Hands-On Penetration Testing on Windows
Master the art of identifying vulnerabilities within the Windows OS and develop the desired solutions for it using Kali Linux.
Master the art of identifying vulnerabilities within the Windows OS and develop the desired solutions for it using Kali Linux.
Over 100 recipes for penetration testing using Metasploit and virtual machines
Read More »Metasploit Penetration Testing Cookbook – Third Edition
Gain practical experience of creating security solutions and designing secure, highly available, and dynamic infrastructure for your organization
Read More »Hands-On Cybersecurity for Architects: Plan and design robust security architectures
Back for the third season, The Hacker Playbook 3 (THP3) takes your offensive game to the pro tier. With a combination of new strategies, attacks, exploits, tips and tricks, you will be able to put yourself in the center of the action toward victory.
Read More »The Hacker Playbook 3: Practical Guide To Penetration Testing
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.Read More »Penetration Testing: A Hands-On Introduction to Hacking
The Red Team Field Manual (RTFM) is a no fluff, but thorough reference guide for serious Red Team members who routinely find themselves on a… Read More »Rtfm: Red Team Field Manual 1.0 Edition
Read More »CEH v10 : Certified Ethical Hacker v10 PDF Download
Read More »CEH V10 : Certified Ethical Hacker v10 Lab Tools Download
If you are currently struggling with getting traffic to your website, or converting that traffic when it shows up, you may think you’ve got a… Read More »DotCom Secrets: The Underground Playbook for Growing Your Company Online
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation. Key Features Intelligence processes and procedures for response mechanisms Master… Read More »Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents