Printer hacking 6

https://packetstormsecurity.com/files/140828/hackingprinters-6.txt

Printer hacking 5

https://packetstormsecurity.com/files/140827/hackingprinters-5.txt

Printer hacking 4

https://packetstormsecurity.com/files/140826/hackingprinters-4.txt

Printer hacking 3

https://packetstormsecurity.com/files/140814/hackingprinters-3.txt

Printer hacking 2

https://packetstormsecurity.com/files/140813/hackingprinters-2.txt

Printer hacking 1

https://packetstormsecurity.com/files/140812/hackingprinters-1.txt

ASLR flaw

A Chip Flaw Strips Away a Key Hacking Safeguard for Millions of Devices | WIRED https://www.wired.com/2017/02/flaw-millions-chips-strips-away-key-hacking-defense-software-cant-fully-fix/

Basics of Windows Incident Response

https://jordanpotti.com/2017/01/20/basics-of-windows-incident-response/

DFIR - The Definitive Compendium Project

http://aboutdfir.com/

ICMP shells

ICMP Shell Fun https://www.commonexploits.com/icmp-shell-fun/

AV0id – Anti-Virus Bypass Metasploit Payload Generator Script

https://www.commonexploits.com/av0id-anti-virus-bypass-metasploit-payload-generator-script/

Quick Integration of MISP and Cuckoo

https://blog.rootshell.be/2017/01/25/quick-integration-misp-cuckoo/

Detecting Kerberoasting Activity Part 2

Creating a Kerberoast Service Account Honeypot https://adsecurity.org/?p=3513

Detecting Kerberoasting Activity

https://adsecurity.org/?p=3458

Microsoft AD hacking tricks

Sneaky Persistence Active Directory Trick #18: Dropping SPNs on Admin Accounts for Later Kerberoasting https://adsecurity.org/?p=3466

Stegano 0.6.4

https://packetstormsecurity.com/files/140980/Stegano-0.6.4.tar.gz

Microsoft Office Word Malicious Macro Execution

https://packetstormsecurity.com/files/140972/office_word_macro.rb.txt

Lynis Auditing Tool 2.4.1

Lynis Auditing Tool 2.4.1

https://packetstormsecurity.com/files/140981/lynis-2.4.1.tar.gz