Code Monkey home page Code Monkey logo

cybersecurity-books's Introduction

Cybersecurity-Books

Here you will get awesome collection of mostly all well-known and usefull cybersecurity books from beginner level to expert for all cybersecurity positions

  1. Cyber_Sec_Roadmap_ (1).pdf

  2. 21 days free CCNA complete videos.pdf

  3. 101 Labs - CompTIA Linux+.pdf

  4. 7839+ Awesome Deep Web Onion Links List (Uncensored Content).pdf

  5. Bash Scripting.pdf

  6. bash scripting-1.pdf

  7. Basic knowldges of Pentesting (1).pdf

  8. Beginning Ethical Hacking with Kali Linux.pdf

  9. Bug Bounty Automation With Python The secrets of bug hunting.pdf

  10. Bug Bounty Field Manual.pdf

  11. Bug-Bounty-Field-Manual-complete-ebook (1).pdf

  12. CLICKJACKING AND SNIFFING.pdf

  13. Cyber Security_ Analytics, Technology and Automation.pdf

  14. Dark Web in ten minutes.pdf

  15. Data Analysis For Network Cyber-Security.pdf

  16. Developing Burp Suite Extensions _ security automation.pdf

  17. Digital Forensics Explained, 2nd Edition.pdf

  18. Ethical Hacking MindMap.pdf

  19. Exploiting Misconfigurations.pdf

  20. Hacking with Python_ The Ultimate Beginners Guide.pdf

  21. Hacking_ Computer Hacking Beginners Guide ( PDFDrive.com ).pdf

  22. How Linux Works 3rd - Early access (1).pdf

  23. How Linux Works 3rd - Early access.pdf

  24. InsidetheDarkWeb.pdf

  25. LINUX_FOR_BEGINNERS_How_to_Master_the_Linux_Operating_System_and.pdf

  26. Machine Learning with Python for Everyone.pdf

  27. Mastering_Kali_Linux_for_Advanced_Penetration_Testing_Beggs,_Robert.pdf

  28. Mastering_Reverse_Engineering_Re_engineer_your_ethical_hacking_skills.pdf

  29. Metasploit.Penetration.Testing.pdf

  30. Nmap 6_ Network exploration and security auditing Cookbook.pdf

  31. OSCP 2.pdf

  32. OSCP Like Vulns Machines.pdf

  33. PenTest in Office365 and Security.pdf

  34. Practical_Social_Engineering_A_Primer_for_the_Ethical_Hacker_by (1).pdf

  35. practical-reverse-engineering.pdf

  36. Purple Team Field Manual.pdf

  37. Quick_Start_Guide_to_Penetration_Testing_With_NMAP,_OpenVAS_and.pdf

  38. RE_for_beginners-en.pdf

  39. Real_World_Bug_Hunting_A_Field_Guide_to_Web_Hacking_by_Peter_Yaworski.pdf

  40. recon .pdf

  41. SAST Scanners - We Hack Purple Cheat Sheet.pdf

  42. ShellS.pdf

  43. SoC Analyst Career .pdf

  44. SQL INJECTION.pdf

  45. SQL squid game .pdf

  46. The Hacker Playbook 3 Practical Guide To Penetration Testing.pdf

  47. The_Basics_Of_Hacking_And_Penetration_Testing_Ethical_Hacking_And.pdf

  48. The_Code_Book__How_to_Make_It,_Break.pdf

  49. the-underground-hacker-s-handbook.pdf

  50. Web Application Security For Dummies.pdf

  51. Web_Scraping_with_Python_Collecting_More_Data_from_the_Modern_Web.pdf

  52. WiFi(HackProofYourWirelessNetwork).pdf

  53. Linux_Basics_for_Hackers_Getting_Started_with_Networking,_Scripting.pdf

  54. D1T2_Philippe_Langlois_Hacking_HLR_HSS_and_MME_Core_Network_Elements.pdf

  55. HAXPO D1 - Hacking LTE Public Warning Systems - Weiguang Li.pdf

  56. WiFi_Hacking_for_Beginners_Learn(1).pdf

  57. WiFi(HackProofYourWirelessNetwork).pdf

  58. Understanding_Network_Hacks_Attack_and_Defense_with_Python_Bastian.pdf

  59. Ultimate_Linux_Projects_First_Edition_2022_etc_z_lib_org.pdf

  60. The_NICE_Cyber_Security_Framework_Cyber_Security_Intelligence_and.pdf

  61. The_Basics_Of_Hacking_And_Penetration_Testing_Ethical_Hacking_And.pdf

  62. RE_for_beginners-en.pdf

  63. Perl Programming for Beginners.pdf

  64. ML_download.pdf

  65. malwaredatascience.pdf

  66. long_short_term_memory_networks_with_python.pdf

  67. Linux_system_programming_talking_directly_to_the_kernel_and_C_library.pdf

  68. Linux_Command_Line_and_Shell_Scripting_Bible_Richard_Blum,_Christine.pdf

  69. Kali_Linux_Wireless_Pentesting_and_Security_for_Beginners_@VPPOfficial.pdf

  70. Hide Data in AUDfile.pdf

  71. Hacking Android.pdf

  72. Google Hacking for Penetration Testers Volume2 .pdf

  73. Deep_learning_with_python--develop_deep.pdf

  74. Data Analysis For Network Cyber-Security.pdf

  75. Dark_Web_Exploring_and_Data_Mining_the_Dark_Side_of_the_Web_@HackingCraze.pdf

  76. Cybersecurity_โ€“_Attack_and_Defense_Strategies_Infrastructure_security.pdf

  77. Cyber Security_ Analytics, Technology and Automation.pdf

  78. 010SessionHijacking.pdf

  79. 009DOS LAB.pdf

  80. 007Sniffers LAB.pdf

  81. 005System Hacking LAB.pdf

  82. 005Metasploit Framework.pdf

  83. 002Foot Printing and Reconnaissance LAB.pdf

  84. 001Introduction To Ethical Hacking.pdf

cybersecurity-books's People

Contributors

zealraj avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.