Converted some Medium blog articles to PDF for offline reading or back-up. Name of author left to give credit.

an0malous 0733298109 Update 'README.md' 4 gadi atpakaļ
A very useful technique to bypass the CSRF protection for fun and profit..pdf 02375b29c8 Moar books 5 gadi atpakaļ
Automatic security tests in Jenkins with OWASP ZAP.pdf 64bf8f7068 Even moar books 5 gadi atpakaļ
BUG BOUNTY HUNTING (METHODOLOGY , TOOLKIT , TIPS & TRICKS , Blogs).pdf 02375b29c8 Moar books 5 gadi atpakaļ
Back to Basics: Hardening Computers & Smartphones.pdf a059ce42c6 Added more articles 5 gadi atpakaļ
Basics of BASH for Beginners.pdf 64bf8f7068 Even moar books 5 gadi atpakaļ
Basics of Cross Site Scripting(XSS) attack by Amit Cheke.pdf 2a39d7b0a4 Added some e-books 5 gadi atpakaļ
Beginners Guide | How To Become an Ethical Hacker.pdf 64bf8f7068 Even moar books 5 gadi atpakaļ
Bypass CSP by Abusing XSS Filter in Edge by Xiaoyin Liu.pdf 2a39d7b0a4 Added some e-books 5 gadi atpakaļ
CTF are for Nerds : A Popular myth.pdf 64bf8f7068 Even moar books 5 gadi atpakaļ
Cloak and Dagger — Mobile Malware Techniques Demystified.pdf 64bf8f7068 Even moar books 5 gadi atpakaļ
Collection Of Bug Bounty Tip-Will Be updated daily.pdf 02375b29c8 Moar books 5 gadi atpakaļ
Combining Google Dorks and Google Alerts to Create RSS Feeds for OSINT by Jake Creps.pdf 2a39d7b0a4 Added some e-books 5 gadi atpakaļ
DevOops — An XML External Entity (XXE) HackTheBox Walkthrough.pdf 02375b29c8 Moar books 5 gadi atpakaļ
Digital Steganography as an Advanced Malware Detection Evasion Technique.pdf af66dbfa31 books? 5 gadi atpakaļ
Dynamic Scanning with OWASP ZAP for Identifying Security Threats.pdf 64bf8f7068 Even moar books 5 gadi atpakaļ
Exploiting SSRF like a Boss — Escalation of an SSRF to Local File Read!.pdf 02375b29c8 Moar books 5 gadi atpakaļ
FOSS : A poor man’s security analysis architecture..pdf 64bf8f7068 Even moar books 5 gadi atpakaļ
From XXE to RCE with PHP|expect — The Missing Link.pdf 02375b29c8 Moar books 5 gadi atpakaļ
Getting started in Bug Bounty.pdf 02375b29c8 Moar books 5 gadi atpakaļ
Google Dorks an Easy Way of Hacking by Shanzida Anika Mim.pdf 2a39d7b0a4 Added some e-books 5 gadi atpakaļ
HOW TO GET STARTED IN BUG BOUNTY (9+pro tips).pdf 02375b29c8 Moar books 5 gadi atpakaļ
How I hacked into my neighbour’s WiFi and harvested login credentials?.pdf 64bf8f7068 Even moar books 5 gadi atpakaļ
How I pranked my friend using DNS Spoofing?.pdf 64bf8f7068 Even moar books 5 gadi atpakaļ
How OSINT Strengthens Your Security Risk Management.pdf 02375b29c8 Moar books 5 gadi atpakaļ
How To Become A Bug Bounty Hunter?.pdf 02375b29c8 Moar books 5 gadi atpakaļ
How To Do Your Reconnaissance Properly Before Chasing A Bug Bounty.pdf 64bf8f7068 Even moar books 5 gadi atpakaļ
How i was able to bypass strong xss protection in well known website. (imgur.com) by Armaan Pathan.pdf 2a39d7b0a4 Added some e-books 5 gadi atpakaļ
How to Upgrade Your XSS Bugs from Medium to Critical by Luke Stephens.pdf 2a39d7b0a4 Added some e-books 5 gadi atpakaļ
Introduction to CSRF.pdf 02375b29c8 Moar books 5 gadi atpakaļ
Malware Analysis 101 - Basic Static Analysis.pdf 64bf8f7068 Even moar books 5 gadi atpakaļ
Malware Analysis 101 - Sandboxing.pdf 64bf8f7068 Even moar books 5 gadi atpakaļ
Malware Analysis 101.pdf 64bf8f7068 Even moar books 5 gadi atpakaļ
Mobile Device Digital Forensics.pdf a059ce42c6 Added more articles 5 gadi atpakaļ
Monitor Network Connectivity using Bash Script.pdf 64bf8f7068 Even moar books 5 gadi atpakaļ
OSINT Resources for 2019.pdf 02375b29c8 Moar books 5 gadi atpakaļ
