∃lio Torri∫i

System, Network, Security Engineer

Infosec resources archive


nccgroup - thetick: Linux backdoorMar 2019linux-post-exploitation
macOS | MITRE ATT&CKMar 2019macos-ios-exploitsmacos-ios-post-exploitation
macOS security papers 2000-2019Mar 2019macos-ios-exploitsmacos-ios-post-exploitation
Crypto basicsMar 2019crypto
AD pentesting notesMar 2019windows-exploitswindows-post-exploitation
Real-Time-Voice-CloningMar 2019just-coolsocial-engineering
Hacking and Security E-BooksMar 2019knowledge-sources
pyrdp: RDP MitMMar 2019MitMwindows-exploits
Advanced-Windows-Exploitation-ReferencesMar 2019windows-exploits
Burp HackBarMar 2019vulnerability-scanning
Offensive PcapMar 2019evasionexfiltrationnetworking-software
Zeek network monitor (Bro)Mar 2019detectionnetworking-software
macOS Incident Response | Part 1Mar 2019detectionmacos-ios-software
Windows RCE CVE-2018-8174 CVE-2019-0752Mar 2019web-exploitswindows-exploits
Python Machine LearningMar 2019programmingscripting
Making NSA PeddleCheap undetectedMar 2019evasionobfuscationwindows-post-exploitation
unc0ver jailbreak for iOS 11.0 - 12.2Mar 2019macos-ios-exploits
Paged Out!Mar 2019knowledge-sources
Pentesting toolsMar 2019reconnaissancevulnerability-scanning
avet: AV Evasion ToolMar 2019evasionobfuscation
EDR Is Coming; Hide Yo Sh!tMar 2019evasionlinux-softwarewindows-exploits
Open Source C2 FrameworksMar 2019linux-post-exploitationmacos-ios-post-exploitationwindows-post-exploitation
Cryptographic Attacks: A Guide for the PerplexedMar 2019cryptoweb-exploits
PhanTap: an invisible network tap aimed at red teamsMar 2019hardwareMitM
Latacora - The PGP ProblemMar 2019crypto
Mainframe-HackingMar 2019knowledge-sources
Logitech wireless peripheral vulnerabilitiesMar 2019web-exploitsWiFi
Sneaky UAC-BypassMar 2019windows-post-exploitation
awesome-yaraMar 2019detection
Windows Escalate UAC Protection Bypass via SilentCleanupMar 2019windows-post-exploitation
urlpages: Create and view web pages stored in the URLMar 2019just-coolweb
iOS: tools for iOS pentestingMar 2019macos-ios-softwarevulnerability-scanning
OSCP cheatsheetsMar 2019knowledge-sources
my-arsenal-of-aws-security-toolsMar 2019linux-softwareservices
TCP bruter (lgms)Mar 2019networking-software
Windows Privilege Escalation MethodsMar 2019windows-post-exploitation
What To Do When SIM-Swapping Happens To YouMar 2019servicessocial-engineering
Reverse Proxy AttacksMar 2019networking-softwareweb-exploits
BlueKeep scanner supporting NLAMar 2019windows-exploits
vim code execution - CVE-2019-12735Mar 2019linux-exploitsmacos-ios-exploits
Volte PhreakingMar 2019servicessocial-engineering
LiveHiddenCamera (android)Mar 2019android-post-exploitation
DarkSearch.ioMar 2019servicesweb
awesome shellMar 2019knowledge-sources
The Art of Command lineMar 2019knowledge-sources
Office Online Video malicious embeddingMar 2019social-engineeringwindows-exploits
rdpscan: CVE-2019-0708 scannerMar 2019windows-exploits
P4wnP1 A.L.O.A.Mar 2019hardwaresocial-engineering
Permanent URL Hijack Through 301 HTTP Redirect Cache PoisoningMar 2019web-exploits
macOS 10.14.5 GateKeeper BypassMar 2019macos-ios-post-exploitation




Elio Torrisi

The Netherlands