Skip to content

Commit 40d0329

Browse files
author
Offensive Security
committed
DB: 2020-05-28
1 changes to papers [Persian] Exploiting Wordpress Security [Persian] Android Application Penetration Testing Android Pentest Tutorial Step by Step [Persian] WordPress Security [Turkish] Android Pentest Tutorial Step by Step [Persian] WordPress Security [Turkish] SCADA Modbus Vulns - [Turkish] Windows Account Penetration Testing - [Persian] Bypassing Root Detection Mechanism - Paper [Persian]
1 parent 49a188b commit 40d0329

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

files_papers.csv

+7-7
Original file line numberDiff line numberDiff line change
@@ -1364,7 +1364,7 @@ id,file,description,date,author,type,platform,language
13641364
45563,docs/english/45563-client-side-injection-on-web-applications.pdf,"Client Side Injection on Web Applications",2018-10-09,"Milad Khoshdel",,linux,english
13651365
45074,docs/english/45074-file-upload-restrictions-bypass.pdf,"File Upload Restrictions Bypass",2018-07-23,"Haboob Team",,multiple,english
13661366
45075,docs/arabic/45075-protecting-apps-against-jailbreaking-and-rooting.pdf,"Protecting apps against Jailbreaking and Rooting",2018-07-23,"Haboob Team",,multiple,arabic
1367-
45566,docs/english/45566-[persian]-exploiting-wordpress-security.pdf,"[Persian] Exploiting Wordpress Security",2018-10-09,"Behrouz Mansoori",,php,english
1367+
45566,docs/english/45566-[persian]-exploiting-wordpress-security.pdf,"[Persian] Exploiting Wordpress Security",2018-10-09,"Behrouz Mansoori",,php,persian
13681368
45113,docs/hebrew/45113-[hebrew]-digital-whisper-security-magazine-92.pdf,"[Hebrew] Digital Whisper Security Magazine #92",2018-08-01,"cp77fk4r & UnderWarrior",,multiple,hebrew
13691369
45114,docs/hebrew/45114-[hebrew]-digital-whisper-security-magazine-93.pdf,"[Hebrew] Digital Whisper Security Magazine #93",2018-08-01,"cp77fk4r & UnderWarrior",,multiple,hebrew
13701370
45115,docs/hebrew/45115-[hebrew]-digital-whisper-security-magazine-94.pdf,"[Hebrew] Digital Whisper Security Magazine #94",2018-08-01,"cp77fk4r & UnderWarrior",,multiple,hebrew
@@ -1386,7 +1386,7 @@ id,file,description,date,author,type,platform,language
13861386
45374,docs/english/45374-xml-external-entity-injection---explanation-and-exploitation.pdf,"XML External Entity Injection - Explanation and Exploitation",2018-09-11,"Haboob Team",,xml,english
13871387
45377,papers/english/45377-sony-playstation-vita-3.65--3.67--3.68---h-encore-kernel-and-user-modifications.md,"Sony PlayStation Vita 3.65 / 3.67 / 3.68 - 'h-encore' kernel and user modifications",2018-09-11,TheFloW,,hardware,english
13881388
45428,docs/english/45428-bulk-sql-injection-using-burp-to-sqlmap.pdf,"Bulk SQL Injection using Burp-to-SQLMap",2018-09-18,"Milad Khoshdel",,windows,english
1389-
45430,docs/english/45430-[persian]-android-application-penetration-testing.pdf,"[Persian] Android Application Penetration Testing",2018-09-18,"Seyedhojjat Hosseini",,android,english
1389+
45430,docs/english/45430-[persian]-android-application-penetration-testing.pdf,"[Persian] Android Application Penetration Testing",2018-09-18,"Seyedhojjat Hosseini",,android,persian
13901390
45517,papers/english/45517-phrack-twenty-years-of-escaping-the-java-sandbox-(ieu-eauvidoum-&-disk-noise).txt,"Phrack: Twenty years of Escaping the Java Sandbox (Ieu Eauvidoum & disk noise)",2018-09-28,phrack,,magazine,english
13911391
45543,docs/english/45543-detecting-behavioral-personas-with-osint-and-datasploit.pdf,"Detecting Behavioral Personas with OSINT and Datasploit",2018-10-08,"Behrouz Mansoori",,linux,english
13921392
45545,docs/english/45545-hypervisor-from-scratch-–-part-3-setting-up-our-first-virtual-machine.pdf,"Hypervisor From Scratch - Part 3: Setting up Our First Virtual Machine",2018-10-08,Sinaei,,windows,english
@@ -1473,26 +1473,26 @@ id,file,description,date,author,type,platform,language
14731473
48097,docs/english/48097-nmap-scanning---getting-started-in-windows-os.pdf,"Nmap Scanning - Getting started in windows OS",2020-02-19,"Anmol K Sachan",,windows,english
14741474
48101,docs/english/48101-penetration-testing-labs-(turkish).pdf,"Penetration Testing Labs (Turkish)",2020-02-20,"Tolga Kızılkaya",,multiple,english
14751475
48102,docs/english/48102-paper-work-on-mqtt-and-coap-protocols.pdf,"Paper work on MQTT and CoAP Protocols",2020-02-20,"TARUN BAREJA",,multiple,english
1476-
48103,docs/english/48103-android-pentest-tutorial-step-by-step-[persian].pdf,"Android Pentest Tutorial Step by Step [Persian]",2020-02-20,"Meisam Monsef",,android,english
1477-
48104,docs/english/48104-wordpress-security-[turkish].pdf,"WordPress Security [Turkish]",2020-02-21,"Haktan Emik",,php,english
