper/
  3693. http://cyberarms.wordpress.com/2014/10/16/mana-tutorial-the-intelligent-rogue-wi-fi-router/
  3694. http://digital-forensics.sans.org/community/downloads
  3695. http://www.roe.ch/SSLsplit
  3696. http://www.agarri.fr/blog/
  3697. https://ruxcon.org.au/slides/
  3698. https://ruxconbreakpoint.com/slides/
  3699. http://securityaffairs.co/wordpress/29302/hacking/serious-flaw-addthis.html
  3700. https://blog.prakharprasad.com/2014/10/hackerone-vulnerability-common-response.html
  3701. http://www.securitysift.com/passive-reconnaissance/
  3702. http://cylonjs.com/
  3703. https://amp.twimg.com/v/7cb46f6d-9589-43c1-9ac9-3ac1ab697413
  3704. https://dhowe.github.io/AdNauseam/
  3705. http://blog.dornea.nu/2014/09/17/generate-all-ip-addresses-from-asn/
  3706. http://www.sectechno.com/2014/10/26/balbuzard-malware-analysis-tool/
  3707. https://www.apple.com/privacy/docs/iOS_Security_Guide_Oct_2014.pdf
  3708. http://blog.dornea.nu/2014/07/07/disect-android-apks-like-a-pro-static-code-analysis/
  3709. http://blog.infobytesec.com/2014/10/abusing-dialog-for-fun-and-profit.html
  3710. http://www.net-security.org/insecure-archive.php
  3711. http://n0where.net/how-to-iptables-firewall/
  3712. http://rationallyparanoid.com/articles/diskless-ssh-honeypot-alpine-linux.html
  3713. http://ezprompt.net/
  3714. http://packetlife.net/library/cheat-sheets/
  3715. https://security.stackexchange.com/questions/56181/hack-into-a-computer-through-mac-and-ip-address
  3716. http://blog.it-securityguard.com/bugbounty-the-5000-google-xss/
  3717. http://iamajin.blogspot.in/2014/11/when-gifs-serve-javascript.html
  3718. http://features.jsomers.net/how-i-reverse-engineered-google-docs/
  3719. https://code.facebook.com/posts/844436395567983/introducing-osquery/
  3720. http://edge-security.blogspot.com.es/2014/10/wfuzz-21-released.html
  3721. http://cultofthedyingsun.wordpress.com/2014/11/01/antivirus-evading-executable-and-post-exploitation-with-the-veil-evasion-framework-and-metasploit/
  3722. https://www.sektioneins.de/en/blog/14-11-03-drupal-sql-injection-vulnerability-PoC.html
  3723. http://digi.ninja/projects/http_traceroute.php
  3724. http://blog.badtrace.com/post/how-i-got-a-root-shell-in-my-nas-0day-inside/
  3725. https://medium.com/@oleavr/anatomy-of-a-code-tracer-b081aadb0df8
  3726. https://community.rapid7.com/community/metasploit/blog/2014/10/28/r7-2014-15-gnu-wget-ftp-symlink-arbitrary-filesystem-access
  3727. http://cyber.bgu.ac.il/content/how-leak-sensitive-data-isolated-computer-air-gap-near-mobile-phone-airhopper
  3728. http://randomthoughts.greyhats.it/2014/10/osx-local-privilege-escalation.html
  3729. http://acez.re/ps-vita-level-1-webkitties-3/
  3730. https://timtaubert.de/blog/2014/10/http-public-key-pinning-explained/
  3731. http://crimsonglow.ca/~kjiwa/x86-dos-boot-sector-in-c.html
  3732. http://www.hydrantlabs.org/Security/Google/Chrome/
  3733. http://blog.noobroot.com/2014/02/owncloud-600a-when-xss-vulnerability.html
  3734. http://gacksecurity.blogspot.co.uk/2014/02/beef-and-armitage-get-married.html
  3735. http://forum.yubico.com/viewtopic.php?f=26&t=1171
  3736. http://blackhatlibrary.net/Azazel
  3737. http://blog.sucuri.net/2014/02/php-backdoors-hidden-with-clever-use-of-extract-function.html
  3738. http://www.devttys0.com/2014/02/wrt120n-fprintf-stack-overflow/
  3739. http://www.sjdjweis.com/linux/proxyarp/
  3740. https://hackerone.com/reports/1356
  3741. http://vagosec.org/2014/02/google-drive-clickjacking-vulnerability/
  3742. http://www.tripwire.com/state-of-security/vulnerability-management/creating-iphone-rootkits-and-like-the-nsas-dropout-jeep/
  3743. https://community.rapid7.com/community/metasploit/blog/2014/02/18/lets-talk-about-your-security-breach-with-metasploit-literally
  3744. http://grahamcluley.com/2014/02/passwords-leaked-live-tv-flood-emergency/
  3745. https://www.youtube.com/watch?v=VggwVuboLoo
  3746. http://www.zerodayclothing.com/
  3747. http://packetstormsecurity.com/files/129081/VL-936.txt
  3748. https://labs.integrity.pt/articles/from-0-day-to-exploit-buffer-overflow-in-belkin-n750-cve-2014-1635/
  3749. https://mozilla.github.io/server-side-tls/ssl-config-generator/
  3750. http://decalage.info/vba_tools
  3751. http://sourceforge.net/projects/justniffer/
  3752. http://www.irongeek.com/xss-sql-injection-fuzzing-barcode-generator.php
  3753. http://ferdogan.net/PDF-Malware-Analiz-Teknikleri/
  3754. https://www.paloaltonetworks.com/content/dam/paloaltonetworks-com/en_US/assets/pdf/reports/Unit_42/unit42-wirelurker.pdf
  3755. http://argus-sec.com/blog/remote-attack-aftermarket-telematics-service/
  3756. http://tyranidslair.blogspot.co.uk/2014/11/whens-documenturl-not-documenturl-cve.html
  3757. https://opensource.srlabs.de/projects/badusb
  3758. http://forensicsfromthesausagefactory.blogspot.ae/2014/11/imaging-drives-protected-with-apple.html
  3759. http://tonyarcieri.com/cream-the-scary-ssl-attack-youve-probably-never-heard-of
  3760. http://nethack4.org/blog/building-c.html
  3761. http://lcamtuf.blogspot.pt/2014/11/pulling-jpegs-out-of-thin-air.html
  3762. http://www.fredericb.info/2014/11/exploitation-of-philips-smart-tv.html
  3763. http://sijmen.ruwhof.net/weblog/256-cross-site-scripting-in-millions-of-web-sites
  3764. http://www.fruitywifi.com/
  3765. http://www.procdot.com/index.htm
  3766. https://wireedit.com
  3767. http://forensic.n0fate.com/tools/chainbreaker/
  3768. https://www.jssec.org/dl/android_securecoding_en_20140701.pdf
  3769. http://huaweihg612hacking.wordpress.com/2012/11/07/jtaging-the-broadcom-bcm6368-hg612/
  3770. http://bartblaze.blogspot.pt/2014/11/malware-spreading-via-steam-chat.html
  3771. https://www.trustedsec.com/november-2014/meterssh-meterpreter-ssh/
  3772. http://www.swordsec.com/download/20FantasticKaliLinuxTools.pdf
  3773. http://blog.h3xstream.com/2014/11/remote-code-execution-by-design.html
  3774. http://2014.zeronights.org/conference-materials.html
  3775. http://xmodulo.com/access-linux-command-cheat-sheets-command-line.html
  3776. http://www.openvim.com/tutorial.html
  3777. http://www.coalfire.com/The-Coalfire-Blog/November-2014/Reverse-Shells-and-Your-Car
  3778. https://opensoc.github.io/
  3779. https://bitbucket.org/al14s/rawr/wiki/Home
  3780. http://hasherezade.net/IAT_patcher/
  3781. http://goo.gl/AkU519 (+)
  3782. http://webstersprodigy.net/2014/11/19/use-after-free-exploits-for-humans-part-1-exploiting-ms13-080-on-ie8-winxpsp3/
  3783. http://smealum.net/ninjhax/
  3784. http://klikki.fi/adv/wordpress.html
  3785. http://tyranidslair.blogspot.co.uk/2014/11/stupid-is-as-stupid-does-when-it-comes.html
  3786. http://www.nosuchcon.org/talks/2014/
  3787. https://www.youtube.com/user/unixfreaxjp/videos
  3788. http://unibios.free.fr/cdsystem.html
  3789. http://screeps.com/
  3790. http://mtayseer.net/2014/11/06/your-python-smells-like-java/
  3791. http://googleonlinesecurity.blogspot.pt/2014/12/are-you-robot-introducing-no-captcha.html
  3792. http://www.anandprakash.pw/search/label/bug%20bounty
  3793. http://securityaffairs.co/wordpress/30755/hacking/hacking-paypal-account-poc.html
  3794. http://www.labofapenetrationtester.com/2014/11/powershell-for-client-side-attacks.html
  3795. https://pacsec.jp/psj14archive.html
  3796. http://blog.fox-it.com/2014/11/18/cryptophp-analysis-of-a-hidden-threat-inside-popular-content-management-systems/
  3797. http://www.behindthefirewalls.com/2014/12/cve-2014-9016-and-cve-2014-9034-PoC.html
  3798. https://www.redteam-pentesting.de/en/advisories/rt-sa-2014-011/-entrypass-n5200-credentials-disclosure
  3799. http://farlight.org/
  3800. http://wafbypass.me/w/index.php/Main_Page
  3801. http://www.qemu-advent-calendar.org/
  3802. http://pdos.csail.mit.edu/scigen/
  3803. http://blog.dewhurstsecurity.com/2014/12/09/how-i-hacked-facebook.html
  3804. http://josipfranjkovic.blogspot.pt/
  3805. https://gist.github.com/worawit/84ab41358b8465966224
  3806. http://cxsecurity.com/issue/WLB-2014120030
  3807. https://securityreliks.wordpress.com/2010/08/20/devtcp-as-a-weapon/
  3808. http://desowin.org/usbpcap/tour.html
  3809. http://cybersecurity.upv.es/attacks/offset2lib/offset2lib.html
  3810. http://securityintelligence.com/spoofedme-social-login-attack-discovered-by-ibm-x-force-researchers/
  3811. https://evil32.com/
  3812. http://pen-testing.sans.org/blog/pen-testing/2014/12/04/cross-site-scripting-through-file-metedata
  3813. http://samiux.blogspot.pt/2014/12/howto-arpon-on-kali-linux-109a.html
  3814. https://forsec.nl/2014/12/reading-outlook-using-metasploit/
  3815. http://h30499.www3.hp.com/t5/Fortify-Application-Security/Leveraging-SimpleHTTPServer-as-a-Simple-Web-Honeypot/ba-p/6682905
  3816. http://www.jfedor.org/aaquake2/
