ابزار و مقالات در گیت هاب

GitHub.com/WikiSec


 

100Sec2lz.pdf 

100WebVulnerabilityList.pdf

A Detailed Guide on Pwncat.pdf

Active Directory .pdf

Attacking Docker Container.pdf.pdf

Best Alternative of Netcat Listener.pdf

Bug Bounty Checklist for Web App.pdf

Burp Suite for Pentester_ Turbo Intruder.pdf

Burpsuite for Pentester.pdf

Burpsuite.pdf

Career_Path_Syllabus_-_SOC_Analyst_Level_1.pdf

CEH.pdf

Credential_Dumping.pdf

Credential_Dumping_Cheatsheet.pdf

Cross-site scripting (XSS) cheat sheet.pdf

Cybercrime Trends 2024.pdf

Detailed XSS.pdf

Doxing.pdf

Easy_way_to_Generate_Reverse_Shell.pdf

Email Header Analysis .pdf

Encrypted Reverse Shell for Pentester.pdf

Enterprise_Information_Security.pdf

EXP401_syllabus.pdf

FBI 2023 INTERNET CRIME REPORT-1.pdf

Hacking with Go.pdf

Incident Response Cheat Sheet.pdf

Jenkins Penetration Testing.pdf

Jenkins_pentest.pdf

MSSQL for Pentester_ Nmap.pdf

OPSEC Fundamentals .pdf

OSCP Exam Report.pdf

OSCP Notes 2.pdf

OWASP API Security Top 10.pdf

PEN-200-Module-General-Course-Info.pdf

pen-200-prepbook.pdf

pen-200-syllabus.pdf

Ransomware Protection and Containment Strategies.pdf

Rustscan.pdf

Secret of System32.pdf.pdf

SecTools.pdf

Security_Search_Engines.gif

Sec_Tools.pdf

Shodan Dorking.pdf

Shodan for Pentesting.pdf

SOC_Biginners.pdf

Splunk Log Monitoring Guide .pdf

SQL injection .pdf

Step-by-step guide to Linux security for beginners.pdf

Tomcat Penetration Testing.pdf.pdf

TomCat_Pentesting.pdf

Tools.jpeg

Top 50 Well-Known Ports for SOC Analysts.pdf

WFUZZ.pdf

Wifi Penetration Testing Guide.pdf

Windows & Linux Privilege Escalation_ Automated Script.pdf

Windows Exploitation_ mshta.pdf

Wireless_Pentest.pdf

Wireshark Notes.pdf

Wireshark Pentester Guide.pdf