Whitepaper Files ≈ Packet Storm

From Zero Credentials To Full Domain Compromise Whitepaper called From Zero Credentials to Full Domain Compromise. This paper covers techniques penetration testers can use in order to accomplish an initial foothold on target networks and achieve full domain compromise without executing third party applications or reusing clear text credentials.
Hackers 2 Hackers Conference 17th Edition Call For Papers The call for papers for H2HC 17th edition is now open. H2HC is a hacker conference taking place in Sao Paulo, Brazil, from October 24th through the 25th of 2020.
Pentesting Zen Load Balancer This whitepaper is a quick tutorial on pentesting the Zen load balancer.
Solving Computer Forensic Case Using Autopsy Whitepaper called Solving Computer Forensic Case Using Autopsy.
Imperial College COVID-19 Response Team Report The global impact of COVID-19 has been profound, and the public health threat it represents is the most serious seen in a respiratory virus since the 1918 H1N1 influenza pandemic. This report presents the results of epidemiological modeling which has informed policymaking in the UK and other countries in recent weeks.
Manually Exploiting Intel AMT This document illustrates the manual exploitation of the vulnerability found in the Intel Active Management Technology in 2017 that stripped off the primary authentication mechanism in the Intel AMT web interface.
REVULN 20x3 Call For Papers REVULN 20x3 is an international conference taking place on September 9th through the 10th, 2020 in Bangkok (Thailand) at Ibis Styles Bangkok Sukhumvit Phra Khanong.
CarolinaCon Has Been Postponed CarolinaCon, which was to be hosted in Charlotte at the Embassy Suites April 10th through the 11th, 2020, has been postponed due to COVID-19.
Windows User Accounts Penetration Testing Whitepaper called Windows User Accounts Penetration Testing. Written in Persian.
Skippipe: Skipping The Watermark In Digital Content Whitepaper called Skippipe: Skipping the watermark in digital content.