Table of contents
Exploitation
Exploit Development for Dummies
NINA: x64 Process Injection
CVE-2020-17382
How to bypass EQU8 Anticheat
x64 Linux Binary Exploitation Training
Defeat Bitdefender total security using windows API unhooking to perform process injection
How to Build Obfuscated Macros for your Next Social Engineering Campaign
Emotet infection from PHP: generation of a malicious doc
Modern Binary Exploitation - CSCI 4968
Pwnable KR
W3Challs
Web app
Building a Hacker Mindset & Recon For Bug Bounties Ethical Hacking 101: Web App Penetration Testing - a full course for beginners
Malware Analysis & RE
MalwareTechBlog Youtube Channel
0xf0x Youtube Channel
Advanced Binary Analysis Workshop
Memory Analysis For Beginners With Volatility Coreflood Trojan: Part 1
Moving From Common-Sense Knowledge About UEFI To Actually Dumping UEFI Firmware
Reversing KR
Cloud
Tutorial on privilege escalation and post exploitation tactics in Google Cloud Platform environments ghostlulz1337’s post
Mobile
Mobile Pentest Cheatsheet
Mobile Hacking Workshop
How to configure Android (Virtual) for Mobile PenTest
B3nac Sec Youtube
Appie – Android Pentesting Portable Integrated Environment
CTF
picoCTF
OverTheWire
Awesome Vulnerable Applications
Misc
explains shell commands PENTESTING-BIBLE
3 Step RDP Honeypot