Security/Hacking Ebook Collection
#51
PDF
Code:
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/2018-07-18 19:02    -  
FOR500 - Windows Forensic Analysis/2018-07-18 19:02    -  
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/2018-07-18 19:02    -  
FOR518 - Mac and iOS Forensic Analysis and Incident Response/2018-07-18 19:02    -  
FOR526 - Memory Forensics In-Depth/2018-07-18 19:02    -  
FOR572 - Advanced Network Forensics Threat Hunting, Analysis, and Incident Response/2018-07-18 19:02    -  
FOR585 - Advanced Smartphone Forensics/2018-07-18 19:02    -  
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/2018-07-18 19:02    -  
ICS410 - ICS SCADA Security Essentials/2018-07-18 19:02    -  
MGT512 - SANS Security Leadership Essentials For Managers with Knowledge Compression/2018-07-18 19:02    -  
MGT514 - Security Strategic Planning, Policy, and Leadership/2018-07-18 19:02    -  
MGT517 - Managing Security Operations Detection, Response, and Intelligence/2018-07-18 19:02    -  
SEC201 - Computing & Technology Essentials/2018-07-18 19:02    -  
SEC401 - Security Essentials Bootcamp Style/2018-07-18 19:02    -  
SEC501 - Advanced Security Essentials - Enterprise Defender/2018-07-18 19:02    -  
SEC503 - Intrusion Detection In-Depth/2018-07-18 19:02    -  
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/2018-07-18 19:02    -  
SEC505 - Securing Windows and PowerShell Automation/2018-07-18 19:02    -  
SEC506 - Securing Linux-Unix/2018-07-18 19:02    -  
SEC511 - Continuous Monitoring and Security Operations/2018-07-18 19:02    -  
SEC524 - Cloud Security Fundamentals/2018-07-18 19:02    -  
SEC542 - Web App Penetration Testing and Ethical Hacking/2018-07-18 19:02    -  
SEC550 - Active Defense, Offensive Countermeasures and Cyber Deception/2018-07-18 19:02    -  
SEC555 - SIEM with Tactical Analytics/2018-07-18 19:02    -  
SEC560 - Network Penetration Testing and Ethical Hacking/2018-07-18 19:02    -  
SEC561 - Immersive Hands-on Hacking Techniques/2018-07-18 19:02    -  
SEC564 - Red Team Operations and Threat Emulation/2018-07-18 19:02    -  
SEC566 - Implementing and Auditing the Critical Security Controls - In-Depth/2018-07-18 19:02    -  
SEC573 - Automating Information Security with Python/2018-07-18 19:02    -  
SEC580 - Metasploit Kung Fu for Enterprise Pen Testing/2018-07-18 19:02    -  
SEC599 - Defeating Advanced Adversaries - Implementing Kill Chain Defenses/2018-07-18 19:02    -  
SEC617 - Wireless Penetration Testing and Ethical Hacking/2018-07-18 19:02    -  
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/2018-07-18 19:02    -  
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/2018-07-18 19:02    -  
SEC760 - Advanced Exploit Development for Penetration Testers/2018-07-18 19:02    -  

Videos
Code:
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/2018-07-18 19:06    -  
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/2018-07-18 19:06    -  
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/2018-07-18 19:06    -  
MGT512 - SANS Security Leadership Essentials For Managers with Knowledge Compression/2018-07-18 19:06    -  
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/2018-07-18 19:06    -  
SEC505 - Securing Windows and PowerShell Automation/2018-07-18 19:06    -  
SEC506 - Securing Linux-Unix/2018-07-18 19:06    -  
SEC542 - Web App Penetration Testing and Ethical Hacking/2018-07-18 19:06    -  
SEC560 - Network Penetration Testing and Ethical Hacking/2018-07-18 19:06    -  
SEC575 - Mobile Device Security and Ethical Hacking/2018-07-18 19:06    -  
SEC580 - Metasploit Kung Fu for Enterprise Pen Testing/2018-07-18 19:06    -  
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/2018-07-18 19:06    -  
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/2018-07-18 19:06    -  

https://www.thunix.org/~xkern/
Reply
#52
(08-28-2018, 12:01 AM)Neo Wrote: - snip -

Awesome share Neo! Thanks a lot. I'll download all of these and put up a back up mirror as soon as I have better internet.
Reply
#53
(08-26-2018, 07:13 PM)Insider Wrote:
(08-25-2018, 06:33 AM)ReviveSur89 Wrote:
(08-25-2018, 03:45 AM)lazyone Wrote:
(08-25-2018, 01:39 AM)ReviveSur89 Wrote:
(08-18-2018, 12:26 AM)lazyone Wrote: Tor link is alive, just downloaded 

thanks for sharing.

Sorry lazyone, Tor link is not working. The page said , Hmm, we having trouble finding that site.
tor link is working re checked.

