... | ... | @@ -5,19 +5,19 @@ |
|
|
##### [Peer to Peer](peer-to-peer)
|
|
|
|
|
|
## Malware
|
|
|
##### AV Bypassing Techniques
|
|
|
##### How Ransomware Works
|
|
|
##### [AV Bypassing Techniques](av-bypass-techniques)
|
|
|
##### [How Ransomware Works](how-ransomeware-works)
|
|
|
|
|
|
## Tool Guides
|
|
|
##### Writing a Remote Shell
|
|
|
##### How to Use Frida
|
|
|
##### How to Use ADB
|
|
|
##### [Writing a Remote Shell](writing-a-remote-shell)
|
|
|
##### [How to Use Frida](how-to-use-frida)
|
|
|
##### [How to Use ADB](how-to-use-adb)
|
|
|
|
|
|
## Vulnerabilities
|
|
|
|
|
|
|
|
|
## Internet of Things
|
|
|
##### Finding Vulns in IoT
|
|
|
##### [Finding Vulns in IoT](finding-vulns-in-iot)
|
|
|
|
|
|
## Exploitation
|
|
|
|