330 Pages
75.
Hackers Beware – Defending Your Network From The Wiley Hacker
817 Pages
76.
Hack Proofing Your Network
826 Pages
77.
Hack Attacks Revealed
837 Pages
78.
Dissecting the Hack – The F0rb1dd3n Network
441 Pages
79.
TCP/IP Guide
1671 Pages
80.
Offensive Security – Wireless Attacks – WiFu
385 Pages
81.
Google Hacking – For Penetration Testers
529 Pages
82.
Computer Forensics Investigating Network Intrusions and Cyber Crime
394 Pages
83.
Hakin9 Bible
207 Pages
84.
Network Forensics – Tracking Hackers Through Cyberspace
574 Pages
85.
Computer Forensics – Investigating Data and Image Files
227 Pages
86.
Penetration Testing and Network Defense
625 Pages
87.
Hacking Exposed – Malware and Rootkits
401 Pages
88.
Malware Analyst’s Cookbook
746 Pages
89.
Mobile Malware – Attacks and Defense
386 Pages
90.
Java 2 Network Security
702 Pages
91.
A Bug Hunter’s Diary
212 Pages
92.
Viruses Revealed – Undestand and Counter Malicious Software
721 Pages
93.
Figital Forensics With Open Source Tools
289 Pages
94.
SSH, The Secure Shell – The Definitive Guide
438 Pages
95.
Pro PHP Security
369 Pages
96.
Zero Day Exploit – Countdown to Darkness
363 Pages
97.
Metasploit Penetration Testing Cookbook
269 Pages
98.
24 Deadly Sins of Software Securtiy
433 Pages
99.
Botnets – The Killer Web App
482 Pages
100.
Hacker Highschool – Hack School for Beginners (ZIP)
https://hackingresources.com/hacking-security-ebooks/
75.
Hackers Beware – Defending Your Network From The Wiley Hacker
817 Pages
76.
Hack Proofing Your Network
826 Pages
77.
Hack Attacks Revealed
837 Pages
78.
Dissecting the Hack – The F0rb1dd3n Network
441 Pages
79.
TCP/IP Guide
1671 Pages
80.
Offensive Security – Wireless Attacks – WiFu
385 Pages
81.
Google Hacking – For Penetration Testers
529 Pages
82.
Computer Forensics Investigating Network Intrusions and Cyber Crime
394 Pages
83.
Hakin9 Bible
207 Pages
84.
Network Forensics – Tracking Hackers Through Cyberspace
574 Pages
85.
Computer Forensics – Investigating Data and Image Files
227 Pages
86.
Penetration Testing and Network Defense
625 Pages
87.
Hacking Exposed – Malware and Rootkits
401 Pages
88.
Malware Analyst’s Cookbook
746 Pages
89.
Mobile Malware – Attacks and Defense
386 Pages
90.
Java 2 Network Security
702 Pages
91.
A Bug Hunter’s Diary
212 Pages
92.
Viruses Revealed – Undestand and Counter Malicious Software
721 Pages
93.
Figital Forensics With Open Source Tools
289 Pages
94.
SSH, The Secure Shell – The Definitive Guide
438 Pages
95.
Pro PHP Security
369 Pages
96.
Zero Day Exploit – Countdown to Darkness
363 Pages
97.
Metasploit Penetration Testing Cookbook
269 Pages
98.
24 Deadly Sins of Software Securtiy
433 Pages
99.
Botnets – The Killer Web App
482 Pages
100.
Hacker Highschool – Hack School for Beginners (ZIP)
https://hackingresources.com/hacking-security-ebooks/
😃
No matter how your:
⛔️ firewall configuration is off the shelf and does fit YOUR business
⛔️ Intrusion Detection Systems don’t actually monitor the whole network and can be evaded
⛔️Cryptography is reviewed internally and has never been externally validated
⛔️ Anti-virus software can be bypassed by a 12 year old
No matter how your:
⛔️ firewall configuration is off the shelf and does fit YOUR business
⛔️ Intrusion Detection Systems don’t actually monitor the whole network and can be evaded
⛔️Cryptography is reviewed internally and has never been externally validated
⛔️ Anti-virus software can be bypassed by a 12 year old
Top 5 Data Center Environmental Monitoring Systems
http://www.sphomerun.com/blog/top-5-data-center-environmental-monitoring-systems
http://www.sphomerun.com/blog/top-5-data-center-environmental-monitoring-systems
Dcsmi
Top 5 Data Center Environmental Monitoring Systems
What’s the climate like in your server rooms? Are you using a data center Environmental Monitoring System? Here’s why you should.
