ابزار و مقالات در گیت هاب
GitHub.com/WikiSec
100Sec2lz.pdf
100WebVulnerabilityList.pdf
A Detailed Guide on Pwncat.pdf
Active Directory .pdf
Attacking Docker Container.pdf.pdf
Best Alternative of Netcat Listener.pdf
Bug Bounty Checklist for Web App.pdf
Burp Suite for Pentester_ Turbo Intruder.pdf
Burpsuite for Pentester.pdf
Burpsuite.pdf
Career_Path_Syllabus_-_SOC_Analyst_Level_1.pdf
CEH.pdf
Credential_Dumping.pdf
Credential_Dumping_Cheatsheet.pdf
Cross-site scripting (XSS) cheat sheet.pdf
Cybercrime Trends 2024.pdf
Detailed XSS.pdf
Doxing.pdf
Easy_way_to_Generate_Reverse_Shell.pdf
Email Header Analysis .pdf
Encrypted Reverse Shell for Pentester.pdf
Enterprise_Information_Security.pdf
EXP401_syllabus.pdf
FBI 2023 INTERNET CRIME REPORT-1.pdf
Hacking with Go.pdf
Incident Response Cheat Sheet.pdf
Jenkins Penetration Testing.pdf
Jenkins_pentest.pdf
MSSQL for Pentester_ Nmap.pdf
OPSEC Fundamentals .pdf
OSCP Exam Report.pdf
OSCP Notes 2.pdf
OWASP API Security Top 10.pdf
PEN-200-Module-General-Course-Info.pdf
pen-200-prepbook.pdf
pen-200-syllabus.pdf
Ransomware Protection and Containment Strategies.pdf
Rustscan.pdf
Secret of System32.pdf.pdf
SecTools.pdf
Security_Search_Engines.gif
Sec_Tools.pdf
Shodan Dorking.pdf
Shodan for Pentesting.pdf
SOC_Biginners.pdf
Splunk Log Monitoring Guide .pdf
SQL injection .pdf
Step-by-step guide to Linux security for beginners.pdf
Tomcat Penetration Testing.pdf.pdf
TomCat_Pentesting.pdf
Tools.jpeg
Top 50 Well-Known Ports for SOC Analysts.pdf
WFUZZ.pdf
Wifi Penetration Testing Guide.pdf
Windows & Linux Privilege Escalation_ Automated Script.pdf
Windows Exploitation_ mshta.pdf
Wireless_Pentest.pdf
Wireshark Notes.pdf
Wireshark Pentester Guide.pdf
- توضیحات
- نوشته شده توسط: Babak Ahari
- دسته: منابع
- بازدید: 39