- Netcat without Netcat[eby]
- Port Redirection Tools and Techniques
- NetCat - The Swiss Army Knife
- Brief whitepaper detailing a malware epidemic that has broken out on Orkut.
- mysql injection tutorial
- Seedy Side of Security
- Using Putty for making SSH tunnel
- Private Symlink(PHP) Exploit Tutorial by Silic0N
- Writing Simple Buffer Overflow Exploits
- Turn any Linux computer into SOCKS5 proxy
- Open Source Security Testing Methodology Manual (OSSTMM) Version 3 now available
- Security Magazines Collection
- DLL hijacking in linux
- An Intro to Creating Anti-Virus Signatures
- "Cryptography Collection" EBooks
- Understanding the Stack --The assembly Language Perspective
- DDoS Attacks explaination, classification and suggested solutions
- PenTest Magazine is Launched
- Brief Inside Overview of MSF
- Security Concepts
- Automating Post Modules and Meterpreter Across Sessions
- Fuzzing with Peach
- Free Armitage and Metasploit Video Training Course
- How to find 0-day in browsers
- BlackHat 2011 - Attacking Client Side JIT Compilers
- Defcon 19 Presentations online
- Dive Into Python 3 Online ebook
- Blackhat USA-State of the Art Post Exploitation in Hardened PHP Environments e-book
- Download DEFCON 19 DVD
- OWASP AppSecUSA 2011 Presentations Online
- The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
- Derbycon 2011 Videos
- HiTB 2011 KUL Presentations
- HackInTheBox Quartal Magazine - eZine Issue #007
- Defcon 19 Complete Videos and Slideshows Pack 2011
- Hackers Hut
- Web Application Hackers Handbook - 2nd Edition
- Browser Security (Fall 2011)
- SOURCE Conference: Barcelona 2011 material
- BlackHat EU 2012 Materials
- Javascript Deobfuscation - Manual Approach
- Can anyone Suggest: Books
- Mac address spoofing :: Win and linux
- HiTB 2012 AMS Materials
- BlackHat USA 2012 presentations & whitepapers
- HiTB 2012 Kul Material
- Analysis of Dropbox Security
- 30c3 Conference videos