You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
45563,docs/english/45563-client-side-injection-on-web-applications.pdf,"Client Side Injection on Web Applications",2018-10-09,"Milad Khoshdel",,linux,english
45075,docs/arabic/45075-protecting-apps-against-jailbreaking-and-rooting.pdf,"Protecting apps against Jailbreaking and Rooting",2018-07-23,"Haboob Team",,multiple,arabic
45374,docs/english/45374-xml-external-entity-injection---explanation-and-exploitation.pdf,"XML External Entity Injection - Explanation and Exploitation",2018-09-11,"Haboob Team",,xml,english
1387
1387
45377,papers/english/45377-sony-playstation-vita-3.65--3.67--3.68---h-encore-kernel-and-user-modifications.md,"Sony PlayStation Vita 3.65 / 3.67 / 3.68 - 'h-encore' kernel and user modifications",2018-09-11,TheFloW,,hardware,english
1388
1388
45428,docs/english/45428-bulk-sql-injection-using-burp-to-sqlmap.pdf,"Bulk SQL Injection using Burp-to-SQLMap",2018-09-18,"Milad Khoshdel",,windows,english
45517,papers/english/45517-phrack-twenty-years-of-escaping-the-java-sandbox-(ieu-eauvidoum-&-disk-noise).txt,"Phrack: Twenty years of Escaping the Java Sandbox (Ieu Eauvidoum & disk noise)",2018-09-28,phrack,,magazine,english
1391
1391
45543,docs/english/45543-detecting-behavioral-personas-with-osint-and-datasploit.pdf,"Detecting Behavioral Personas with OSINT and Datasploit",2018-10-08,"Behrouz Mansoori",,linux,english
1392
1392
45545,docs/english/45545-hypervisor-from-scratch-–-part-3-setting-up-our-first-virtual-machine.pdf,"Hypervisor From Scratch - Part 3: Setting up Our First Virtual Machine",2018-10-08,Sinaei,,windows,english
48097,docs/english/48097-nmap-scanning---getting-started-in-windows-os.pdf,"Nmap Scanning - Getting started in windows OS",2020-02-19,"Anmol K Sachan",,windows,english
48150,docs/english/48150-research-on-devsecops-approach---paper.pdf,"Research on DevSecOps Approach - Paper",2020-03-02,"Aman Chhabra",,multiple,english
1483
1483
48157,docs/english/48157-deciphering-the-swift-dridex-relationship-in-bank---paper.pdf,"Deciphering the SWIFT DRIDEX relationship in Bank - Paper",2020-03-02,Achint,,multiple,english
1484
1484
48165,docs/english/48165-blueteam-vs-redteam-how-to-run-encrypted-elf-binary-in-memory-and-go-undetected.pdf,"BlueTeam vs RedTeam: How to run encrypted elf binary in memory and go undetected",2020-03-04,redtimmysec,,linux,english
1485
1485
48167,docs/english/48167-fuzzing-vim-with-afl++---paper.pdf,"Fuzzing VIM with AFL++ - Paper",2020-03-05,"Dhiraj Mishra",,linux,english
1486
1486
48175,docs/english/48175-skippipe-_-skipping-the-watermark-in-digital-content---paper.pdf,"Skippipe _ Skipping the watermark in digital content - Paper",2020-03-06,"Gerard Fuguet",,multiple,english
48226,docs/english/48226-manually-exploiting-intel-amt-vulnerability-cve-2017-5689-[paper].pdf,"Manually Exploiting Intel AMT Vulnerability CVE 2017-5689 [Paper]",2020-03-18,"Laxita Jain",,hardware,english
1489
1489
48254,docs/english/48254-solving-computer-forensic-case-using-autopsy---paper.pdf,"Solving Computer Forensic Case using Autopsy - Paper",2020-03-25,"Qais Hussainy",,multiple,english
1490
1490
48265,docs/english/48265-pentesting-zen-load-balancer---paper.pdf,"Pentesting Zen Load Balancer - Paper",2020-03-30,"Cody Sixteen",,multiple,english
1491
1491
48282,docs/english/48282-from-zero-credentials-to-full-domain-compromise---paper.pdf,"From Zero Credentials to Full Domain Compromise - Paper",2020-04-03,"Haboob Team",,windows,english
48330,docs/english/48330-exploiting-can-bus-using-instrument-cluster-simulator---paper.pdf,"Exploiting CAN-Bus using Instrument Cluster Simulator - Paper",2020-04-15,"Anjali Prakash",,hardware,english
1495
-
48407,docs/english/48407-bypassing-root-detection-mechanism---paper-[persian].pdf,"Bypassing Root Detection Mechanism - Paper [Persian]",2020-05-01,"Mohammadreza Teymuri",,android,english
1495
+
48407,docs/english/48407-bypassing-root-detection-mechanism---paper-[persian].pdf,"Bypassing Root Detection Mechanism - Paper [Persian]",2020-05-01,"Mohammadreza Teymuri",,android,persian
1496
1496
48412,docs/english/48412-@luigi_auriemma-security-vulnerabilities-in-multiplayer-games-from-2001-to-2012.pdf,"@luigi_auriemma: Security Vulnerabilities In Multiplayer Games From 2001 to 2012",2020-05-01,"Luigi Auriemma",,multiple,english
1497
1497
48455,docs/english/48455-command-execution-using-silver-tickets---paper.pdf,"Command Execution Using Silver Tickets - Paper",2020-05-12,"Haboob Team",,windows,english
1498
1498
48495,docs/english/48495-oauth-2.0-implementation-and-security---paper.pdf,"OAuth 2.0 Implementation and Security - Paper",2020-05-21,"Haboob Team",,multiple,english
0 commit comments