  3817. http://alexnisnevich.github.io/untrusted/
  3818. http://researchcenter.paloaltonetworks.com/2014/12/google-chrome-exploitation-case-study/
  3819. https://blog.gaborszathmari.me/2014/12/10/wordpress-exploitation-with-xss/
  3820. http://securityaffairs.co/wordpress/31120/hacking/fixed-critical-flaw-blogger-allows-write-posts-blog.html
  3821. http://morris.guru/detecting-kippo-ssh-honeypots/
  3822. http://briskinfosec.blogspot.in/2014/12/reverce-shells-for-exploit-command.html?m=1
  3823. http://www.cipherdyne.org/blog/2014/12/ram-disks-and-saving-your-ssd-from-afl-fuzzing.html
  3824. http://homakov.blogspot.gr/2014/11/hacking-file-uploaders-with-race.html
  3825. https://blog.whitehatsec.com/hackerkast-11-bonus-round/
  3826. http://blog.opensecurityresearch.com/2012/02/json-csrf-with-parameter-padding.html
  3827. http://dogber1.blogspot.fr/2009/05/table-of-reverse-engineered-bios.html
  3828. http://insert-script.blogspot.co.at/2014/12/multiple-pdf-vulnerabilites-text-and.html
  3829. http://blog.malwaretracker.com/2014/12/cve-2014-4114cve-2014-6352-evade-av-by.html?spref=tw
  3830. http://robertheaton.com/2014/12/08/fun-with-your-friends-facebook-and-tinder-session-tokens/
  3831. http://js1k.com/2014-dragons/demo/1854
  3832. http://nathanfriend.io/inspirograph/
  3833. http://git-blame.blogspot.pt/2014/12/git-1856-195-205-214-and-221-and.html
  3834. http://sintheticlabs.com/blog/a-look-inside-facebooks-source-code.html
  3835. http://hak-it.blogspot.pt/2014/12/stored-xss-on-facebook-and-twitter_18.html
  3836. http://pen-testing.sans.org/blog/pen-testing/2014/12/10/awkward-binary-file-transfers-with-cut-and-paste
  3837. http://hooked-on-mnemonics.blogspot.pt/p/injdmp.html
  3838. http://www.darknet.org.uk/2014/12/bluemaho-project-bluetooth-security-testing-suite/
  3839. http://xgusix.com/blog/analyzing-a-malicious-excel-file-with-oledump-py/
  3840. https://titanous.com/posts/docker-insecurity
  3841. http://lifeat.tetrane.com/2014/12/ie-crash-analysis.html
  3842. http://breenmachine.blogspot.gr/2014/12/raining-shells-ambari-0-day.html
  3843. https://securityblog.redhat.com/2014/12/10/analysis-of-the-cve-2013-6435-flaw-in-rpm/
  3844. http://www.justanotherhacker.com/2011/12/writing-a-stealth-web-shell.html
  3845. http://web-in-security.blogspot.pt/2014/11/detecting-and-exploiting-xxe-in-saml.html
  3846. https://media.defcon.org/DEF%20CON%2022/DEF%20CON%2022%20video%20and%20slides/
  3847. http://www.keurighack.com/
  3848. https://www.druid.es/content/gopro-firmware-forensic
  3849. http://hackertyper.com/
  3850. https://trmm.net/thunderstrike
  3851. http://attack-secure.com/hacked-facebook-word-document/
  3852. http://mis.fortunecook.ie/
  3853. http://www.signedness.org/tools/
  3854. https://code.google.com/p/google-security-research/issues/detail?id=118
  3855. http://www.wains.be/pub/networking/tcpdump_advanced_filters.txt
  3856. http://aluigi.altervista.org/mytoolz.htm
  3857. http://dnscrypt.org/
  3858. http://khr0x40sh.wordpress.com/2014/06/10/moftastic_powershell/
  3859. http://gkbrk.com/blog/read?name=reverse_engineering_the_speedtest_net_protocol
  3860. http://www.vanimpe.eu/2014/12/13/using-elk-dashboard-honeypots/
  3861. http://blog.h3xstream.com/2014/12/predicting-struts-csrf-token-cve-2014.html
  3862. http://blog.xbc.nz/2014/12/lastpass-attempt-at-client-side-android.html
  3863. http://breenmachine.blogspot.gr/2014/12/mssql-mitm-ftw-ettercap-and-responder.html
  3864. https://blog.hboeck.de/archives/863-Dont-update-NTP-stop-using-it.html
  3865. https://bettercrypto.org/
  3866. http://www.montulli.org/theoriginofthe%3Cblink%3Etag
  3867. http://www.its.caltech.edu/~costis/sgb_hack/
  3868. https://stribika.github.io/2015/01/04/secure-secure-shell.html
  3869. https://code.google.com/p/usboblivion/
  3870. https://endrift.com/mgba/2014/12/28/classic-nes/
  3871. http://www.insinuator.net/2014/12/revisiting-an-old-friend-shell-globbing/
  3872. https://blog.haschek.at/post/fd9bc
  3873. http://ednolo.alumnos.upv.es/?p=1883
  3874. http://ednolo.alumnos.upv.es/papers/advisories/CVE-2015-0554_pirelli.txt
  3875. http://www.ifc0nfig.com/moonpig-vulnerability/
  3876. https://hatriot.github.io/blog/2015/01/06/ntpdc-exploit/
  3877. http://hackerschool.org/DefconCTF/17/B300.html
  3878. http://moviecode.tumblr.com/
  3879. https://cmd.fm/
  3880. http://habrahabr.ru/company/pt/blog/247709/
  3881. http://zoczus.blogspot.de/2015/01/yammercom-same-origin-method-execution.html?spref=tw
  3882. http://rtwaysea.net/blog/blog-2013-10-18-long.html
  3883. http://michenriksen.com/blog/gitrob-putting-the-open-source-in-osint/
  3884. http://seclist.us/inception-is-a-physical-memory-manipulation-and-hacking-tool-exploiting-pci-based-dma.html
  3885. http://networkfilter.blogspot.pt/2015/01/be-your-own-vpn-provider-with-openbsd.html
  3886. http://www.hexacorn.com/blog/2015/01/08/decompiling-compiled-autoit-scripts-64-bit-take-two/
  3887. https://milo2012.wordpress.com/2015/01/08/proxy-tester-script/
  3888. http://blog.sucuri.net/2015/01/website-backdoors-leverage-the-pastebin-service.html
  3889. https://blog.avast.com/2015/01/06/linux-ddos-trojan-hiding-itself-with-an-embedded-rootkit/
  3890. http://web-in-security.blogspot.pt/2015/01/save-your-cloud-exploiting-eucalyptus.html?spref=tw
  3891. http://www.giac.org/paper/gpen/6684/aix-penetration-testers/125890
  3892. http://randomthoughts.greyhats.it/2015/01/osx-bluetooth-lpe.html
  3893. http://www.shortbus.ninja/phishbait-scraping-the-web-for-email-addresses/
  3894. http://smealum.net/?p=517
  3895. http://blog.lse.epita.fr/articles/75-sstpinball.html
  3896. http://script-ed.org/?p=1671
  3897. https://www.imperialviolet.org/2014/02/22/applebug.html
  3898. https://gist.github.com/joernchen/a7c031b6b8df5d5d0b61
  3899. http://www.droidsec.org/news/2014/02/26/on-the-webview-addjsif-saga.html
  3900. http://lanmaster53.com/2013/07/multi-post-csrf/
  3901. http://7h3ram.github.io/
  3902. http://blog.cassidiancybersecurity.com/post/2014/02/Bitcrypt-broken
  3903. http://www.welivesecurity.com/2014/02/21/an-in-depth-analysis-of-linuxebury/
  3904. http://bromiumlabs.files.wordpress.com/2014/02/bypassing-emet-4-1.pdf
  3905. http://recon.cx/2013/schedule/schedule.html
  3906. http://labs.bromium.com/2014/02/25/dissecting-the-newest-ie10-0-day-exploit-cve-2014-0322/
  3907. http://r000t.com/who-hacked-ec-council/ | https://twitter.com/JamieCaitlin/status/438391518697512960
  3908. http://www.w3.org/People/Raggett/book4/ch02.html
  3909. http://drops.wooyun.org/papers/4621#yjs_add_arg=9893
  3910. http://breakingbits.net/2015/01/18/taking-over-godaddy-accounts-using-csrf
  3911. http://potatohatsecurity.tumblr.com/post/108756906604/admin-google-com-reflected-cross-site-scripting
  3912. http://omriher.blogspot.co.il/2015/01/captipper-malicious-http-traffic.html
  3913. http://www.hackwhackandsmack.com/?p=452
  3914. http://www.labofapenetrationtester.com/2015/01/fun-with-dns-txt-records-and-powershell.html
  3915. http://blog.defragger.org/radare-max++.html
  3916. http://resources.infosecinstitute.com/intelligence-information-gathering-collecting-twitter-followers-25-lines-python/
  3917. http://www.checkpoint.com/downloads/partners/TCC-Silverlight-Jan2015.pdf
  3918. http://sectooladdict.blogspot.co.il/2014/12/el-30-injection-java-is-getting-hacker.html
  3919. http://raidersec.blogspot.ca/2013/06/how-browsers-store-your-passwords-and.html
  3920. http://packetstormsecurity.com/files/122655/LIXIL-Satis-Toilet-Hard-Coded-Bluetooth-PIN.html
  3921. http://www.lofibucket.com/articles/oscilloscope_quake.html
  3922. http://chargen.matasano.com/chargen/2015/1/27/vulnerability-overview-ghost-cve-2015-0235.html
  3923. https://hackerone.com/reports/44146
  3924. http://potatohatsecurity.tumblr.com/post/108197611404/yahoo-root-access-sql-injection-tw-yahoo-com
  3925. https://gitweb.torproject.org/user/jvoisin/mat.git
  3926. http://www.gironsec.com/blog/2015/01/owning_modems_and_routers_silently/
  3927. https://forsec.nl/2015/01/bash-data-exfiltration-through-dns-using-bash-builtin-functions/
  3928. http://securitycafe.ro/2014/12/19/how-to-intercept-traffic-from-java-applications/
  3929. http://chichou.0ginr.com/blog/1023
  3930. https://capsop.com/phpmyadmin
  3931. http://www.malwaretech.com/2015/01/using-kernel-rootkits-to-conceal.html
  3932. http://wouter.coekaerts.be/2015/resurrecting-phantomreference
  3933. https://fail0verflow.com/blog/2014/hubcap-chromecast-root-pt1.html (-root-pt2.html)
  3934. https://milo2012.wordpress.com/2015/01/09/pentesting-firebird-database/
  3935. http://kukuruku.co/hub/infosec/backdoor-in-a-public-rsa-key
  3936. http://www.rfcreader.com/
  3937. http://js-dos.com/
  3938. http://innerht.ml/blog/ie-uxss.html
