3 GB Cyber Security Ebooks , Collected from google
3 GB Cyber Security Ebooks , Collected from google
Download :
Library content ๐งพ
โโโโGroup 0 [ Miscellaneous ]
โ 01 The Tagled Web A Guide to Securing Modern Web Applications.pdf
โ 02 [Michal_Zalewski]_Silence on the Wire A Field Guide to Passive Reconnaissance and Indirect Attacks.pdf
โ 03 Metasploit-The Penetration Tester s Guide.pdf
โ 04 the car hackers handbook.pdf
โ 05 practical forensic imaging.pdf
โ 06 [Nikolay_Elenkov]_Android_Security_Internals-_An_I(b-ok.cc).pdf
โ 07 gray hat c sharp.pdf
โ 08 Practical_Malware_Analysis.pdf
โ 09 iOS Application Security_ The Definitive Gude for Hackers and Developers - David Thiel.pdf
โ 10 Black Hat Python Python Programming for Hackers and Pentesters.pdf
โ 11 mwri-a-penetration-testers-guide-to-the-azure-cloud-v1.2.pdf
โ 12 Hacking- The Art of Exploitation (2nd ed. 2008) - Erickson.pdf
โ 13 Serious Cryptography A Practical Introduction to Modern Encryption (2).pdf
โ 14 Penetration Testing - A hands-on introduction to Hacking.pdf
โ 15 Attacking Network Protocols by James Forshaw.pdf
โ pic.jpg
โ
โโโโGroup 1 [ Network Security ]
โ Comp_TIA_Security_Guide_to_Network_Secur.pdf
โ New CCNA 200-301.pdf
โ Nmap Network Scanning _The Official Nmap Project Guide to Network Discovery and Security Scanning.pdf
โ understanding digital signal processing.pdf
โ Understanding Network Hacks Attack and Defense with Python.pdf
โ Wireshark Network Security.pdf
โ
โโโโGroup 2 [ Reverse Engineering - Malware Analysis ]
โ โ Advanced Windows Debugging.Nov.2007.pdf
โ โ Eldad_Eilam-Reversing__Secrets_of_Reverse_Engineering-Wiley(2005).pdf
โ โ Firmware_Security_Testing_Methodology_Version1.pdf
โ โ Inside Windows Debugging_ A Practical Guide to Debugging and Tracing Strategies in Windows.pdf
โ โ Malware Data Science Attack Detection and Attribution by Joshua Saxe Hillary Sanders.pdf
โ โ Mastering Malware Analysis by Alexey Kleymenov, Amr Thabet.pdf
โ โ Practical_Malware_Analysis.pdf
โ โ Professional Assembly Language.pdf
โ โ RE4B-EN.pdf
โ โ UEFIๅ็ไธ็ผ็จ_ๆดๆญฃๅ(่) ๆบๆขฐๅทฅไธๅบ็็คพ_ๅฎๆด็.pdf
โ โ
โ โโโโeLearnSecurity - Malware Analysis Professional
โ 101_Introduction_To_Malware_Analysis.pdf
โ 102_Static_Analysis_Techniques.pdf
โ 103_Assembly_Crash_Course.pdf
โ 104_Behavior_Analysis.pdf
โ 105_Debugging_And_Disassembly_Techniques.pdf
โ 106_Obfuscation_Techniques.pdf
โ
โ
โ
โโโโGroup 4 [ Web Penetration Testing ]
โ โ Bug Bounty Playbook.pdf
โ โ Practical_Attacks_using_HTTP_Request_Smuggling.pptx
โ โ The.Web.Application.Hackers.Handbook.Oct.2007.pdf
โ โ XSS CHEAT SHEET 2020 edition.pdf
โ โ
โ โโโโelearnsecurity WAPTx
โ โ WAPTx sec 1.pdf
โ โ WAPTx sec 2.pdf
โ โ WAPTx sec 3.pdf
