white2hack 📚 – Telegram
white2hack 📚
12.4K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
Hack The Box CheatSheet

#pentest #CTF
👍5
HTB Cheat Sheet.pdf
173.1 KB
Hack The Box CheatSheet
3
sqlmap cheat sheet, 2023

#web #pentest
👍5
sqlmap-Cheat-Sheet.pdf
74.8 KB
sqlmap cheat sheet, 2023
👍3
Повышение привилегий на узлах локальной сети (в ОС Windows), CyberED, 2023

#pentest #windows
👍2🔥1
Повышение_привилегий_на_узлах_локальной_сети_в_ОС_Windows.pdf
7.5 MB
Повышение привилегий на узлах локальной сети (в ОС Windows), CyberED, 2023
😁2
Mastering Kali Linux for Advanced Penetration Testing, Fourth Edition by Vijay Kumar Velu, 2023

Apply a proactive approach to secure your cyber infrastructure and enhance your pentesting skills


#kali #book #pentest
🔥4
Mastering_Kali_Linux_for_Advanced_Penetration_Testing_Apply_a_proactive.pdf
47.4 MB
Mastering Kali Linux for Advanced Penetration Testing, Fourth Edition by Vijay Kumar Velu, 2023
👍5
Forwarded from CyberSecBastion
Zed Attack Proxy Cookbook Hacking tactics, techniques, and procedures for testing web applications and APIs by Ryan Soper, Nestor N Torres, Ahmed Almoailu, 2023

Maintaining your cybersecurity posture in the ever-changing, fast-paced security landscape requires constant attention and advancements. This book will help you safeguard your organization using the free and open source OWASP Zed Attack Proxy (ZAP) tool, which allows you to test for vulnerabilities and exploits with the same functionality as a licensed tool.

By the end of this ZAP book, you’ll be able to install and deploy ZAP, conduct basic to advanced web application penetration attacks, use the tool for API testing, deploy an integrated BOAST server, and build ZAP into a continuous integration and continuous delivery (CI/CD) pipeline.

The file is provided for reference only. Trial period of use - 3 days. Please, buy a license copy!

#book
👍4🔥1
Forwarded from CyberSecBastion
Zed Attack Proxy Cookbook.pdf
27.2 MB
Zed Attack Proxy Cookbook Hacking tactics, techniques, and procedures for testing web applications and APIs by Ryan Soper, Nestor N Torres, Ahmed Almoailu, 2023
4
Infosec Strategies and Best Practices. Gain proficiency in information security using expert-level strategies and best practices by Joseph MacMillan, 2023

The book starts by helping you to understand the core principles of information security, why risk management is important, and how you can drive information security governance. You'll then explore methods for implementing security controls to achieve the organization's information security goals.

As you make progress, you'll get to grips with design principles that can be utilized along with methods to assess and mitigate architectural vulnerabilities. The book will also help you to discover best practices for designing secure network architectures and controlling and managing third-party identity services.

Finally, you will learn about designing and managing security testing processes, along with ways in which you can improve software security.

#book #architecture
🔥5👍1
Packt.Infosec.Strategies.and.Best.Practices.1800566352.pdf
4.3 MB
Infosec Strategies and Best Practices. Gain proficiency in information security using expert-level strategies and best practices by Joseph MacMillan, 2023
👍1
Web Application Exploit Cheatsheet

#web