[Image: 9kcJPG7.png]


But im still cant access it.

 this is my screenshot

https://imgur.com/a/RkzKaeg

https://www.torproject.org/



Problem solved. Thanks Insider.
Reply
#54
(08-28-2018, 12:01 AM)Neo Wrote: PDF
Code:
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/2018-07-18 19:02    -  
FOR500 - Windows Forensic Analysis/2018-07-18 19:02    -  
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/2018-07-18 19:02    -  
FOR518 - Mac and iOS Forensic Analysis and Incident Response/2018-07-18 19:02    -  
FOR526 - Memory Forensics In-Depth/2018-07-18 19:02    -  
FOR572 - Advanced Network Forensics Threat Hunting, Analysis, and Incident Response/2018-07-18 19:02    -  
FOR585 - Advanced Smartphone Forensics/2018-07-18 19:02    -  
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/2018-07-18 19:02    -  
ICS410 - ICS SCADA Security Essentials/2018-07-18 19:02    -  
MGT512 - SANS Security Leadership Essentials For Managers with Knowledge Compression/2018-07-18 19:02    -  
MGT514 - Security Strategic Planning, Policy, and Leadership/2018-07-18 19:02    -  
MGT517 - Managing Security Operations Detection, Response, and Intelligence/2018-07-18 19:02    -  
SEC201 - Computing & Technology Essentials/2018-07-18 19:02    -  
SEC401 - Security Essentials Bootcamp Style/2018-07-18 19:02    -  
SEC501 - Advanced Security Essentials - Enterprise Defender/2018-07-18 19:02    -  
SEC503 - Intrusion Detection In-Depth/2018-07-18 19:02    -  
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/2018-07-18 19:02    -  
SEC505 - Securing Windows and PowerShell Automation/2018-07-18 19:02    -  
SEC506 - Securing Linux-Unix/2018-07-18 19:02    -  
SEC511 - Continuous Monitoring and Security Operations/2018-07-18 19:02    -  
SEC524 - Cloud Security Fundamentals/2018-07-18 19:02    -  
SEC542 - Web App Penetration Testing and Ethical Hacking/2018-07-18 19:02    -  
SEC550 - Active Defense, Offensive Countermeasures and Cyber Deception/2018-07-18 19:02    -  
SEC555 - SIEM with Tactical Analytics/2018-07-18 19:02    -  
SEC560 - Network Penetration Testing and Ethical Hacking/2018-07-18 19:02    -  
SEC561 - Immersive Hands-on Hacking Techniques/2018-07-18 19:02    -  
SEC564 - Red Team Operations and Threat Emulation/2018-07-18 19:02    -  
SEC566 - Implementing and Auditing the Critical Security Controls - In-Depth/2018-07-18 19:02    -  
SEC573 - Automating Information Security with Python/2018-07-18 19:02    -  
SEC580 - Metasploit Kung Fu for Enterprise Pen Testing/2018-07-18 19:02    -  
SEC599 - Defeating Advanced Adversaries - Implementing Kill Chain Defenses/2018-07-18 19:02    -  
SEC617 - Wireless Penetration Testing and Ethical Hacking/2018-07-18 19:02    -  
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/2018-07-18 19:02    -  
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/2018-07-18 19:02    -  
SEC760 - Advanced Exploit Development for Penetration Testers/2018-07-18 19:02    -  

Videos
Code:
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/2018-07-18 19:06    -  
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/2018-07-18 19:06    -  
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/2018-07-18 19:06    -  
MGT512 - SANS Security Leadership Essentials For Managers with Knowledge Compression/2018-07-18 19:06    -  
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/2018-07-18 19:06    -  
SEC505 - Securing Windows and PowerShell Automation/2018-07-18 19:06    -  
SEC506 - Securing Linux-Unix/2018-07-18 19:06    -  
SEC542 - Web App Penetration Testing and Ethical Hacking/2018-07-18 19:06    -  
SEC560 - Network Penetration Testing and Ethical Hacking/2018-07-18 19:06    -  
SEC575 - Mobile Device Security and Ethical Hacking/2018-07-18 19:06    -  
SEC580 - Metasploit Kung Fu for Enterprise Pen Testing/2018-07-18 19:06    -  
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/2018-07-18 19:06    -  
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/2018-07-18 19:06    -  

https://www.thunix.org/~xkern/

Thank You for Sharing , Neo.
Reply
#55
Thank you all for contributing to this amazing site. Does any one have a recent pdf version of book by Michael Bazzell : open source intelligence techniques 6th edition or earlier?
Reply
#56
Thank you neo for this collection! It's very appreciated!
Reply
#57
(08-28-2018, 12:01 AM)Neo Wrote: -snip-

new link
https://mega.nz/#F!cZEQ1SyD!bm73kRBmRR79BOH4UOn2Eg

For the videos/audio most are already here
https://greysec.net/showthread.php?tid=1855
Reply
#58
Does anyone have something similar to this course.

https://ethicalhackersacademy.com/collec...estigation
Reply
#59
Hi, 

Do you have mirror link for the videos ?

Regards
Reply
#60
(10-19-2018, 07:06 AM)backtrack4 Wrote: Hi, 

Do you have mirror link for the videos ?

Regards

Read the replies.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  SANS & Offensive-Security BASELINE Torrent++ LFNTHNTR 75 239,802 03-17-2021, 08:04 PM
Last Post: Zemouri
  Help me hacking WPA2 wifi brandroot 5 4,948 03-01-2021, 08:13 PM
Last Post: Vector
  Practice your offensive security skills 0xRar 5 4,562 02-18-2021, 02:28 PM
Last Post: pr0ph3t
  Offensive Security PWK 2020 v2 Torrent ravasquez 6 11,016 02-01-2021, 05:04 AM
Last Post: williamlee