security 51
- Bloodhound Bulk Mark as Owned
- Proxmark3 MIFARE Classic Reading and Cloning
- Proxmark3 Card Reading and Cloning
- Modifying Source Code of JNLP Resources
- Breaking out of Windows Environments
- External Information Gathering
- General Encoder & Decoder
- Windows DNS & ARP
- Cryptographic Recommendation Summary
- Sequential Payload Generator
- XOR Encryption Cracker
- Cracking WPA2-PSK with Hashcat
- Getting Started with airmon-ng
- Cookies, Ports and Subdomains
- Frida for iOS
- Cryptography - Byte by Byte ECB Decryption
- Cryptography - Breaking Repeating Key XOR Encryption
- Cryptography - Breaking Single Byte XOR Encryption
- Cryptography - PKCS#7 Padding
- BaseN Converter
- Android Hooking in Frida
- JSP War Shell
- Basic SSH & SSH Port Forwarding
- Mobile Useful
- Netsh Get Info
- Web App Checklist
- Web App Security
- Certificate Generate Pure NodeJS
- Objection Quick Start
- NodeJS Express Cert Based Mutual Auth
- Secure Electron IPC
- API Fuzzing
- Random Windows Commands
- JWT Fuzzing
- SSH Server Hardening
- Configuring SSH Server
- Dump SAM, SYSTEM and SECURITY
- Windows UAC Privilege Escalation
- User Dumping with MSOL
- When are OPTIONS Requests Sent?
- Admin to SYSTEM with PsExec
- Extract NTLM Hashes via Linux Live Boot
- Sticky Keys Windows Login Bypass
- How to Kerberoast
- LSASS Dumping
- TLS Server Signature Algorithm
- OpenSSL Creating a Host Certificate
- OpenSSL Creating a Certificate Authority (CA)
- OpenSSL Testing a Signature Algorithm
- OpenSSL Testing a Cipher Suite
- NodeJS Crypto Module