โ โ WAPTx sec 4.pdf
โ โ WAPTx sec 5.pdf
โ โ WAPTx sec 6.pdf
โ โ WAPTx sec 7.pdf
โ โ WAPTx sec 8.pdf
โ โ WAPTx sec 9.pdf
โ โ
โ โโโโLists
โ OWASPv4_Checklist.xlsx
โ summary.jpg
โ Web Application Attacks List.txt
โ Web Security Topics for selfstudy.txt
โ
โโโโGroup 5 [ Offensive-Security ]
โ Kali Linux Revealed Mastering the Penetration Testing Distribution.pdf
โ Offensive Security OSCP v2020.pdf
โ
โโโโGroup 6 [ EC-Council ]
โ โ CEH v10 EC-Council (Certified Ethical Hacker Complete).pdf
โ โ
โ โโโโComputer Hacking Forensic Investigator CHFIv9
โ โ CHFIv9 Module 00.pdf
โ โ CHFIv9 Module 01 Computer Forensics in Today_s World.pdf
โ โ CHFIv9 Module 02 Computer Forensics Investigation Process.pdf
โ โ CHFIv9 Module 03 Understanding Hard Disks and File Systems.pdf
โ โ CHFIv9 Module 04 Data Acquisition and Duplication.pdf
โ โ CHFIv9 Module 05 Defeating Anti-forensics Techniques.pdf
โ โ CHFIv9 Module 06 Operating System Forensics.pdf
โ โ CHFIv9 Module 07 Network Forensics.pdf
โ โ CHFIv9 Module 08 Investigating Web Attacks.pdf
โ โ CHFIv9 Module 09 Database Forensics.pdf
โ โ CHFIv9 Module 10 Cloud Forensics.pdf
โ
โ CHFIv9 Module 11 Malware Forensics.pdf
โ โ CHFIv9 Module 12 Investigating Email Crimes.pdf
โ โ CHFIv9 Module 13 Mobile Forensics.pdf
โ โ CHFIv9 Module 14 Forensics Report Writing and Presentation.pdf
โ โ CHFIv9 References.pdf
โ โ
โ โโโโLabs
โ CHFIv9 Labs Module 00.pdf
โ CHFIv9 Labs Module 02 Computer Forensics Investigation Process.pdf
โ CHFIv9 Labs Module 03 Understanding Hard Disks and File Systems.pdf
โ CHFIv9 Labs Module 04 Data Acquisition and Duplication.pdf
โ CHFIv9 Labs Module 05 Defeating Anti-forensics Techniques.pdf
โ CHFIv9 Labs Module 06 Operating System Forensics.pdf
โ CHFIv9 Labs Module 07 Network Forensics.pdf
โ CHFIv9 Labs Module 08 Investigating Web Attacks.pdf
โ CHFIv9 Labs Module 09 Database Forensics.pdf
โ CHFIv9 Labs Module 10 Cloud Forensics.pdf
โ CHFIv9 Labs Module 11 Malware Forensics.pdf
โ CHFIv9 Labs Module 12 Investigating Email Crimes.pdf
โ CHFIv9 Labs Module 13 Mobile Forensics.pdf
โ
โโโโGroup 7 [ SANS ]
โ SANS 501.rar
โ SANS 660.rar
โ sans-listing.txt
โ SANS_Collection.torrent
โ SEC 560.rar
โ
โโโโGroup 8 [ (ISC)ยฒ ]
โ CISSP_CheatSheet.zip
โ Official (ISC)ยฒ guide to the HCISPP CBK.pdf
โ Official ISC2 Guide to the CISSP CBK.pdf
โ The Official (ISC)2 Guide to the CCSP CBK.pdf
โ
โโโโGroup 9 [ CompTIA ]
CompTIA A+ Certification All-in-One 220-801 & 220-802 Exam Guide, [8th Edition].pdf
CompTIA CySA+ Practice Tests.pdf
CompTIA IT Fundamentals Study Guide.pdf
CompTIA Linux+ Practice Tests Exam XK0-004.pdf
Comptia Pentest+ Practice Tests Exam Pt0-001.pdf
CompTIA Server+ Study Guide.pdf
Comments
Post a Comment