  3939. http://www.bulbsecurity.com/more-book-exercises-guessable-credentials-apache-tomcat/
  3940. http://wiki.secarmour.com/2013/02/ssi-injection-attack.html
  3941. https://binjitsu.readthedocs.org/en/latest/
  3942. http://0x00string.com/hacktionary/index.php?title=AllShare_Cast
  3943. http://securitycafe.ro/2015/01/05/understanding-php-object-injection/
  3944. https://blog.netspi.com/advisory-xxe-injection-oracle-database-cve-2014-6577/
  3945. http://www.davidlitchfield.com/Privilege_Escalation_via_Oracle_Indexes.pdf
  3946. http://h30499.www3.hp.com/t5/Fortify-Application-Security/Owning-SQLi-vulnerability-with-SQLmap/ba-p/6698577
  3947. http://drops.wooyun.org/papers/4762
  3948. http://keygenmusic.net/
  3949. http://shipyourenemiesglitter.com/
  3950. http://danlec.com/blog/hackerones-first-xss
  3951. http://zoczus.blogspot.pt/2015/02/evercookieswf-stored-cross-site.html
  3952. http://potatohatsecurity.tumblr.com/post/110024705384/google-com-mobile-feedback-url-redirect
  3953. http://samdmarshall.com/re.html
  3954. https://gitlab.maikel.pro/maikeldus/WhatsSpy-Public/wikis/home
  3955. https://net-ninja.net/article/2010/Oct/04/taking-control-of-a-jsp-environment/
  3956. http://breakingmalware.com/vulnerabilities/one-bit-rule-bypassing-windows-10-protections-using-single-bit/
  3957. https://www.checkmarx.com/2014/08/20/swift-security-issues/
  3958. https://rateip.com/blog/sql-injections-in-mysql-limit-clause/
  3959. http://adsecurity.org/?p=1275
  3960. https://isc.sans.edu/forums/diary/Finding+Privilege+Escalation+Flaws+in+Linux/19207/
  3961. http://labs.bromium.com/2015/02/02/exploiting-badiret-vulnerability-cve-2014-9322-linux-kernel-privilege-escalation/
  3962. http://saijogeorge.com/css-puns/
  3963. http://vanilla-js.com/
  3964. http://danlec.com/blog/hacking-stackoverflow-com-s-html-sanitizer
  3965. http://philippeharewood.com/paging-cursors-leaking-data-in-graph-api/
  3966. http://www.shellcheck.net/
  3967. https://jimshaver.net/2015/02/11/decrypting-tls-browser-traffic-with-wireshark-the-easy-way/
  3968. http://seclists.org/fulldisclosure/2015/Feb/56
  3969. http://sourceforge.net/projects/packeth/
  3970. http://shubh.am/exploiting-markdown-syntax-and-telescope-persistent-xss-through-markdown-cve-2014-5144/
  3971. http://blog.sucuri.net/2015/02/creative-evasion-technique-against-website-firewalls.html
  3972. https://www.trustedsec.com/january-2015/account-hunting-invoke-tokenmanipulation/
  3973. http://www.evilsocket.net/2015/01/29/nike-fuelband-se-ble-protocol-reversed/
  3974. http://www.insinuator.net/2015/01/evasion-of-cisco-acls-by-abusing-ipv6-discussion-of-mitigation-techniques/
  3975. https://rh0dev.github.io/blog/2015/fun-with-info-leaks/
  3976. http://haxelion.eu/article/LD_NOT_PRELOADED_FOR_REAL/
  3977. http://pixelscommander.com/en/javascript/nasa-coding-standarts-for-javascript-performance/
  3978. https://littleosbook.github.io/
  3979. http://jasminderpalsingh.info/single.php?p=84
  3980. http://sekurak.pl/xss-w-domenie-www-google-com-postini-header-analyzer/
  3981. http://www.7xter.com/2015/02/how-i-hacked-your-facebook-photos.html
  3982. http://blog.cobaltstrike.com/2015/02/25/my-favorite-powershell-post-exploitation-tools/
  3983. http://infosec42.blogspot.de/2015/02/exploit-seagate-blackarmor-network.html
  3984. http://blog.secureideas.com/2015/02/adventures-in-ldap-injection-exploiting.html
  3985. http://s1gnalcha0s.com/node/2015/01/31/SSJS-webshell-injection.html
  3986. http://www.en.pentester.es/2015/02/from-case-insensitive-to-rce.html
  3987. http://www.proteansec.com/linux/installing-using-cuckoo-malware-analysis-sandbox/
  3988. https://blogs.rsa.com/dns-poisoning-used-boleto-fraud/
  3989. http://w00tsec.blogspot.pt/2015/02/firmware-forensics-diffs-timelines-elfs.html
  3990. http://www.vulnerability-lab.com/get_content.php?id=1432
  3991. http://xmodulo.com/presentation-command-line-linux.html
  3992. http://twitterbiogenerator.com/
  3993. https://beyondbinary.io/advisory/seagate-nas-rce/
  3994. https://www.smacktls.com/#freak
  3995. http://thorly.batr.am/
  3996. https://gist.github.com/worawit/33cc5534cb555a0b710b
  3997. http://blog.rootshell.be/2015/03/04/phpmoadmin-0-day-nmap-script/
  3998. https://blog.whitehatsec.com/dnstest-monitor-your-dns-for-hijacking/
  3999. https://samsclass.info/124/proj14/norton.htm
  4000. http://secureornot.blogspot.co.il/2015/03/gopro-update-mechanism-exposes-multiple.html
  4001. https://barrebas.github.io/blog/2015/02/22/maximum-overkill-two-from-format-string-vulnerability-to-remote-code-execution/
  4002. http://securitycafe.ro/2015/02/23/bypassing-windows-lock-screen-via-flash-screensaver/
  4003. http://www.xexexe.cz/2015/02/bruteforcing-tp-link-routers-with.html
  4004. http://www.vnsecurity.net/research/2015/02/12/msie-vuln-analysis.html
  4005. http://www.contextis.com/resources/blog/automating-removal-java-obfuscation/
  4006. http://pixelambacht.nl/2015/sans-bullshit-sans/
  4007. http://drops.wooyun.org/papers/5107
  4008. https://hackerone.com/reports/48516
  4009. http://sakurity.com/blog/2015/03/05/RECONNECT.html
  4010. https://manifestsecurity.com/appie/
  4011. http://christian-schneider.net/ChromeSopBypassWithSvg.html
  4012. https://lqdc.github.io/making-finfisher-undetectable.html
  4013. https://www.nccgroup.com/media/481815/technical-advisory-multiple-vulnerabilities-in-mailenable.pdf
  4014. http://theelectronjungle.com/2015/02/15/use-after-free-in-vlc-2.1.x/
  4015. http://w00tsec.blogspot.pt/2015/02/extracting-raw-pictures-from-memory.html
  4016. http://www.malwaretech.com/2014/04/coding-malware-for-fun-and-not-for.html
  4017. https://keboch.wordpress.com/2008/11/09/please-accept-this-spider-as-payment/
  4018. https://gist.github.com/dchest/7225cf79c1ea2166489c
  4019. http://googleprojectzero.blogspot.pt/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
  4020. http://www.7xter.com/2015/03/how-i-exposed-your-private-photos.html
  4021. http://nullsecurity.net/tools.html
  4022. http://www.securitysift.com/pecloak-py-an-experiment-in-av-evasion/
  4023. http://www.pritect.net/blog/esc_sql-doh-wordpress-sql-injection-vulnerability
  4024. http://jumpespjump.blogspot.in/2013/01/making-usb-flash-drive-hw-trojan.html
  4025. http://secniche.blogspot.pt/2015/03/a-real-world-story-of-cve-2014-6332-rce.html
  4026. http://www.halfdog.net/Security/2015/HavingFunWithDmesg/
  4027. http://0xthem.blogspot.gr/2015/03/hijacking-ssh-to-inject-port-forwards.html
  4028. http://securitycafe.ro/2015/01/28/intercepting-functions-from-statically-linked-libraries/
  4029. http://www.hackersusethis.com/
  4030. http://blog.nibblesec.org/2015/03/the-old-is-new-again-cve-2011-2461-is.html
  4031. http://sekurak.pl/kolejny-xss-w-www-google-com-custom-search-engine/
  4032. http://netwars-project.com/webdoc
  4033. https://x-ryl669.github.io/Frost/
  4034. https://mozillasecurity.github.io/dharma/
  4035. http://breakingmalware.com/vulnerabilities/vulnerability-patching-learning-from-avg-on-doing-it-right/
  4036. http://labs.detectify.com/post/114572572966/stealing-files-from-web-servers-by-exploiting-a
  4037. http://highon.coffee/blog/ssh-meterpreter-pivoting-techniques/
  4038. http://www.security-explorations.com/en/SE-2014-02-details.html
  4039. http://carnal0wnage.attackresearch.com/2015/03/devooops-revision-control-git.html
  4040. http://ultimatehackingarticles.blogspot.pt/2013/01/error-based-sql-injection-tutorial.html
  4041. https://bughardy.me/a-ghost-tale/
  4042. https://www.nccgroup.com/en/blog/2015/02/abusing-blu-ray-players-pt-1-sandbox-escapes/
  4043. http://shrigley.com/source_code_archive/
  4044. https://www.reddit.com/r/networking/comments/2gjzof/its_been_a_rough_week/
  4045. http://blog.saynotolinux.com/2014/03/01/yahoos-pet-show-of-horrors-abusing-a-crossdomain-proxy-to-leak-a-users-email/
  4046. http://www.jakoblell.com/blog/2013/10/30/real-world-csrf-attack-hijacks-dns-server-configuration-of-tp-link-routers-2/
  4047. http://neocri.me/documentation/using-ssh-certificate-authentication/
  4048. https://www.netspi.com/blog/entryid/220/dekrypto-padding-oracle-attack-against-ibm-websphere-commerce-cve-2013-05230
  4049. http://pwnrules.com/yahoo-suggestions-vulnerability/
  4050. http://www.reddit.com/r/apple/comments/1zh3gw/iphone_5s_continues_to_track_your_motion_even/
  4051. http://packetstormsecurity.com/files/125442/Office-365-Account-Hijacking.html
  4052. http://www.netresec.com/?page=Blog&month=2013-10&post=Command-line-Forensics-of-hacked-PHP-net
  4053. http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Process-Introspection-with-Python/ba-p/6402821
  4054. http://libgen.org/scimag/
  4055. http://quals.sec.codebits.eu/cb/1487ab262e8deb6ec5b9dd49a18d8ac5a/
