Whitepaper called Social Engineering - The Human Factor. It documents suggested phases of the social engineering lifecycle and associated techniques for implementation.
461544be2738e4d8abf609851dadb8d3da3588cb53e8c180e81e7d7b8e0989c9
Whitepaper called Optimized Ad-Hoc On-Demand Distance Vector Routing Protocol.
276122fff45fd9a03d478f868be5278cae367c1fb18bb2597e19520d2ed8f62a
Whitepaper called Demystifying the Android Malware. It dives into various phases to discuss the hows and whys behind malware implementation for Android.
ad9e4c33e888d2a10ee1d2ca15fbe4ebac9bb71fc66331e213a36b8563c018b5
This brief whitepaper gives an overview of the functional uses of the Metasploit Framework.
a868069269ba7f9be7fe3e3764a207b4557d7120f654c3cf5b507537f29c3208