Cyber Threat Intelligence Tools List:
-Formats
Standardized formats for sharing Threat Intelligence (mostly IOCs)
-Frameworks and Platforms
Frameworks, platforms and services for collecting, analyzing, creating and sharing Threat Intelligence
-Tools
All kinds of tools for parsing, creating and editing Threat Intelligence. Mostly IOC based
-Research, Standards & Books
All kinds of reading material about Threat Intelligence. Includes (scientific) research and whitepapers
https://gbhackers.com/cyber-threat-intelligence-tools/
-Formats
Standardized formats for sharing Threat Intelligence (mostly IOCs)
-Frameworks and Platforms
Frameworks, platforms and services for collecting, analyzing, creating and sharing Threat Intelligence
-Tools
All kinds of tools for parsing, creating and editing Threat Intelligence. Mostly IOC based
-Research, Standards & Books
All kinds of reading material about Threat Intelligence. Includes (scientific) research and whitepapers
https://gbhackers.com/cyber-threat-intelligence-tools/
GBHackers Security | #1 Globally Trusted Cyber Security News Platform
50 Best Free Cyber Threat Intelligence Tools - 2026
Best Threat Intelligence Tools are more often used by security industries to test the vulnerabilities in networks and applications.
Instantly diagnose slowdowns and anomalies in your infrastructure with thousands of metrics, interactive visualizations, and insightful health alarms.
https://my-netdata.io
https://my-netdata.io
www.netdata.cloud
Netdata: Monitoring and troubleshooting transformed
Real-time infrastructure monitoring with per-second metrics, ML anomaly detection, and AI troubleshooting. Open source, #1 on GitHub. Cut MTTR by 80%.
1.
Https://github.com/evait-security envizon
2.
Astra - Automated Security Testing For REST API's
https://github.com/flipkart-incubator/astra
3.
RTA - Framework Designed To Test The Detection Capabilities Against Malicious Tradecraft
https://github.com/endgameinc/RTA
4.
Yamot - Yet Another MOnitoring Tool
https://github.com/knrdl/yamot
5.
WSSAT - Web Service Security Assessment Tool
https://github.com/YalcinYolalan/WSSAT
6.
Bad-Pdf Steal NTLM Hashes With A PDF From Windows Machines
https://github.com/deepzec/Bad-Pdf
7.
RedHunt OS - Virtual Machine For Adversary Emulation And Threat Hunting
https://github.com/redhuntlabs/RedHunt-OS
8.
Infection Monkey - An Automated Pentest Tool
https://github.com/guardicore/monkey
9.
Detection cms and pentest
Https://github.com/mobrine-mob/M0B-tool
-
Https://github.com/evait-security envizon
2.
Astra - Automated Security Testing For REST API's
https://github.com/flipkart-incubator/astra
3.
RTA - Framework Designed To Test The Detection Capabilities Against Malicious Tradecraft
https://github.com/endgameinc/RTA
4.
Yamot - Yet Another MOnitoring Tool
https://github.com/knrdl/yamot
5.
WSSAT - Web Service Security Assessment Tool
https://github.com/YalcinYolalan/WSSAT
6.
Bad-Pdf Steal NTLM Hashes With A PDF From Windows Machines
https://github.com/deepzec/Bad-Pdf
7.
RedHunt OS - Virtual Machine For Adversary Emulation And Threat Hunting
https://github.com/redhuntlabs/RedHunt-OS
8.
Infection Monkey - An Automated Pentest Tool
https://github.com/guardicore/monkey
9.
Detection cms and pentest
Https://github.com/mobrine-mob/M0B-tool
-
GitHub
evait security GmbH
full time white hacking / pentesting company who always stays on bleeding edge | develop and maintaining envizon - evait security GmbH
the best Firewall/ Linux by Techradar org :
1- ClearOS
2- IPCop
3- OPNsense
4- IPFire
5- pfSense
6- Smoothwall Express
1- ClearOS
2- IPCop
3- OPNsense
4- IPFire
5- pfSense
6- Smoothwall Express
SoNebuntu is a Linux distribution based on Ubuntu with pre installed tools for Social Network Analyzers.
SNA Tools:
Gephi
Cytoscape
MuxViz
SNAP
SocNetV
NetLogo
Visione
Crawler Tools:
Apache Nutch
Heritrix
Norconex
Open Search Server
Open Web Spider
Web Sphinx
https://sonebuntu.com/
SNA Tools:
Gephi
Cytoscape
MuxViz
SNAP
SocNetV
NetLogo
Visione
Crawler Tools:
Apache Nutch
Heritrix
Norconex
Open Search Server
Open Web Spider
Web Sphinx
https://sonebuntu.com/
Forwarded from cissp (Alireza Ghahrood)
https://t.me/cissp
International channel for Transmission Knowledge In the field of Cyber Security with a Focus on the Content of the CISSP-ISC2 course
+also group:
@cisspgroup
International channel for Transmission Knowledge In the field of Cyber Security with a Focus on the Content of the CISSP-ISC2 course
+also group:
@cisspgroup
Telegram
cissp
@cissp
International channel 4 Transmission Knowledge In the Field of Cyber Security with a Focus on the Content of the CISSP-ISC2 Course
- - - - - - - - - -
+also group: https://t.me/cisspgroup
—————————
@alirezaghahrood
International channel 4 Transmission Knowledge In the Field of Cyber Security with a Focus on the Content of the CISSP-ISC2 Course
- - - - - - - - - -
+also group: https://t.me/cisspgroup
—————————
@alirezaghahrood