CyberSecurity ToolKit
  • DoubtfulTurnip's CyberSecurity Toolkit
  • About the Turnip
  • CTF platforms
  • Tools List
    • Security Tools
      • Blue Team
      • Crypto & Cracking
      • Exploit
      • Post-Exploit
      • Forensics
      • ICS/IOT
      • Mobile
      • OSINT
      • POC
      • Red Team
      • Reversing & Binary Exploit
      • Scanning & Recon
    • Security Tool Plugins & Scripts
      • Nmap
      • Wordlists
      • Volatility
    • Privacy Tools
      • Collaboration
      • DNS
      • Email
      • Instant Messaging
      • Password Management
      • Search Engines
      • VPN
      • Web-Browser Privacy
    • Web Based Tools
      • Crypto & Cracking
      • Exploit
      • Forensics
      • OSINT
      • Reporting
      • Reversing & Binary Exploit
      • LOL
    • Misc Tools
      • Productivity
      • Web Browsing Enhancers
  • Guides
    • Cheat Sheets
      • General
      • Crypto & Cracking
      • Exploit
      • Forensics
      • Linux
      • Post-Exploitation
      • Recon
      • Network
      • Windows
      • SANS
    • Specific Techniques
      • Crypto & Cracking
      • Exploit
      • Forensic
      • Post-Exploit
      • Red Team
      • Reversing & Binary Exploit
    • Tool Usage Guides
    • Quick Reference Commands and Code
      • APK analysis
      • Linux Shell
      • LUA
      • Network Forensics
      • Perl
      • PowerShell
      • Python
      • Ruby
      • SSH Port Forwarding
      • Windows Command Prompt
  • Education
    • Educational Resources
      • Kids
      • Training Platform
      • Udemy
      • YouTube
      • Misc
  • CTF Archive
    • Retired CTF Write-ups
    • CSC CTF 2020 Challenges
      • Hack The Game 1 & 2
      • Respond Quickly or the puppy gets it
      • Corrupted File
      • raindoll
      • A Simple Cipher
      • Stop Being Esoteric
      • GrOops Policy
      • Unlocking Secrets
      • Numbers Stations and Locations 1
      • Numbers Stations and Locations 2
      • Numbers Stations and Locations 3
      • Numbers Stations and Locations 4
      • NoScope
      • ... If only we had MFA 1
      • ... If only we had MFA 2
      • ... If only we had MFA 3
      • ... If only we had MFA 4
      • Sometimes Simpler is Better
      • Catch Me If You Can Too
      • Guess What
      • Katz and Their Memory
      • A Bob's life 1
      • A Bob's life 2
      • A Bob's life 3
      • A Bob's life 4
      • A Bob's life 5
      • Hives 1
      • Hives 2
      • Hives 3
      • Hives 4
      • SNMP Shenanigans
      • Certified G
      • Magic Numbers are the best numbers
      • Getting Roasted
      • Remote Users / Getting Roasted 2
      • My Beautiful Research!
      • Find the Droids 1
      • Find the Droids 2
      • Find the Droids 4
      • TotalVirus
      • She sells PowerShells
    • CSC CTF 2020 Write-ups
      • Guess What
      • A Simple Cipher
      • Speed Me Up Scotty
      • Squinty
      • Down the rabbit hole 2
      • Sometimes Simpler is Better
      • Tiny Secrets
      • dota
      • TotalVirus
  • Sources
    • Curated List of Collated Lists
Powered by GitBook
On this page

Was this helpful?

  1. Guides
  2. Specific Techniques

Exploit

LogoMalicious Outlook Rules - NetSPINetSPI
LogoHow to Hack APIs in 2021 by Hakluke and Farah Hawa | Detectify LabsDetectify Labs

PreviousCrypto & CrackingNextForensic

Last updated 3 years ago

Was this helpful?