Link Search Menu Expand Document
Table of contents
  1. Exploitation
  2. Web app
  3. Malware Analysis & RE
  4. Cloud
  5. Mobile
  6. CTF
  7. Misc

Exploitation

Exploit Development for Dummies
NINA: x64 Process Injection
CVE-2020-17382
How to bypass EQU8 Anticheat
x64 Linux Binary Exploitation Training
Defeat Bitdefender total security using windows API unhooking to perform process injection
How to Build Obfuscated Macros for your Next Social Engineering Campaign
Emotet infection from PHP: generation of a malicious doc
Modern Binary Exploitation - CSCI 4968
Pwnable KR
W3Challs

Web app

Building a Hacker Mindset & Recon For Bug Bounties Ethical Hacking 101: Web App Penetration Testing - a full course for beginners

Malware Analysis & RE

MalwareTechBlog Youtube Channel
0xf0x Youtube Channel
Advanced Binary Analysis Workshop
Memory Analysis For Beginners With Volatility Coreflood Trojan: Part 1
Moving From Common-Sense Knowledge About UEFI To Actually Dumping UEFI Firmware
Reversing KR

Cloud

Tutorial on privilege escalation and post exploitation tactics in Google Cloud Platform environments ghostlulz1337’s post

Mobile

Mobile Pentest Cheatsheet
Mobile Hacking Workshop
How to configure Android (Virtual) for Mobile PenTest
B3nac Sec Youtube
Appie – Android Pentesting Portable Integrated Environment

CTF

picoCTF
OverTheWire
Awesome Vulnerable Applications

Misc

explains shell commands PENTESTING-BIBLE
3 Step RDP Honeypot


Table of contents