0x8c Cyber Notes
Search
Search
Search
Dark mode
Light mode
Explorer
Home Lab
Empowering Home Labbers to Work with Ease
Grafana Links
NGINX Configs
Proxmox and Containers
Reverse Proxies
Traefik for Reverse Proxies
Malware
C++ Iterators
C2 Servers
Intro to C2 TryHackMe. Task 1-Introduction by Nehru G Medium
Malware
Scripting malware with Python
Understanding & Detecting C2 Frameworks — Ares by Nasreddine Bencherchali Medium
Math
Domain and range
Omnivore
2024-05-07
Microsoft’s Nadella Tells Staff to Make Cybersecurity Top Priority - Bloomberg
Pen Testing
Hackers Attack Every 39 Seconds 2017-02-10 Security Magazine
NoSQL injection Web Security Academy
Redis
What is The Cyber Kill Chain and How to Use it Effectively
Programming
Golang
Web Server
Links
Projects - Demo Project
5 Mistakes I Made When I Started Using Obsidian
The Best Notes You'll Ever Make
The Easiest Way to Start Taking Notes
What I Learned From Taking 15,000 Notes
Why You Should Be Taking More Notes
Research
DDOS Handbook
Dependency injection · React in patterns
Dependency injection in React - LogRocket Blog
How a C2 Server is Leveraged in a Botnet Command and Control Attack by Fikayo Adepoju DNSFilter Blog Medium
Introduction - Building C2 Implants in C++ A Primer
NoSQL Injection attack Tutorials & Examples Snyk Learn
reactjs - Dependency Injection with React Hooks - Stack Overflow
Universal Dependency Injection. DI in TypeScript for React, Vue, Ionic by Thomas Burleson Medium
Unleashing the Power of ChatGPT Building a C2 Server and reeking havoc on the world!
What are memory leaks Tutorial & examples Snyk Learn
What is code injection Tutorial & examples Snyk Learn
What is code injection Tutorial & examples Snyk Learn (1)
What is prototype pollution Tutorial & examples Snyk Learn
What is prototype pollution Web Security Academy
What is unrestricted file upload Tutorial & examples Snyk Learn
Zero Trust Networks
Scraping
Block resources with Puppeteer - ScrapingBee
How to Avoid Detection with Puppeteer - ZenRows
Puppeteer for Web Scraping
Unsuccessful Puppeteer Attempt - 1
Scripting Notes
DDoS Script
SMB Scanner Tool
XSS
Software Dev Notes
A Faster Vim Workflow With Buffers and Args - DEV Community
Containerizing Gatsby Digital Garden
gURL Project
TCM Security Bug Bounty Course
Importance of Web App Security
2023-10-19
Buffer Dump
DDOS Handbook
Disk Partition with GDisk
Hello, Netherlands!
Running Untrusted Python Code
Server Build
Wifi
Wifi Cracking
Zero Trust Networks
Home
❯
Research
Folder: Research
16 items under this folder.
Jul 03, 2024
What is prototype pollution Tutorial & examples Snyk Learn
Jul 03, 2024
What is prototype pollution Web Security Academy
Jul 03, 2024
What is unrestricted file upload Tutorial & examples Snyk Learn
Jul 03, 2024
Zero Trust Networks
Jul 03, 2024
reactjs - Dependency Injection with React Hooks - Stack Overflow
Jul 03, 2024
DDOS Handbook
RefRef
Jul 03, 2024
Dependency injection in React - LogRocket Blog
Jul 03, 2024
Dependency injection · React in patterns
Jul 03, 2024
How a C2 Server is Leveraged in a Botnet Command and Control Attack by Fikayo Adepoju DNSFilter Blog Medium
Jul 03, 2024
Introduction - Building C2 Implants in C++ A Primer
Jul 03, 2024
NoSQL Injection attack Tutorials & Examples Snyk Learn
Jul 03, 2024
Universal Dependency Injection. DI in TypeScript for React, Vue, Ionic by Thomas Burleson Medium
Jul 03, 2024
Unleashing the Power of ChatGPT Building a C2 Server and reeking havoc on the world!
Jul 03, 2024
What are memory leaks Tutorial & examples Snyk Learn
Jul 03, 2024
What is code injection Tutorial & examples Snyk Learn (1)
Jul 03, 2024
What is code injection Tutorial & examples Snyk Learn