  4056. http://danlec.com/blog/xss-via-a-spoofed-react-element
  4057. http://tomforb.es/dell-system-detect-rce-vulnerability
  4058. http://kamil.hism.ru/posts/about-vrg-and-delete-any-youtube-video-issue.html
  4059. http://blackarch.org/index.html
  4060. http://packetstormsecurity.com/files/131185/jbossjmx-exec.txt
  4061. http://shadow-file.blogspot.pt/2015/02/bowcaster-feature-multipartform-data.html
  4062. http://www.netresec.com/?page=Blog&month=2015-03&post=China%27s-Man-on-the-Side-Attack-on-GitHub
  4063. http://blog.lumberlabs.com/2012/04/why-app-developers-should-care-about.html
  4064. https://blog.netspi.com/all-you-need-is-one-a-clickonce-love-story/
  4065. https://hsmr.cc/palinopsia/
  4066. http://www.tuxmealux.net/2015/03/10/code-injection/
  4067. http://h30499.www3.hp.com/t5/Fortify-Application-Security/XPATH-Assisted-XXE-Attacks/ba-p/6721576
  4068. https://code.google.com/p/google-security-research/issues/detail?id=222
  4069. https://bugzilla.redhat.com/show_bug.cgi?id=1202858
  4070. http://marcoramilli.blogspot.pt/2015/02/notorious-hacking-groups.html
  4071. http://www.mreagle0x.xyz/2015/01/the-tricky-vineco-xss-and-how-to-filter.html
  4072. http://nahamsec.com/lack-of-domain-verification-by-google/
  4073. http://pouyadarabi.blogspot.pt/2015/03/facebook-bypass-ads-account-roles.html
  4074. http://www.parrotsec.org/
  4075. http://nullonerror.org/2015/04/05/escondendo-informacoes-dentro-de-imagens/
  4076. http://forum.xda-developers.com/android/development/guide-root-method-lg-devices-t3049772
  4077. https://hackerone.com/reports/46916
  4078. https://sploitfun.wordpress.com/
  4079. http://smerity.com/articles/2015/amazon_information_leakage.html
  4080. https://www.reddit.com/r/netsec/comments/2xl412/abusing_rfc_5227_to_dos_windows_hosts/
  4081. https://haiderm.com/column-truncation-sql-injection-vulnerability/
  4082. http://www.websegura.net/advisories/facebook-rfd-and-open-file-upload/
  4083. https://stackoverflow.com/questions/3115559/exploitable-php-functions
  4084. http://blog.loadzero.com/blog/tracking-down-a-segfault-in-grep/
  4085. http://cachemonet.com/
  4086. http://sixteencolors.net/
  4087. https://dougvitale.wordpress.com/2011/12/21/deprecated-linux-networking-commands-and-their-replacements/
  4088. http://intothesymmetry.blogspot.ch/2015/04/open-redirect-in-rfc6749-aka-oauth-20.html
  4089. https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/
  4090. https://ma.ttias.be/remote-code-execution-via-http-request-in-iis-on-windows/
  4091. http://www.openwall.com/lists/oss-security/2015/04/14/4
  4092. https://blog.criticalstack.com/envdb-ask-your-environment-questions/
  4093. http://blog.h3xstream.com/2015/04/crossdomainxml-beware-of-wildcards.html
  4094. http://0xdabbad00.com/2015/04/12/looking_for_security_trouble_spots_in_go_code/
  4095. http://blog.maintenancewindow.ca/post/2015/03/29/Making-Smart-Locks-Smarter-%28aka.-Hacking-the-August-Smart-Lock%29
  4096. http://niiconsulting.com/checkmate/2015/04/server-side-request-forgery-ssrf/
  4097. http://www.labofapenetrationtester.com/2015/02/using-windows-screensaver-as-backdoor.html
  4098. http://beginners.re/
  4099. http://sirdarckcat.blogspot.hk/2014/05/matryoshka-web-application-timing.html
  4100. http://blog.0x3a.com/post/110052845124/an-in-depth-analysis-of-the-fiesta-exploit-kit-an
  4101. http://8088mph.blogspot.pt/2015/04/cga-in-1024-colors-new-mode-illustrated.html
  4102. http://crpgaddict.blogspot.pt/2015/04/game-183-shadowforge-1989.html
  4103. http://visualgo.net/
  4104. http://xn--mric-bpa.fr/blog/blackjack.html
  4105. https://miki.it/blog/2015/4/20/the-power-of-dns-rebinding-stealing-wifi-passwords-with-a-website/
  4106. http://blog.innerht.ml/twitter-crlf-injection/
  4107. https://binary.ninja/
  4108. http://www.kitploit.com/2015/04/rekall-most-complete-memory-analysis.html
  4109. http://tfpwn.com/files/fd-wnr2000v4.txt
  4110. http://www.openwall.com/lists/oss-security/2015/04/22/12
  4111. https://hashcat.net/misc/postgres-pth/postgres-pth.pdf
  4112. https://blog.netspi.com/playing-content-type-xxe-json-endpoints/
  4113. http://bartblaze.blogspot.co.uk/2015/03/c99shell-not-dead.html
  4114. http://www.malcolmstagg.com/bdp-s390.html
  4115. http://v0ids3curity.blogspot.de/2015/04/exploiting-php-bug-66550-sqlite.html
  4116. https://reclaim-your-privacy.com/wiki/Anonabox_Analysis
  4117. http://www.s3cur1ty.de/node/687
  4118. https://www.reddit.com/r/PHP/comments/1l7baq/creating_a_user_from_the_web_problem/
  4119. http://blog.malerisch.net/2015/04/pwning-hp-thin-client.html
  4120. http://www.rafayhackingarticles.net/2015/04/sucuri-waf-xss-filter-bypass.html
  4121. http://klikki.fi/adv/wordpress2.html
  4122. http://w1.fi/security/2015-1/wpa_supplicant-p2p-ssid-overflow.txt
  4123. https://cisofy.com/lynis/
  4124. http://www.paulosyibelo.com/2015/04/facebooks-parse-dom-xss.html
  4125. https://haiderm.com/oracle-sql-injection-guides-and-whitepapers/
  4126. http://www.devttys0.com/2015/04/what-the-ridiculous-fuck-d-link/
  4127. https://www.idontplaydarts.com/2011/11/decrypting-suhosin-sessions-and-cookies/
  4128. http://www.secgeek.net/youtube-vulnerability/
  4129. http://bobao.360.cn/learning/detail/357.html
  4130. https://chentiangemalc.wordpress.com/2015/04/17/patching-a-null-pointer-access-violation/
  4131. http://www.floyd.ch/?p=584
  4132. http://www.gameofhacks.com/
  4133. http://feross.org/hacks/ahh-windows/
  4134. http://blog.bentkowski.info/2015/05/xss-via-file-upload-wwwgooglecom.html
  4135. https://hackerone.com/reports/14883
  4136. https://www.firefart.at/how-to-crack-mifare-classic-cards/
  4137. https://blog.sucuri.net/2015/04/critical-persistent-xss-0day-in-wordpress.html
  4138. http://blog.checkpoint.com/2015/04/20/analyzing-magento-vulnerability/
  4139. http://malware-unplugged.blogspot.ie/2015/01/hunting-and-decrypting-communications.html
  4140. http://www.vulnerability-lab.com/get_content.php?id=1474
  4141. http://synacktiv.ninja/ressources/synacktiv_drupal_xxe_services.pdf
  4142. http://blog.atx.name/reverse-engineering-radio-weather-station/
  4143. https://drive.google.com/a/ase/folderview?id=0B2G2LjIu7WbdfjhaUmVzc1lCR2hUdk5fZllCOHdtbFItbU5qYzdqZGVxdmlnRkJyYVQ4VU0
  4144. http://io.smashthestack.org/
  4145. http://natmchugh.blogspot.co.uk/2015/05/how-to-make-two-binaries-with-same-md5.html
  4146. https://deya2diab.wordpress.com/2015/02/21/yahoo-main-domain-xss/
  4147. http://seclist.us/poodle-attack-poc-implementation-of-the-poodle-attack.html
  4148. https://git.hacklab.kr/snippets/13
  4149. https://bokken.re/
  4150. https://blog.netspi.com/forcing-xxe-reflection-server-error-messages/
  4151. http://blog.bentkowski.info/2015/04/xss-via-host-header-cse.html
  4152. http://hextechsecurity.com/?p=123
  4153. http://blog.silentsignal.eu/2015/05/07/cve-2014-3440-symantec-critical-system-protection-remote-code-execution/
  4154. http://www.viva64.com/en/a/0084/
  4155. https://blog.cloudflare.com/an-introduction-to-javascript-based-ddos/
  4156. http://blog.amossys.fr/Automated%20Reverse%20Engineering%20of%20Cryptographic%20Algorithms.html
  4157. http://www.windows93.net/
  4158. http://code.snipcademy.com/tutorials/command-line/steak/cooking
  4159. https://weakdh.org/
  4160. http://blog.bentkowski.info/2015/05/xss-via-windowstop-google-safen-up.html
  4161. https://dnsdumpster.com/
  4162. http://www.contextis.com/resources/blog/manually-testing-ssltls-weaknesses/
  4163. http://jumpespjump.blogspot.ca/2015/05/many-ways-of-malware-persistence-that.html
  4164. http://www.kazamiya.net/en/artifact/wipe/deletedsc
  4165. https://rya.nc/cert-tricks.html
  4166. http://security.cs.rpi.edu/courses/binexp-spring2015/
  4167. http://blog.gdssecurity.com/labs/2015/4/29/automated-data-exfiltration-with-xxe.html
  4168. http://www.adlice.com/bho-a-spy-in-your-browser/
  4169. https://drive.google.com/a/share/folderview?id=0B7rtSe_PH_fTWDQ0RC1DeWVoVUE&usp=sharing#
  4170. http://www.manuel-strehl.de/dev/minimal_git_folder
  4171. http://instantlyfuzzyshark.tumblr.com/post/119456076505/unauthorized-deletion-of-google-collections
  4172. http://sakurity.com/blog/2015/05/21/starbucks.html
  4173. http://www.benhayak.com/2015/05/stealing-private-photo-albums-from-Google.html
  4174. http://www.kitploit.com/2015/05/remote-dll-injector-v20-command-line.html
  4175. http://www.binvul.com/viewthread.php?tid=508
  4176. http://ab0files.com/writing-a-metasploit-post-exploitation-module
  4177. http://www.backerstreet.com/rec/rec.htm
  4178. http://seclist.us/updates-windows-exploit-suggester-revision-v-2-5.html
  4179. http://www.pagerduty.com/blog/the-discovery-of-apache-zookeepers-poison-packet/
  4180. http://sakurity.com/blog/2015/05/08/pusher.html
