security

  1. LeakGod

    Black Hat Rust. Applied offensive security with the Rust programming language

    Black Hat Rust. Applied offensive security with the Rust programming language Whether in movies or mainstream media, hackers are often romanticized: they are painted as black magic wizards, nasty criminals, or, in the worst cases, as thieves with a hood and a crowbar. In reality, the spectrum...
  2. LeakGod

    Software-Defined Network Frameworks: Security Issues and Use Cases

    Software-Defined Network Frameworks: Security Issues and Use Cases Software-Defined Networks (SDN) work by virtualization of the network and the Cognitive Software-Defined Network (CSDN) combines the efficiencies of SDN with cognitive learning algorithms and enhanced protocols to automatize...
  3. Sauron

    Practical Hands On Cyber Security Guide For Beginners 2023

    Practical Hands On Cyber Security Guide For Beginners 2023 The “Practical Hands-On Cyber Security Guide For Beginners 2023” course is a thorough and immersive educational experience created to give beginners the fundamental information and practical skills necessary to successfully traverse...
  4. Sauron

    IT Security: Defense against the digital dark arts

    IT Security: Defense against the digital dark arts This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to...
  5. Sauron

    Web Application Security Testing: Testing for Common Attacks

    Web Application Security Testing: Testing for Common Attacks The ability to thoroughly assess and test a web application for common misconfigurations and vulnerabilities will mark you out as a good web application penetration tester. Common attacks and vulnerabilities usually get...
  6. Sauron

    EVE-NG – How To Build Cyber Security and Networking Labs

    EVE-NG – How To Build Cyber Security and Networking Labs I know the feeling. You get hired into a position that’s a little bit out of your league… and every day feels like a panic. You can feel the acid churning in your stomach. You can feel your mouth getting dry, palms getting sweaty...
  7. LeakGod

    Mastering Linux Security and Hardening: A practical guide to protecting your Linux system from cyber attacks, 3rd Edition

    Gain a firm practical understanding of how to secure your Linux system from intruders, malware attacks, and other cyber threats Key Features Discover security techniques to prevent malware from infecting a Linux system, and detect it Prevent unauthorized people from breaking into a Linux system...
  8. LeakGod

    Grokking Web Application Security / Grokking web application security

    When you launch an application on the web, every hacker in the world has access to it. Are you sure your web apps can stand up to the most sophisticated attacks? Grokking Web Application Security is a brilliantly illustrated and clearly written guide that delivers detailed coverage on: How the...
  9. LeakGod

    Spring Security in Action, 2nd Edition 2024

    Design and develop Spring applications that are secure right from the start. In Spring Security in Action, Second Edition you will learn essential security skills including how to: Implement and customize authentication and authorization Set up all components of an OAuth 2/OpenID Connect system...
  10. G

    200+ CYBER SECURITY BOOK

    LINK: https://www.mediafire.com/file/yxv2aolol3s99bv/CYBER_SECURITY_DOCS.zip/file
  11. Top secrets

    Beginner to Expert Guide to Computer Hacking, Basic Security, and Penetration Testing By James Patterson

    :eek:Intro :: I want to thank you and congratulate you for downloading the book, “Hacking: Beginner's Guide to Computer Hacking, Basic Security, and Penetration Testing .”This book will teach you how you can protect yourself from most common hacking attacks -- by knowing...
  12. Sauron

    WP Hide & Security Enhancer Pro v6.2.8 NULLED

    WP-Hide Explained The convenient way to hide your WordPress from being visible through the code. Over 99,99% of sites hacks are focused attacks on specific plugins and themes vulnerabilities. A huge improvement over Site Security since hackers web scanners will not find any WordPress traces on...
  13. Sauron

    Zed Attack Proxy Cookbook - Hacking tactics, techniques, and procedures for testing web applications

    Dive into security testing and web app scanning with ZAP, a powerful OWASP security tool Purchase of the print or Kindle book includes a free PDF eBook Key FeaturesMaster ZAP to protect your systems from different cyber attacksLearn cybersecurity best practices using this step-by-step guide...
  14. Sauron

    Web Security & Bug Bounty Learn Penetration Testing

    Learn Penetration Testing from scratch to become a bug bounty hunter and web security expert Discover, exploit, and mitigate all types of web vulnerabilities. Secure any of your future applications using best practices Setting up your Hacking Lab: Kali Linux and Virtual Machines (Works with...
  15. Sauron

    TECHNICAL SAGAR - Cyber security course

    Hidden content
  16. Sauron

    Smart Contract Security For Pentesters

    This article provides an introduction to the world of smart contract security for people with a background in traditional cyber security and little knowledge of crypto and blockchain tech. It’s drawn from the experiences of our team of exploit developers and pentesters turned smart contract...
  17. S

    United States Department of Homeland Security [dhs.gov] Employees Database Leaked

    Hidden content
  18. charlie

    🔹 BASICS OF ETHICAL HACKING CORE TRAINING 2022 🔹// 🤯🤯👺posted by charlie :)

    🔰TOPICS 1. The Truth About Living in a Technology Based World 2. Overview of the CEH Certification Program 3. How to Build a Lab to Hack Safely 4. Installing and Configuring Your Windows Server VMs 5. Installing and Configuring Your Desktop VMs 6. Information Security Overview 7. Security...
  19. Sauron

    Z Security Course Pack

    [reply]"]16.06 GB folder on MEGA
  20. Sauron

    UDEMY Mobile Security and Hacking: Android + iOS

    Hidden content
Top