1476+
48103,docs/english/48103-android-pentest-tutorial-step-by-step-[persian].pdf,"Android Pentest Tutorial Step by Step [Persian]",2020-02-20,"Meisam Monsef",,android,persian
1477+
48104,docs/english/48104-wordpress-security-[turkish].pdf,"WordPress Security [Turkish]",2020-02-21,"Haktan Emik",,php,turkish
14781478
48112,docs/english/48112-the-shellshock-attack-[paper].pdf,"The ShellShock Attack [Paper]",2020-02-24,"NAYAN DAS",,linux,english
14791479
48120,docs/english/48120-network-protocol-cheatsheet-[paper].pdf,"Network Protocol Cheatsheet [Paper]",2020-02-24,"Riddhi Suryavanshi",,multiple,english
1480-
48123,docs/english/48123-scada-modbus-vulns---[turkish].pdf,"SCADA Modbus Vulns - [Turkish]",2020-02-24,"Harun ŞEKER",,hardware,english
1480+
48123,docs/english/48123-scada-modbus-vulns---[turkish].pdf,"SCADA Modbus Vulns - [Turkish]",2020-02-24,"Harun ŞEKER",,hardware,turkish
14811481
48126,docs/english/48126-java-deserialization---[paper].pdf,"Java Deserialization - [Paper]",2020-02-24,"Haboob Team",,java,english
14821482
48150,docs/english/48150-research-on-devsecops-approach---paper.pdf,"Research on DevSecOps Approach - Paper",2020-03-02,"Aman Chhabra",,multiple,english
14831483
48157,docs/english/48157-deciphering-the-swift-dridex-relationship-in-bank---paper.pdf,"Deciphering the SWIFT DRIDEX relationship in Bank - Paper",2020-03-02,Achint,,multiple,english
14841484
48165,docs/english/48165-blueteam-vs-redteam-how-to-run-encrypted-elf-binary-in-memory-and-go-undetected.pdf,"BlueTeam vs RedTeam: How to run encrypted elf binary in memory and go undetected",2020-03-04,redtimmysec,,linux,english
14851485
48167,docs/english/48167-fuzzing-vim-with-afl++---paper.pdf,"Fuzzing VIM with AFL++ - Paper",2020-03-05,"Dhiraj Mishra",,linux,english
14861486
48175,docs/english/48175-skippipe-_-skipping-the-watermark-in-digital-content---paper.pdf,"Skippipe _ Skipping the watermark in digital content - Paper",2020-03-06,"Gerard Fuguet",,multiple,english
1487-
48178,docs/english/48178-windows-account-penetration-testing---[persian].pdf,"Windows Account Penetration Testing - [Persian]",2020-03-09,"moslem haghighian",,windows,english
1487+
48178,docs/english/48178-windows-account-penetration-testing---[persian].pdf,"Windows Account Penetration Testing - [Persian]",2020-03-09,"moslem haghighian",,windows,persian
14881488
48226,docs/english/48226-manually-exploiting-intel-amt-vulnerability-cve-2017-5689-[paper].pdf,"Manually Exploiting Intel AMT Vulnerability CVE 2017-5689 [Paper]",2020-03-18,"Laxita Jain",,hardware,english
14891489
48254,docs/english/48254-solving-computer-forensic-case-using-autopsy---paper.pdf,"Solving Computer Forensic Case using Autopsy - Paper",2020-03-25,"Qais Hussainy",,multiple,english
14901490
48265,docs/english/48265-pentesting-zen-load-balancer---paper.pdf,"Pentesting Zen Load Balancer - Paper",2020-03-30,"Cody Sixteen",,multiple,english
14911491
48282,docs/english/48282-from-zero-credentials-to-full-domain-compromise---paper.pdf,"From Zero Credentials to Full Domain Compromise - Paper",2020-04-03,"Haboob Team",,windows,english
14921492
48298,docs/english/48298-active-directory-dcsync---paper.pdf,"Active Directory DCSync - Paper",2020-04-06,"Haboob Team",,windows,english
14931493
48309,docs/english/48309-azure-cloud-penetration-testing---paper.pdf,"Azure Cloud Penetration Testing - Paper",2020-04-10,"Haboob Team",,windows,english
14941494
48330,docs/english/48330-exploiting-can-bus-using-instrument-cluster-simulator---paper.pdf,"Exploiting CAN-Bus using Instrument Cluster Simulator - Paper",2020-04-15,"Anjali Prakash",,hardware,english
1495-
48407,docs/english/48407-bypassing-root-detection-mechanism---paper-[persian].pdf,"Bypassing Root Detection Mechanism - Paper [Persian]",2020-05-01,"Mohammadreza Teymuri",,android,english
1495+
48407,docs/english/48407-bypassing-root-detection-mechanism---paper-[persian].pdf,"Bypassing Root Detection Mechanism - Paper [Persian]",2020-05-01,"Mohammadreza Teymuri",,android,persian
14961496
48412,docs/english/48412-@luigi_auriemma-security-vulnerabilities-in-multiplayer-games-from-2001-to-2012.pdf,"@luigi_auriemma: Security Vulnerabilities In Multiplayer Games From 2001 to 2012",2020-05-01,"Luigi Auriemma",,multiple,english
14971497
48455,docs/english/48455-command-execution-using-silver-tickets---paper.pdf,"Command Execution Using Silver Tickets - Paper",2020-05-12,"Haboob Team",,windows,english
14981498
48495,docs/english/48495-oauth-2.0-implementation-and-security---paper.pdf,"OAuth 2.0 Implementation and Security - Paper",2020-05-21,"Haboob Team",,multiple,english

0 commit comments

Comments
 (0)