  4181. https://stackoff.ru/pochemu-reklama-v-skajpe-ne-tolko-urodliva-no-eshhe-i-opasna/
  4182. http://securityinside.info/evitando-hsts-una-cuestion-de-tiempo/
  4183. http://venom.crowdstrike.com/
  4184. http://cory.li/bytecode-hacking/
  4185. https://www.altsci.com/ipsec/
  4186. https://blog.netspi.com/gpu-cracking-rebuilding-box/
  4187. http://stacksmasher.me/tutorials/browser-anonymity-and-security/
  4188. https://reverse.put.as/2015/05/29/the-empire-strikes-back-apple-how-your-mac-firmware-security-is-completely-broken/
  4189. http://labs.detectify.com/post/120088174539/building-an-xss-polyglot-through-swf-and-csp
  4190. https://www.exploit-db.com/docs/35152.pdf
  4191. http://caca.zoy.org/wiki/zzuf
  4192. http://samy.pl/opensesame/
  4193. http://hackerhurricane.blogspot.nl/2015/05/defending-against-powershell-shells.html
  4194. http://xn--thibaud-dya.fr/robots.txt.html
  4195. http://web-in-security.blogspot.de/2015/05/how-to-attack-xml-encryption-in-ibm.html
  4196. https://blog.whitehatsec.com/magic-hashes/
  4197. http://blog.balicbilisim.com/gomulu-cihaz-guvenligi-ve-zollard-botnet-analizi/
  4198. http://jaanuskp.blogspot.cz/2015/05/cve-2015-3200.html
  4199. https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/1219337
  4200. http://www.dimitrifourny.com/2014/03/08/how-i-have-fuzzed-php/
  4201. http://pastebin.com/0EqWGmTi
  4202. http://linuxaria.com/howto/ssh-in-2-steps-on-linux-with-google-authenticator?lang=en
  4203. http://console-cowboys.blogspot.co.uk/2014/03/the-curious-case-of-ninjamonkeypiratela.html
  4204. http://bas.bosschert.nl/steal-whatsapp-database/
  4205. https://code.google.com/p/chromium/issues/detail?id=240058
  4206. http://zairon.wordpress.com/2014/03/06/obfuscated-shellcode-inside-a-malicious-rtf-document/
  4207. http://www.palkeo.com/code/stealing-bitcoin.html
  4208. http://www.2uo.de/myths-about-urandom/
  4209. http://0xa.li/php-date-is-xssable/
  4210. https://intrepidusgroup.com/insight/2014/03/atv-password-log-bug/
  4211. http://mreagle0x.blogspot.in/2014/03/how-can-i-get-your-facebook-account.html
  4212. https://bugzilla.mozilla.org/show_bug.cgi?id=949446
  4213. https://labs.portcullis.co.uk/blog/raspberry-ph0wn/
  4214. http://labs.detectify.com/post/120855545341/google-xss-turkey
  4215. http://topolik-at-work.blogspot.cz/2015/06/cve-2015-3096-rosetta-flash-fix-bypass.html
  4216. http://ddecode.com/phpdecoder/
  4217. https://www.exploit-db.com/exploits/37098/
  4218. https://cxsecurity.com/issue/WLB-2015050153
  4219. http://blog.jpcert.or.jp/.s/2015/05/a-new-uac-bypass-method-that-dridex-uses.html
  4220. http://media.ccc.de/browse/conferences/camp1999/
  4221. https://blog.coresecurity.com/2015/05/18/ms15-011-microsoft-windows-group-policy-real-exploitation-via-a-smb-mitm-attack/
  4222. https://www.anfractuosity.com/projects/timeshifter/
  4223. http://www.defenceindepth.net/2013/11/oracle-listener-11107-information.html
  4224. http://n0where.net/best-onion-links-deep-web/
  4225. https://hackerone.com/reports/52042
  4226. http://mksben.l0.cm/2015/06/bypassing-xss-filter-showmodaldialog.html
  4227. http://www.benhayak.com/2015/06/same-origin-method-execution-some.html
  4228. http://seclists.org/fulldisclosure/2015/May/122
  4229. https://html5sec.org/cspbypass/
  4230. https://forum.bugcrowd.com/t/sqlmap-tamper-scripts-sql-injection-and-waf-bypass/423
  4231. http://cheeky4n6monkey.blogspot.pt/2015/06/extracting-pictures-from-ms-office-2007.html
  4232. http://www.shelliscoming.com/2015/06/tls-injector-running-shellcodes-through.html
  4233. https://benmmurphy.github.io/blog/2015/06/04/redis-eval-lua-sandbox-escape/
  4234. http://0xdabbad00.com/2015/04/18/go_code_auditing/
  4235. https://expdev-kiuhnm.rhcloud.com/2015/05/11/contents/
  4236. https://blog.benjojo.co.uk/post/auditing-github-users-keys
  4237. http://security.coverity.com/blog/2015/Jun/a-slice-of-pie.html
  4238. http://www.patrick-wied.at/static/nudejs/
  4239. http://jstnkndy.blogspot.pt/2015/06/a-fun-attack-path-starting-with-xxe.html
  4240. http://zoczus.blogspot.pt/2015/04/plupload-same-origin-method-execution.html
  4241. http://cybersyndicates.com/2015/06/sms-log-alert/
  4242. https://gist.github.com/joernchen/d868521352f1ccd25095
  4243. https://chloe.re/2015/06/20/a-month-with-badonions/
  4244. https://yifan.lu/2015/06/21/hacking-the-ps-vita/
  4245. https://blog.haschek.at/post/fd854
  4246. http://blog.pangu.io/ie-uninit-memory/
  4247. https://mborgerson.com/deconstructing-the-xbox-boot-rom
  4248. http://www.fuzzysecurity.com/tutorials/20.html
  4249. https://www.linkedin.com/pulse/cli-skype-roman-x-shafigullin
  4250. http://potatohatsecurity.tumblr.com/post/94565729529/defcon-22-badge-challenge-walkthrough
  4251. http://people.zoy.org/~sam/filsdepute.txt
  4252. http://thehackerblog.com/the-noscript-misnomer-why-should-i-trust-vjs-zendcdn-net/
  4253. https://www.veracode.com/blog/2015/06/angularjs-expression-security-internals
  4254. http://joevennix.com/2015/06/24/Adventures-in-Browser-Exploitation-Part-II--Safari-8-UXSS.html
  4255. http://www.pc-help.org/obscure.htm
  4256. https://reverse.put.as/2015/07/01/reversing-prince-harmings-kiss-of-death/
  4257. https://paragonie.com/blog/2015/06/preventing-xss-vulnerabilities-in-php-everything-you-need-know
  4258. http://vladz.devzero.fr/015_lsm-backdoor.html
  4259. http://nullsecure.org/threat-intel-web-crew/
  4260. http://blog.mazinahmed.net/2015/06/facebook-messenger-multiple-csrf.html
  4261. http://blog.csnc.ch/2015/06/xslt-security-and-server-side-request-forgery/
  4262. http://container-solutions.com/content/uploads/2015/06/15.06.15_DockerCheatSheet_A2.pdf
  4263. https://www.whitehatters.academy/hackfu-2015-badge-loyalty-system/
  4264. http://drops.wooyun.org/papers/6905
  4265. http://davidjorm.blogspot.pt/2015/07/101-ways-to-pwn-phone.html
  4266. https://hiddencodes.wordpress.com/2015/06/18/deobfuscate-javascript-using-phantomjs-headless-browser/
  4267. http://grimhacker.com/wordpress/2015/04/10/gp3finder-group-policy-preference-password-finder/
  4268. http://blog.quarkslab.com/quarkslabs-chatsecure-review.html
  4269. https://www.exploitee.rs/index.php/Wink_Hub
  4270. https://djbunny5.com/2015/06/26/dns-amplification-attacks/
  4271. https://truesecdev.wordpress.com/2015/07/01/exploiting-rootpipe-again/
  4272. https://pierrekim.github.io/blog/2015-07-01-poc-with-RCE-against-127-iptime-router-models.html
  4273. https://blog.bugcrowd.com/advice-from-a-researcher-xxe/
  4274. https://cellhack.net/login/
  4275. http://blog.innerht.ml/cascading-style-scripting/
  4276. https://thehackerblog.com/stealing-lastpass-passwords-with-clickjacking/
  4277. http://www.firmware.re/
  4278. http://www.mbsd.jp/Whitepaper/rpo.pdf
  4279. https://sploitfun.wordpress.com/2015/06/26/linux-x86-exploit-development-tutorial-series/
  4280. http://gfragkos.blogspot.co.uk/2015/06/linkedin-security-issue-unvalidated.html
  4281. http://nahamsec.com/yahoo-image-processing-xspa/
  4282. http://blog.tokumaru.org/2013/03/csrf-and-cookie-monster-bug.html
  4283. http://samsymons.com/blog/reverse-engineering-with-radare2-part-1/
  4284. https://k0st.wordpress.com/2015/07/05/identifying-and-exploiting-rom-0-vulnerabilities/
  4285. https://kr5hou2zh4qtebqk.onion.to/ezines/
  4286. https://jonasnick.github.io/blog/2015/07/08/exploiting-csgojackpots-weak-rng/
  4287. http://josipfranjkovic.blogspot.ru/2015/07/the-easiest-bug-bounties-i-have-ever-won.html
  4288. https://goo.gl/y17Bep
  4289. https://www.dropbox.com/s/sax2a5fm3z3q2nt/iChainbreaker_OSX.zip?dl=0
  4290. https://localh0t.github.io/wildpwn-v0.1-unix-wildcard-attacks/
  4291. https://www.offensivebits.com/?p=89
  4292. https://zeltser.com/c2-dns-tunneling/
  4293. http://blog.ghettoha.xxx/reversing-powersaves-for-amiibo
  4294. https://defuse.ca/bochs-hacking-guide.htm
  4295. http://blog.cr4.sh/2015/07/building-reliable-smm-backdoor-for-uefi.html
  4296. https://www.securify.nl/blog/SFY20150601/securify_spot_the_bug_challenge_2015_contest_analysis.html
  4297. https://thejh.net/written-stuff/openssh-6.8-xsecurity
  4298. http://www.contextis.com/resources/blog/dnswatch-when-full-dns-tunnel-just-too-much/
  4299. http://noone.org/talks/ssh-tricks/ssh-tricks-rmll.html
  4300. http://0x27.me/HackBack/0x00.txt
  4301. http://emulator101.com/
  4302. http://blog.ptsecurity.com/2015/07/best-reverser-write-up-analyzing.html
  4303. https://k0st.wordpress.com/2012/10/23/rip-or-pillage-dvcs-story-about-git/
  4304. http://www.sac.sk/files.php?d=7
  4305. http://0x90909090.blogspot.fr/2015/07/no-one-expect-command-execution.html
  4306. https://k0st.wordpress.com/2015/07/13/identifying-and-exploiting-ibm-websphere-application-server/
  4307. http://www.sleuthkit.org/autopsy/