OSINT: How to find information on anyone.pdf 02375b29c8 Moar books 5 gadi atpakaļ
Ops Scripting with BASH: Frequency.pdf 64bf8f7068 Even moar books 5 gadi atpakaļ
Ops Scripting with Bash: Frequency 2.pdf 64bf8f7068 Even moar books 5 gadi atpakaļ
Ops Scripting with Bash: Frequency 3.pdf 64bf8f7068 Even moar books 5 gadi atpakaļ
Out-of-Band XML External Entity (OOB-XXE) exploitation over Fortify Software Security Center (SSC) 17.10, 17.20 & 18.10 (0day CVE-2018–12463).pdf 02375b29c8 Moar books 5 gadi atpakaļ
Piercing the Veil: Server Side Request Forgery to NIPRNet access.pdf 02375b29c8 Moar books 5 gadi atpakaļ
Ping Power — ICMP Tunnel.pdf 64bf8f7068 Even moar books 5 gadi atpakaļ
PonyStealer Infrastructure and Malware Analysis (Part 1-2).pdf 64bf8f7068 Even moar books 5 gadi atpakaļ
Pushing Left, Like a Boss — Part 5.1 — Input Validation, Output Encoding and Parameterized Queries.pdf 9cc7a3271f moar books 5 gadi atpakaļ
Pushing Left, Like a Boss — Part 5.2- Use Safe Dependencies.pdf 9cc7a3271f moar books 5 gadi atpakaļ
Pushing Left, Like a Boss — Part 5.3 Browser and Client-Side Hardening.pdf 9cc7a3271f moar books 5 gadi atpakaļ
Pushing Left, Like a Boss: Part 1.pdf 9cc7a3271f moar books 5 gadi atpakaļ
Pushing Left, Like a Boss: Part 2 — Security Requirements.pdf 9cc7a3271f moar books 5 gadi atpakaļ
Pushing Left, Like a Boss: Part 3— Secure Design.pdf 9cc7a3271f moar books 5 gadi atpakaļ
Pushing Left, Like a Boss: Part 4 — Secure Coding.pdf 9cc7a3271f moar books 5 gadi atpakaļ
README.md 0733298109 Update 'README.md' 4 gadi atpakaļ
ROOTCON 2019's CTF Writeups for Web Category.pdf 64bf8f7068 Even moar books 5 gadi atpakaļ
Recon Everything by Sachin Grover.pdf 2a39d7b0a4 Added some e-books 5 gadi atpakaļ
Remote Code Execution - Explaination, Writeups and Tools.pdf a059ce42c6 Added more articles 5 gadi atpakaļ
SQL Dorks 2019 — New Google Dorks List Collection for SQL Injection by Abubakar Shehu.pdf 2a39d7b0a4 Added some e-books 5 gadi atpakaļ
SQL injection to RCE.pdf 64bf8f7068 Even moar books 5 gadi atpakaļ
SSRF in the Wild.pdf 02375b29c8 Moar books 5 gadi atpakaļ
SSRF-Server Side Request Forgery.pdf 02375b29c8 Moar books 5 gadi atpakaļ
Server Side Request Forgery (SSRF) Testing.pdf 02375b29c8 Moar books 5 gadi atpakaļ
Stories Of IDOR.pdf 64bf8f7068 Even moar books 5 gadi atpakaļ
Think Outside the Scope: Advanced CORS Exploitation Techniques by sandh0t.pdf 2a39d7b0a4 Added some e-books 5 gadi atpakaļ
Using Retire.js with ZAP to identify vulnerabilities in JavaScript libraries.pdf 64bf8f7068 Even moar books 5 gadi atpakaļ
XML External Entity(XXE).pdf 02375b29c8 Moar books 5 gadi atpakaļ
XSS to Account Takeover.pdf af66dbfa31 books? 5 gadi atpakaļ
XXE that can Bypass WAF Protection: 4 Ways Hackers Slip Through a Firewall?.pdf 02375b29c8 Moar books 5 gadi atpakaļ
ZAP Penetration Testing Tutorial to Detect Vulnerabilities.pdf 64bf8f7068 Even moar books 5 gadi atpakaļ

README.md

Medium Articles Converted to eBooks


I did this primarily to have offline back-ups to read of articles that I have read previously or plan on reading in the future. Having offline access to the articles just means I don't have to worry about not having access to them if I'm not at a location with internet access.

Issues


If you find your article in here and want it removed, just use the issue tracker.

License


I don't own any of these articles, and I made the effort to leave the author's information in the articles. All credit goes to the author of the articles, I'm just making them a little more accessible.