.. |
12 Best Career in Cyber Security 2023.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
100 Security Operation Center Tools.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
ADVERSARY EMULATION MATRIX by Joas.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
APOSTILA A ARTE DO OSINT PARA PENTESTERS.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
APOSTILA ATAQUES WEB - BÁSICO.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
APOSTILA DICAS PARA PENTEST.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
APT28 - Understanding a group specialized in attacks against intelligence sectors.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
AV and EDR Bypass Techniques for new Hackers - Update 2022.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
AV_EDR Bypass Red Team Village PT-BR.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Adversary Emulation Services.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Adversary Emulation and Cracking The Bridge – Overview.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Adversary Emulation com Cobalt Strike.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Application Security Introduction - Overview.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Application Security Introduction – Overview PT 2.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
BRAZILIAN PENTEST CERTIFICATION.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Blue e Red Team - Mercado de Trabalho.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Buffer Overflow Guide 1.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Buffer Overflow Introduction.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Buffer Overflow for Beginners Joas.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Bug Bounty Career.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Bug Bounty, how to start.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Burp Suite Plugin Development.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Bypassing defenses in layers.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
CEH Fundamentals.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
CONTAINER SECURITY – OVERVIEW PT 1.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
CRTO – Notes to Exam Preparation.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Carreira em Desenvolvimento Mobile.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Certifications Preparation Guide.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Certified Red Team Physical PenTest Leader – Quick Training.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Communs Web Attack Reference PT.1.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Como gerenciar um Red Team.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
CompTIA PenTest+ - Tips and Tricks.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
CompTIA Security+ - Tips and Tricks.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Complete Bug Bounty Cheat Sheet.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Computer Forensic – Overview PT.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Conceitos básicos de pós exploração 1.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Cyber Security - Five Challenge 2022.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Cyber Security Career for Children PT 1.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Cyber Security Services.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Cyber Security for Kids 2.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Cyber security for kids.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Cybersecurity and Cyberbullying Education for Kids.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Cybersecurity flaws in the Metaverse #1.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
DLL Hijacking Overview.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Dicas básicas para ingressar no mercado de segurança.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Dicas como Reportar uma Falha.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Enumeração de Grupos de TI e Segurança para Tech Recruiters.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
FUNDAMENTOS DE DESENVOLVIMENTO DE EXPLOITS - OVERVIEW.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
FUNDAMENTOS DE FIREWALL.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
FUNDAMENTOS DE OSINT.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Fundamentals Cracking the Perimeter.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Fundamentos de Firewall .pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Game Hacking 1 – Anti Cheat BYPASS.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Google Cloud – Attack OVERVIEW PT1.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Hackthebox e Vulnhub - Dicas e Truques.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Hardware Hacking Introduction - Overview.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
How to report a vulnerability and generate its CVE.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
How to start at once in the PenTest.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
INFOSEC PROEFICIENCY COLORS.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
INICIANDO SUA CARREIRA EM PENTEST.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
INTRODUÇÃO A ENGENHARIA SOCIAL PRÁTICA.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
INTRODUÇÃO A PÓS EXPLORAÇÃO.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
INTRODUÇÃO A SEGURANÇA DA APLICAÇÃO - UNICIV.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
INTRODUÇÃO AO DESENVOLVIMENTO DE EXPLOITS 2.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
INTRODUÇÃO AO DESENVOLVIMENTO DE EXPLOITS.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Incident response - overview.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Informática para concurso.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Instagram – social network security.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Internet Safety - Sexual Predators and Stalkers, how to protect yourself.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Introdução Básica a Analise de Malware 1.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Introdução a Network Security 1.0.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Introdução a Network Security e Firewall.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Introdução ao Buffer overflow 1.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Introdução ao Mitre Att_ck e ao Cyber Kill Chain.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Introdução ao pentest mobile PT-1.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Investigation using OSINT with a focus on Intelligence operations and Dark Web operations - Training.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
JavaScript for Hackers 2.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
JavaScript for Hackers.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Linux Privilege Escalation – Overview.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Low Cost Red Team Tools .pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Low Cost SOC Tools 2.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
Low-cost SOC.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
eLearnSecurity Certified Incident Response (eCIR) – Guide Study to Exam.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
eLearnSecurity Mobile Application Penetration Testing.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
eLearnSecurity eCPPT Notes Exam.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
eLearnSecurity eCPTXv2 Notes.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
eLearnSecurity eCXD Preparation .pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
eLearnSecurity eWPT Notes.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
eLearnSecurity eWPTX Notes Basic by Joas.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |
ebook Invadindo com Metasploit VL 1.pdf
|
First commit
|
2024-09-06 12:32:35 -03:00 |