  4308. https://securityblog.redhat.com/2015/07/23/libuser-vulnerabilities/
  4309. http://seclists.org/fulldisclosure/2015/Jul/11
  4310. http://labs.bromium.com/2015/07/10/government-grade-malware-a-look-at-hackingteams-rat/
  4311. https://fuzzing-project.org/tutorial-cflags.html
  4312. https://frederik-braun.com/using-subresource-integrity.html
  4313. https://blogs.securiteam.com/index.php/archives/2502
  4314. https://www.sektioneins.de/en/blog/15-07-07-dyld_print_to_file_lpe.html
  4315. https://digital-forensics.sans.org/community/summits
  4316. http://overthewire.org/wargames/
  4317. http://www.nopwn.com/
  4318. https://fin1te.net/articles/messenger-site-wide-csrf/
  4319. http://blog.portswigger.net/2015/08/server-side-template-injection.html
  4320. http://labs.detectify.com/post/125256364141/how-i-disabled-your-chrome-security-extensions
  4321. https://gist.github.com/Wack0/bcc5a196f0874a39b08f
  4322. http://pastebin.com/raw.php?i=6fcdqfbd
  4323. https://sturmflut.github.io/ubuntu/touch/2015/05/07/hacking-ubuntu-touch-index/
  4324. http://cr.yp.to/djbdns/notes.html
  4325. http://www.rc4nomore.com/
  4326. http://www.contextis.com/resources/blog/wireless-phishing-captive-portals/
  4327. http://mihai.bazon.net/blog/externalinterface-is-unreliable
  4328. http://www.anti-reversing.com/1813/
  4329. http://blog.cobaltstrike.com/2015/07/22/winrm-is-my-remote-access-tool/
  4330. http://x42.obscurechannel.com/2015/07/26/cracking-the-roku-v2-wpa2-psk/
  4331. https://hackerone.com/reports/58679
  4332. https://paul.reviews/behavioral-profiling-the-password-you-cant-change/
  4333. http://silentbreaksecurity.com/exploiting-ms15-076-cve-2015-2370/
  4334. http://www.ehacking.net/2015/07/bypass-anti-virus-with-shellter-on-kali.html
  4335. http://www.cyberciti.biz/faq/apple-mac-osx-find-wi-fi-network-password/
  4336. https://cymon.io/
  4337. https://jve.linuxwall.info/blog/index.php?post/2015/07/26/Using-Mozilla-Investigator-%28MIG%29-to-detect-unknown-hosts
  4338. http://bugs.proftpd.org/show_bug.cgi?id=4143#c0
  4339. http://pbiernat.blogspot.co.uk/2014/09/bypassing-python-sandbox-by-abusing.html
  4340. https://medium.com/@ValdikSS/detecting-vpn-and-its-configuration-and-proxy-users-on-the-server-side-1bcc59742413
  4341. http://opengarages.org/handbook/2014_car_hackers_handbook_compressed.pdf
  4342. http://www.codeandux.com/writing-a-simple-decompiler-for-net-part-1/
  4343. http://arxiv.org/pdf/1507.06955v1.pdf
  4344. https://blog.netspi.com/auto-dumping-domain-credentials-using-spns-powershell-remoting-and-mimikatz/
  4345. https://xebialabs.com/periodic-table-of-devops-tools/
  4346. https://www.youtube.com/watch?v=Jk5Yad598vs
  4347. https://plus.google.com/u/0/+AleksandrDobkin-Google/posts/JMwA7Y3RYzV
  4348. http://tinyhack.com/2014/03/12/implementing-a-web-server-in-a-single-printf-call/
  4349. http://www.debasish.in/2014/03/in-memory-kernel-driverioctlfuzzing.html
  4350. http://capstone-engine.org/bot.html
  4351. http://www.scs.stanford.edu/brop/
  4352. http://blog.didierstevens.com/2014/03/20/xorsearch-finding-embedded-executables/
  4353. http://swfid.zz.mu/swfid
  4354. http://blog.includesecurity.com/2014/03/exploit-CVE-2014-0038-x32-recvmmsg-kernel-vulnerablity.html
  4355. http://blog.shubh.am/ssrf-is-dangerous/
  4356. https://www.securusglobal.com/community/2014/03/17/how-i-got-root-with-sudo/
  4357. http://blog.veracode.com/2014/03/introducing-the-ios-reverse-engineering-toolkit/
  4358. http://sorting.at/
  4359. https://gist.github.com/homakov/9383241
  4360. http://sakurity.com/blog/2015/08/13/middlekit.html
  4361. http://x42.obscurechannel.com/2015/08/14/netripper_metasploit/
  4362. http://blog.gojhonny.com/2015/08/domain-administrator-in-17-seconds.html
  4363. http://jpinsoft.net/DeepSound/Documentation.aspx
  4364. https://sysexit.wordpress.com/2015/07/29/bypassing-the-windows-8-1-picture-password-feature-with-a-kernel-debugger/
  4365. http://codewhitesec.blogspot.in/2015/07/symantec-endpoint-protection.html?m=1
  4366. https://gun.io/blog/building-a-twitterbot-in-node-to-post-xss-payloads/
  4367. http://baileysoriginalirishtech.blogspot.pt/2015/06/applocker-schmapplocker.html
  4368. http://noxxi.de/research/sophos-utm-webprotection-bypass2.html
  4369. http://www.sicherheitsforschung-magdeburg.de/uploads/journal/MJS_034_Lukas_Java.pdf
  4370. http://volatility-labs.blogspot.pt/2015/08/recovering-teamviewer-and-other.html
  4371. https://speakerdeck.com/ange/lets-write-a-pdf-file
  4372. https://www.exploit-db.com/exploits/37669/
  4373. http://rotlogix.com/2015/08/23/exploiting-the-mercury-browser-for-android/
  4374. http://vulnerabledoma.in/camp2015_sop/
  4375. https://zyan.scripts.mit.edu/blog/backdooring-js/
  4376. http://www.openwall.com/lists/oss-security/2015/08/04/8
  4377. http://rossmarks.co.uk/blog/?p=609
  4378. https://blog.netspi.com/powershell-remoting-cheatsheet/
  4379. http://itsjack.cc/blog/2015/08/surveying-codecanyon-scripts-xss-lfi-sqli-more/
  4380. http://3vildata.tumblr.com/post/125666311707/abusing-the-mpc-hc-webui-to-steal-private-pictures
  4381. http://antukh.com/blog/2015/08/22/dark-appsec/
  4382. https://www.blackhat.com/docs/us-15/materials/us-15-Brossard-SMBv2-Sharing-More-Than-Just-Your-Files-wp.pdf
  4383. http://www.codereversing.com/blog/archives/261
  4384. https://gbmaster.wordpress.com/2015/08/13/x86-exploitation-101-integer-overflow-adding-one-more-aaaaaaaaaaand-its-gone/
  4385. https://blogs.securiteam.com/index.php/archives/2550
  4386. https://dfir.it/blog/2015/07/18/toxic-pdf-walkthrough-bsides-london-challenge/
  4387. http://metalcaptcha.heavygifts.com/
  4388. http://www.7xter.com/2015/08/hacking-facebook-pages.html
  4389. https://www.youtube.com/watch?v=2Kw6VPlBz9w
  4390. https://labs.integrity.pt/articles/xxe-all-the-things-including-apple-ioss-office-viewer/
  4391. https://pierrekim.github.io/advisories/2015-totolink-0x02.txt
  4392. https://gist.github.com/subTee/732330ebfeb5c63b1296
  4393. https://gist.github.com/pakt/c70073a0e0de1f47f579
  4394. http://seclists.org/fulldisclosure/2015/Aug/21
  4395. https://blog.sucuri.net/2015/08/persistent-xss-vulnerability-in-wordpress-explained.html
  4396. https://www.gitbook.com/book/radare/radare2book/details
  4397. https://goo.gl/xgGGt4
  4398. https://crowdshield.com/blog.php?name=reverse-engineering-a-critical-wordpress-0day-exploit
  4399. http://googleprojectzero.blogspot.de/2015/08/attacking-ecmascript-engines-with.html
  4400. http://blog.ropchain.com/2015/08/16/analysis-of-exploit-targeting-office-2007-2013-ms15-022/
  4401. http://intothesymmetry.blogspot.it/2015/08/apple-safari-sop-bypass-cve-2015-3753.html
  4402. https://code.google.com/p/chromium/issues/detail?id=526293
  4403. http://norvig.com/sudoku.html
  4404. http://www.sec-down.com/wordpress/?p=553
  4405. https://www.bishopfox.com/blog/2015/08/coldfusion-bomb-a-chain-reaction-from-xss-to-rce/
  4406. http://raz0r.name/articles/css-attacks/
  4407. http://zx.rs/6/DroidDucky---Can-an-Android-quack-like-a-duck/
  4408. http://www.intelligentexploit.com/view-details.html?id=21905
  4409. https://gist.github.com/mattifestation/47f9e8a431f96a266522
  4410. http://insecurety.net/?p=765
  4411. http://www.malwaretech.com/2015/08/creating-ultimate-tor-virtual-network.html
  4412. http://blog.ioactive.com/2015/09/the-beauty-of-old-school-backdoors.html
  4413. http://www.hexacorn.com/blog/2015/08/15/two-pe-tools-you-might-have-never-heard-of-now-you-do/
  4414. http://blog.crowdstrike.com/native-java-bytecode-debugging-without-source-code/
  4415. https://gbmaster.wordpress.com/2015/08/03/x86-exploitation-101-off-by-one-and-an-uninvited-friend-joins-the-party/
  4416. http://www.pentestpartners.com/blog/hacking-defcon-23s-iot-village-samsung-fridge/
  4417. http://cybermashup.com/2015/08/25/how-to-crack-ubuntu-disk-encryption-and-passwords/
  4418. http://translate.wooyun.io/2015/09/01/Bypass-WAF-Cookbook.html
  4419. https://hackerone.com/reports/77065
  4420. http://dreamsofastone.blogspot.de/2015/07/reverse-engineering-nostalgia.html
  4421. http://www.filet-o-firewall.com/
  4422. http://ownsecurity.blogspot.ro/2015/08/how-i-found-sweets-inside-google.html
  4423. https://warroom.securestate.com/index.php/spawning-shells-over-bluetooth/
  4424. http://thehackerblog.com/sonar-a-framework-for-scanning-and-exploiting-internal-hosts-with-a-webpage/
  4425. https://www.jkry.org/ouluhack/Toyota%20Touch%20%26%20Go
  4426. http://www.phrack.org/papers/self-patching-msxml.html
  4427. https://cturt.github.io/ps4.html
  4428. https://tinyurl.com/pv868t6
  4429. http://blog.cryptographyengineering.com/2015/09/lets-talk-about-imessage-again.html
  4430. http://trainwatch.u0d.de/
