persian cyber eagle team

به آشیانه عقاب سایبری خوش آمدید

برچسب: کتاب رایگان

bug hunter

راهنمای تست امنیت وب اپلیکیشن ها

OWASP GUIDE 2020 475 صفحه ۹ مگابایت انگلیسی WSTG – v4.1 Table of Contents 0. Foreword by Eoin Keary 1. Frontispiece 2. Introduction 2.1 The OWASP Testing Project 2.2 Principles of Testing 2.3 Testing Techniques Explained 2.4 Manual Inspections and Reviews 2.5 Threat Modeling 2.6 Source Code Review 2.7 Penetration Testing 2.8 The Need for

cyber eagle

آنالیز بدافزار

Monnappa K A 2018 500 صفحه ۱۶ مگابایت انگلیسی Book Description Malware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics, and incident response. With adversaries becoming sophisticated and carrying out advanced malware attacks on critical infrastructures, data centers, and private and public organizations, detecting, responding to, and

persian cyber eagle

امنیت در برنامه نویسی و طراحی اپلیکیشن های اندروید

Japan Smartphone Security Association(JSSEC) ۲۰۱۹ ۵۲۳ صفحه ۹ مگابایت انگلیسی ۱ Introduction 1.1 Building a Secure Smartphone Society . . . . . . . . . . . . . . . . .  . . . . . ۱.۲ Timely Feedback on a Regular Basis Through the Beta Version . . . .

CEHv11

هکر قانونمند CEHv11

EC Council 2016 3219 صفحه ۴۳۰ مگابایت انگلیسی Module 01 Introduction to Ethical Hacking Module 02 Footprinting and Reconnaissance Module 03 Scanning Networks Module 04 Enumeration Module 05 Vulnerability Analysis Module 06 System Hacking Module 07 Malware Threats Module 08 Sniffing Module 09 Social Engineering Module 10 Denial-of-Service Module 11 Session Hijacking Module 12 Evading

understanding network hack

دفاع و حمله شبکه با پایتون

Bastian Ballmann 2015 192 صفحه ۱ مگابایت انگلیسی Introduction This book explains how to see one’s own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection,

persian cyber eagle

مهندسی معکوس با Ghidra

A.P David 2021 322 صفحه ۷ مگابایت انگلیسی Book description Detect potentials bugs in your code or program and develop your own tools using the Ghidra reverse engineering framework developed by the NSA project Key Features Make the most of Ghidra on different platforms such as Linux, Windows, and macOS Leverage a variety of plug-ins

crawling

web scraping with python

Ryan mitchell 2016 308 صفحه ۷ مگابایت انگلیسی Book description If programming is magic then web scraping is surely a form of wizardry. By writing a simple automated program, you can query web servers, request data, and parse it to extract the information you need. The expanded edition of this practical book not only introduces

penetration test with kali linux

تست نفوذ با کالی لینوکس (PWK)

offensive security 2020 853 صفحه ۴۶ مگابایت انگلیسی فهرست محتوا INTRODUCTIONCHAPTER 1: Penetration Testing with Kali Linux: General Course InformationCHAPTER 2: Getting Comfortable with Kali LinuxCHAPTER 3: Command Line FunCHAPTER 4: Practical ToolsCHAPTER 5: Bash ScriptingCHAPTER 6: Passive Information GatheringCHAPTER 7: Active Information GatheringCHAPTER 8: Vulnerability ScanningCHAPTER 9: Web Application AttacksCHAPTER 10: Introduction to Buffer