  4431. https://oreoshake.github.io/xss/rce/bugbounty/2015/09/08/xss-to-rce.html
  4432. http://mohamedmfouad.blogspot.pt/2015/09/starbucks-critical-flaws-allow-hackers.html
  4433. http://goo.gl/MKvt4p
  4434. https://isc.sans.edu/diary/PDF+%2B+maldoc1+%3D+maldoc2/20079
  4435. https://gist.github.com/atcuno/3425484ac5cce5298932
  4436. http://nullsecure.org/building-your-own-passivedns-feed/
  4437. http://l.avala.mp/blog/pwnage-per-port-22opentcpssh/
  4438. http://drops.wooyun.org/papers/8298
  4439. http://wololo.net/2015/09/22/exploit-psx-games-psp-vita/
  4440. https://www.lucidchart.com/techblog/2015/08/31/the-worst-mistake-of-computer-science/
  4441. https://goo.gl/Dk0Iin (+)
  4442. https://xem.github.io/hex/
  4443. http://www.linusakesson.net/programming/tty/
  4444. https://ucnv.github.io/pnglitch/
  4445. http://ashishpadelkar.com/index.php/2015/09/23/facebook-simple-technical-bug-worth-7500/
  4446. http://g-laurent.blogspot.pt/2015/09/demistifying-responder-wpad.html
  4447. http://alex.hyperiongray.com/posts/302352-pwn-the-docs
  4448. http://sourceforge.net/projects/exploitresolver/
  4449. http://www.thijsbroenink.com/2015/08/bruteforcing-coupon-codes-for-discount.html
  4450. https://gist.github.com/subTee/28b7439d3dfa07053b61
  4451. https://gist.github.com/colinmahns/e3c38c5eae6c4bf6441d
  4452. http://theta44.org/karma/
  4453. http://drops.wooyun.org/papers/8261
  4454. http://www.securitygalore.com/site3/safari-pasv
  4455. http://blog.perimeterx.com/bugzilla-cve-2015-4499
  4456. https://docs.google.com/document/d/1v1TkWZtrhzRLy0bYXBcdLUedXGb9njTNIJXa3u9akHM/edit?pli=1#
  4457. http://d.hatena.ne.jp/end0tknr/20150830/1440885918
  4458. https://www.rcesecurity.com/2015/09/cve-2014-7216-a-journey-through-yahoos-bug-bounty-program/
  4459. https://goo.gl/0fcbEB
  4460. http://sijmen.ruwhof.net/weblog/584-how-i-could-hack-internet-bank-accounts-of-danish-largest-bank-in-a-few-minutes
  4461. https://security.bugs.gallery
  4462. http://www.sw1tch.net/blog/gone-kingphishin-part-1-kingphisher-beef-digital-ocean-kali
  4463. https://gist.github.com/wirehack7/fccc32806221c4c803dd
  4464. https://testssl.sh/
  4465. http://dangerousprototypes.com/2015/09/08/a-xsvf-assemblerdisassembler-in-python/
  4466. http://www.room362.com/2012/02/ms08068-ms10046-fun-until-2018.html
  4467. http://www.bigendiansmalls.com/mainframe-bind-shell-source-code/
  4468. https://www.davidsopas.com/acunetix-got-rfded/
  4469. http://lucb1e.com/rp/cookielesscookies/
  4470. https://www.rapid7.com/docs/Hacking-IoT-A-Case-Study-on-Baby-Monitor-Exposures-and-Vulnerabilities.pdf
  4471. http://conorpp.com/blog/proxying-bluetooth-devices-for-security-analysis-using-btproxy/
  4472. https://www.notsosecure.com/2015/09/24/remote-code-execution-via-php-unserialize/
  4473. https://dfirblog.wordpress.com/2015/09/27/dissecting-powershell-attacks/
  4474. http://www.sekoia.fr/blog/malware-and-com-object-the-paradise-of-covert-channels/
  4475. https://blog.coresecurity.com/2015/09/28/abusing-gdi-for-ring0-exploit-primitives/
  4476. http://www.clicktorelease.com/blog/svg-google-logo-in-305-bytes
  4477. http://www.leakedin.com/
  4478. https://www.mdsec.co.uk/2015/09/an-introduction-to-hardware-hacking-the-ripe-atlas-probe/
  4479. https://www.davidsopas.com/reflected-file-download-cheat-sheet/
  4480. https://inventropy.us/blog/constructing-an-xss-vector-using-no-letters
  4481. http://subt0x10.blogspot.pt/2015/09/simple-example-of-encoded-mimikatz-upx.html
  4482. https://gist.github.com/mak/bd71962aae98ab0b0441
  4483. http://www.malwarefieldguide.com/LinuxChapter2.html
  4484. https://williammahler.github.io/Capstone.js-bookmarklet/
  4485. https://www.fabionatalucci.it/individuate-vulnerabilita-su-ilmessaggero-it-full-disclosure/
  4486. http://blog.dornea.nu/2015/10/02/manage-pki-using-openssl/
  4487. https://blog.perimeterx.com/bugzilla-cve-2015-4499/
  4488. http://blog.silentsignal.eu/2014/07/28/how-to-got-root-access-on-fireeye-os/
  4489. http://andreicostin.com/secadv/HP_MIPIO_backdoor.txt
  4490. https://shubh.am/exploiting-url-shortners-to-discover-sensitive-resources-2/
  4491. https://quequero.org/2015/09/black-hat-arsenal-peepdf-challenge-2015-writeup/
  4492. https://www.sysdream.com/exploiting-symfony2-profiler
  4493. https://bwall.github.io/libemu-scapy-for-shellcode-on-the-network/
  4494. http://www.sekoia.fr/blog/when-a-brazilian-string-smells-bad/
  4495. https://hackertarget.com/hacker-tools-mr-robot/
  4496. https://www.nowsecure.com/blog/2015/08/17/raspberry-pi-hang-instruction/
  4497. http://blog.naver.com/1n73ction/220499561862
  4498. https://www.synack.com/labs/blog/how-i-hacked-hotmail/
  4499. https://pierrekim.github.io/blog/2015-10-07-Huawei-routers-vulnerable-to-multiple-threats.html
  4500. http://wroot.org/posts/babadook-connection-less-powershell-persistent-and-resilient-backdoor/
  4501. https://www.mdsec.co.uk/2015/10/vulnerability-in-sed-systems-decimator-d3/
  4502. http://cynosureprime.blogspot.pt/2015/09/how-we-cracked-millions-of-ashley.html
  4503. http://mazinahmed.net/uploads/Evading%20All%20Web-Application%20Firewalls%20XSS%20Filters.pdf
  4504. http://www.bishopfox.com/blog/2015/09/the-active-directory-kill-chain-is-your-company-at-risk/
  4505. http://blog.knownsec.com/2015/10/wordpress-xmlrpc-brute-force-amplification-attack-analysis/
  4506. https://dl.packetstormsecurity.net/papers/general/cisco_ios_rootkits.pdf
  4507. https://www.idontplaydarts.com/2015/09/cross-domain-timing-attacks-against-lucene/
  4508. http://lalo.li/lsd/?ultra-hard-version
  4509. http://javahacker.com/the-first-javascript-misdirection-contest/
  4510. http://an7isec.blogspot.co.il/
  4511. http://gynvael.coldwind.pl/?lang=en&id=533
  4512. http://engineering.prezi.com/blog/2014/03/24/prezi-got-pwned-a-tale-of-responsible-disclosure/
  4513. https://blog.mozilla.org/security/2014/03/25/using-fuzzdb-for-testing-website-security/
  4514. http://openzfsonosx.org/
  4515. http://ropshell.com/
  4516. http://securehoney.net/blog/how-to-dissect-android-flappy-bird-malware.html#.UyxQzHV_spw
  4517. http://blog.safetechinnovations.com/pentest/ebay-authentication-bypass/
  4518. http://nginx.com/admin-guide/
  4519. http://mathiasbynens.be/notes/pbkdf2-hmac
  4520. http://geelen.github.io/x-gif/#/http://i.imgur.com/iKXH4E2.gif
  4521. http://dorey.github.io/JavaScript-Equality-Table/
  4522. http://blog.tunnelshade.in/2015/09/interesting-flash-xss-on-vkcom.html
  4523. https://hackerone.com/reports/96294
  4524. https://www.exploit-db.com/exploits/38360/
  4525. https://w3challs.com/syscalls/
  4526. http://www.room362.com/2014/04/executing-code-via-smb-dcom-without.html
  4527. http://d.hatena.ne.jp/masa141421356/20150914/1442239071
  4528. http://fatsquirrel.org/oldfartsalmanac/random/reverse-engineering-a-vintage-wireless-keypad-with-an-rtl-sdr/
  4529. http://blog.mindedsecurity.com/2015/09/autoloaded-file-inclusion-in-magento.html
  4530. http://noxxi.de/research/http-evader.html
  4531. https://labs.mwrinfosecurity.com/blog/2015/09/25/a-practical-guide-to-cracking-password-hashes/
  4532. http://linux-audit.com/elf-binaries-on-linux-understanding-and-analysis/
  4533. http://www.metzdowd.com/pipermail/cryptography/2015-October/026685.html
  4534. http://blog.knownsec.com/2015/09/linux-drm_legacy_lock_free-null-pointer-dereference-analysis/
  4535. https://www.7elements.co.uk/resources/blog/cve-2015-2342-remote-code-execution-within-vmware-vcenter/
  4536. http://www.repeater-builder.com/antenna/pdf/beer-barel-cavity.pdf
  4537. http://goo.gl/uTw6PN
  4538. http://foxglovesecurity.com/2015/10/26/car-hacking-for-plebs-the-untold-story/
  4539. https://cyberarms.wordpress.com/2015/10/04/anti-virus-bypass-with-shellter-5-1-on-kali-linux/
  4540. http://sourceforge.net/projects/awap/
  4541. http://securityaffairs.co/wordpress/40727/hacking/hack-decrypt-whatsapp-database.html
  4542. https://www.accuvant.com/blog/exploiting-jmx-rmi
  4543. http://lcamtuf.coredump.cx/edison_fuzz/
  4544. https://blog.goeswhere.com/2015/10/ssh-key-capture/
  4545. http://seckb.yehg.net/2012/06/xss-gaining-access-to-httponly-cookie.html
  4546. https://www.swordshield.com/2015/10/extracting-password-hashes-from-large-ntds-dit-files/
  4547. http://jumpespjump.blogspot.pt/2015/09/how-i-hacked-my-ip-camera-and-found.html
  4548. http://arxiv.org/pdf/1511.00444v2.pdf
  4549. https://goo.gl/rWptw1
  4550. https://www.bamsoftware.com/hacks/deflate.html
  4551. http://ec.europa.eu/taxation_customs/vies/vatResponse.html
  4552. http://blog.dewhurstsecurity.com/2015/11/10/mobile-security-certificate-pining.html
  4553. http://grangeia.io/2015/11/09/hacking-tomtom-runner-pt1/
  4554. http://www.debuginfo.com/tools/chkmatch.html
  4555. https://gef.readthedocs.org/en/latest/
  4556. https://gitlab.com/rav7teif/linux.wifatch
  4557. http://legalhackers.com/advisories/Google-AdWords-API-libraries-XXE-Injection-Vulnerability.txt
  4558. http://www.icewall.pl/?p=696&lang=en
  4559. http://blog.checkpoint.com/2015/11/05/check-point-discovers-critical-vbulletin-0-day/
  4560. http://tinyhack.com/2015/11/08/teensy-lc-u2f-key/
  4561. http://blog.a-way-out.net/blog/2015/11/06/host-header-injection/
  4562. http://blog.talosintel.com/2015/10/dangerous-clipboard.html
  4563. http://www.greyhathacker.net/?p=738
  4564. https://instant.io/
  4565. http://www.unfitbits.com/
  4566. http://stegosploit.info/
  4567. http://maustin.net/2015/11/12/hipchat_rce.html
  4568. http://ryhanson.com/angular-expression-injection-walkthrough/
  4569. http://silentbreaksecurity.com/invoke-dcsync-because-we-all-wanted-it/
  4570. https://gist.github.com/subTee/4843a1d9e7a9fcdb4417
  4571. http://meat.pisto.horse/2015/11/rooting-linksys-x2000-router-system.html
  4572. https://chloe.re/2015/11/09/csrf-blocker-block-csrf-attacks-the-right-way/
  4573. https://blog.filippo.io/the-sad-state-of-smtp-encryption/
  4574. https://respectxss.blogspot.de/2015/11/a-tale-of-breaking-saps-successfactorss.html
  4575. http://homepage.ntlworld.com/jonathan.deboynepollard/FGA/nslookup-flaws.html
  4576. https://www.sensepost.com/blog/2015/wadi-fuzzer/
  4577. https://blog.gaborszathmari.me/2015/11/11/tricking-google-authenticator-totp-with-ntp/
  4578. http://yahoo-security.tumblr.com/post/122883273670/apache-traffic-server-http2-fuzzing
  4579. http://superlogout.com/
  4580. http://www.n0tr00t.com/2015/11/27/cve-2015-8213.html
  4581. http://lizardhq.org/2015/11/25/dell-foundation-services.html
  4582. http://www.th3r3p0.com/vulns/jenkins/jenkinsVuln.html
  4583. http://goo.gl/O07NBR (+)
  4584. https://packetstormsecurity.com/files/134064/mchtml-exec.txt
  4585. http://www.pentest.guru/index.php/2015/10/19/ditch-psexec-spraywmi-is-here/
  4586. https://jbeekman.nl/blog/2015/03/reverse-engineering-uefi-firmware/
  4587. http://goo.gl/HCRlCE (+)
  4588. http://blog.knownsec.com/2015/11/analysis-of-redis-unauthorized-of-expolit/
  4589. https://blog.srcclr.com/spring-social-core-vulnerability-disclosure/
  4590. http://www.spect.cl/blog/2015/11/security-audit-scrapyd/
  4591. http://www.sciencedirect.com/science/article/pii/S1742287615000146
  4592. http://www.labofapenetrationtester.com/2015/11/week-of-continuous-intrusion-day-1.html
  4593. http://goo.gl/9TtRd8 (+)
  4594. http://www.adriancourreges.com/blog/2015/11/02/gta-v-graphics-study/
  4595. http://thepiratebook.net/
  4596. https://security.linkedin.com/blog-archive#11232015
  4597. http://blog.valverde.me/2015/12/07/bad-life-advice/
  4598. https://gist.github.com/crowell/92ed41884db35d73e2fc
  4599. http://magikh0e.ihtb.org/pubPapers/ssh_gymnastics_tunneling.html
  4600. http://decidedlygray.com/2015/11/19/evil-access-point-with-auto-backdooring-ftw/
  4601. http://yahoo-security.tumblr.com/post/134549767190/attacking-http2-implementations
  4602. http://www.sekoia.fr/blog/windows-driver-signing-bypass-by-derusbi/
  4603. https://goo.gl/Pei7cP (+)
  4604. http://silentbreaksecurity.com/malicious-outlook-rules/
  4605. https://odzhan.wordpress.com/2015/11/17/asmcodes-pic/
  4606. https://w00tsec.blogspot.pt/2015/11/arris-cable-modem-has-backdoor-in.html
  4607. https://www.mdsec.co.uk/2015/12/protected-mode-a-case-of-when-no-means-yes/
  4608. http://neonprimetime.blogspot.pt/2015/11/xsl-payload-xxe-rce-e3xpl0it.html
  4609. http://blog.fortinet.com/post/when-baby-monitors-are-a-model-for-iot-security
  4610. https://blog.coresecurity.com/2015/12/09/exploiting-windows-media-center/
  4611. https://hackerone.com/reports/100829
  4612. http://racksburg.com/choosing-an-http-status-code/
  4613. https://nvisium.com/blog/2015/12/07/injecting-flask/
  4614. https://vagmour.eu/facebook-open-redirect-vulnerability-that-does-the-social-engineering-job-too/
  4615. https://sites.google.com/site/zerodayresearch/BadWinmail.pdf
  4616. https://isc.sans.edu/diary/Scanning+tricks+with+scapy/20381
  4617. http://antincode.com/post/131952657591/xss-via-xml-post
  4618. http://www.greyhathacker.net/?p=894
  4619. https://odzhan.wordpress.com/2015/11/19/dllpic-injection-on-windows-from-wow64-process/
  4620. http://ethanheilman.tumblr.com/post/133488739430/is-playstation-4-network-traffic-especially
  4621. https://www.raspberrypi.org/forums/viewtopic.php?f=66&t=126892
  4622. http://blog.sec-consult.com/2015/11/house-of-keys-industry-wide-https.html
  4623. https://usn.pw/blog/gen/2015/06/09/filenames/
  4624. http://hn.premii.com/#/article/10686676
  4625. http://opensecuritytraining.info/IntroX86.html
  4626. http://labs.detectify.com/post/133528218381/chrome-extensions-aka-total-absence-of-privacy
  4627. https://blog.srcclr.com/amazon-aws-sdk-for-java-vulnerability-disclosure/
  4628. https://blogs.akamai.com/2015/12/developing-a-poc-step-by-step.html
  4629. http://blog.totallynotmalware.net/?p=15
  4630. http://oldweb.today/
  4631. http://bnrg.cs.berkeley.edu/~randy/Courses/CS39K.S13/anarchistcookbook2000.pdf
  4632. https://goo.gl/qexIz4 (+)
  4633. http://www.exfiltrated.com/research-Instagram-RCE.php#Ruby_RCE
  4634. http://l0.cm/xxn/
  4635. http://goo.gl/ysJ9ku (+)
  4636. http://www.contextis.com/resources/blog/data-exfiltration-blind-os-command-injection/
  4637. http://mainframed767.tumblr.com/post/133340564417/nmap-enumerating-vtam-applications
  4638. http://blog.knownsec.com/wp-content/uploads/2015/12/Sqlmap-exploit_en.txt
  4639. https://blogs.securiteam.com/index.php/archives/2671
  4640. https://www.poshsecurity.com/blog/2015/12/7/how-the-skype-team-failed-at-powershell
  4641. https://goo.gl/dUiZjx (+)
  4642. https://goo.gl/zQsIfv (+)
  4643. http://blog.regehr.org/archives/1282
  4644. http://blog.amossys.fr/How_to_reverse_unknown_protocols_using_Netzob.html
  4645. https://jbp.io/2015/11/23/abusing-u2f-to-store-keys/
  4646. http://agrrrdog.blogspot.ca/2015/11/3-attacks-on-cisco-tacacs-bypassing.html
  4647. http://www.codereversing.com/blog/archives/282
  4648. http://www.kfirlavi.com/blog/2012/11/14/defensive-bash-programming
  4649. https://julianoliver.com/output/log_2015-12-18_14-39
  4650. https://www.secgeek.net/bookfresh-vulnerability/
  4651. http://www.agarri.fr/kom/archives/2015/12/17/amf_parsing_and_xxe/index.html
  4652. https://www.optiv.com/blog/bypassing-csrf-tokens-via-xss
  4653. http://www.rootsh3ll.com/2015/11/aircrack-boost-script/
  4654. https://httphacker.github.io/gethead/
  4655. https://blog.cloudflare.com/tools-for-debugging-testing-and-using-http-2/
  4656. http://sethsec.blogspot.com.tr/2015/12/exploiting-server-side-request-forgery.html
  4657. https://adsecurity.org/?page_id=1821
  4658. http://x42.obscurechannel.com/?p=197
  4659. http://hmarco.org/bugs/CVE-2015-8370-Grub2-authentication-bypass.html
  4660. http://zoczus.blogspot.pt/2014/05/how-reverse-dns-can-help-us-with-xss.html
  4661. http://www.exploit-monday.com/2015/12/the-powersploit-manifesto.html
  4662. https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/
  4663. http://marcoramilli.blogspot.pt/2015/12/spotting-malicious-node-relays.html
  4664. http://toshellandback.com/2015/11/24/ms-priv-esc/
  4665. http://oswatch.org/
  4666. http://azac.pl/cobol-on-wheelchair/
  4667. http://showterm.io/
  4668. http://www.ubercomp.com/posts/2014-01-16_facebook_remote_code_execution
  4669. https://code.google.com/p/google-security-research/issues/detail?id=675
  4670. https://guidovranken.files.wordpress.com/2015/12/https-bicycle-attack.pdf
  4671. http://www.securityfocus.com/archive/1/536930
  4672. https://blog.korelogic.com/blog/2015/12/04/linksys-0day-unauth-infodisco
  4673. http://dev.cra0kalo.com/?p=400
  4674. http://www.impulseadventure.com/photo/jpeg-snoop.html
  4675. http://www.shellntel.com/blog/2015/9/23/assessing-enterprise-wireless-networks
  4676. https://blog.g0tmi1k.com/dvwa/bruteforce-high/
  4677. http://randywestergren.com/running-a-hidden-tor-service-with-docker-compose/
  4678. http://goo.gl/tJ00NN (+)
  4679. http://blog.mindedsecurity.com/2015/11/reliable-os-shell-with-el-expression.html
  4680. http://routersecurity.org/checklist.php
  4681. http://c0rni3sm.blogspot.pt/2016/01/referrer-leakage-from-https-to-https.html
  4682. https://digi.ninja/projects/zonetransferme.php
  4683. http://www.greyhathacker.net/?p=911
  4684. https://blog.srcclr.com/handlebars_vulnerability_research_findings/
  4685. https://blog.risingstack.com/web-authentication-methods-explained/
  4686. http://www.portoscuso.com/codef/index.html
  4687. https://gist.github.com/hasegawayosuke/00f7253e22e228462b91
Add Comment
Please, Sign In to add comment