Jump to content


Popular Content

Showing content with the highest reputation on 03/23/2020 in all areas

  1. 154 points
    Offensive Security - OSCP [PWK] v2020 [PDF Version and Videos] [Download links] PWK is the foundational penetration testing course here at Offensive Security, and the only official training for the industry-leading OSCP exam. The original version of the course has enabled thousands of information security professionals to build their careers. Updating PWK to integrate the latest technology, tools and processes is critical to continuing to support our students. Our teams have worked hard to not only develop new additions to the content, but also to completely revise all the modules for a better experience. INDEX OF VIDEOS(capital letters): With the full chapter name: 02 Getting Comfortable with Kali Linux.avi 03 Command Line Fun.avi 04 Practical Tools.avi 05 Bash Scripting.avi 06 Passive Information Gathering.avi 07 Active Information Gathering.avi 08 Vulnerability Scanning.avi 09 Web Application Attacks.avi 10 Intruduction to Buffer Overflows.avi 11 Windows Buffer Overflows.avi 12 Linux Buffer Overflows.avi 13 Client-Side Attacks.avi 14 Locating Public Exploits.avi 15 Fixing Exploits.avi 16 File Transfers.avi 17 Antivirus Evasion.avi 18 Privilege Escalation.avi 19 Password Attacks.avi 20 Port Redirection and Tunneling.avi 21 Active Directory Attacks.mp4 22 The Metasploit Framework.avi 23 PowerShell Empire.avi 24 Assembling the Pieces-Penetration Test Breakdown.avi [hide][Hidden Content]] Make use of Hide Tag while posting download links. Usage: [ hide ] link [ /hide ] (without spaces). Read the Board Rules or get banned.
  2. 150 points
    Please import and then download. Credits to @ryujycool Updated with new links [hide][Hidden Content]] Note: Pdfs are in a zip file. Link for pdfs. Let me know if it expires. I will try to re upload. If it asks for a password, use "certcollection" without the quotes. [hide][Hidden Content]]
  3. 113 points
    First import please then download so the materiel remains available to all; [hide][Hidden Content]]
  4. 95 points
    It is reuploaded if problem persist download this video separately from here: [Hidden Content]
  5. 74 points
    Sorry I'm delelted link for reason: This courses and inform that such materials are confidential/copyright-protected materials belonging to Hakin9
  6. 73 points
    Just the buffer overflow video. [hide][Hidden Content]]
  7. 57 points
    [Hidden Content]
  8. 46 points
    [Hidden Content]
  9. 45 points
    Description As protecting information becomes a rapidly growing concern for today’s businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v10) certification. The CEH v10 Certified Ethical Hacker Study Guide offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instruction. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep track of your progress. The text provides thorough coverage of all topics, along with challenging chapter review questions and Exam Essentials, a key feature that identifies critical study areas. Subjects include intrusion detection, DDoS attacks, buffer overflows, virus creation, and more. This study guide goes beyond test prep, providing practical hands-on exercises to reinforce vital skills and real-world scenarios that put what you’ve learned into the context of actual job roles. Gain a unique certification that allows you to understand the mind of a hacker Expand your career opportunities with an IT certificate that satisfies the Department of Defense’s 8570 Directive for Information Assurance positions Fully updated for the 2018 CEH v10 exam, including the latest developments in IT security Access the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms Thanks to its clear organization, all-inclusive coverage, and practical instruction, the CEH v10 Certified Ethical Hacker Study Guide is an excellent resource for anyone who needs to understand the hacking process or anyone who wants to demonstrate their skills as a Certified Ethical Hacker. Download Link : password : Password [hide][Hidden Content]]
  10. 45 points
    Sure here you go [hide][Hidden Content]] Make use of Hide Tag while posting download links. Usage: [ hide ] link [ /hide ] (without spaces). Read the Board Rules or get banned.
  11. 44 points
    About This Book Demonstrates how to write various besopke client/server networking applications using standard and popular third-party Python libraries Learn how to develop client programs for networking protocols such as HTTP/HTTPS, SMTP, POP3, FTP, CGI, XML-RPC, SOAP and REST Provides practical, hands-on recipes combined with short and concise explanations on code snippets Who This Book Is For If you are a network programmer, system/network administrator, or a web application developer, this book is ideal for you. You should have a basic familiarity with the Python programming language and TCP/IP networking concepts. However if you are a novice, you will develop an understanding of the concepts as you progress with this book. This book will serve as a supplementary material for developing hands-on skills in any academic course on network programming. What You Will Learn Develop TCP/IP networking client/server applications Administer local machines' IPv4/IPv6 network interfaces Write multi-purpose efficient web clients for HTTP and HTTPS protocols Create e-mail clients to work with common e-mail protocols such as SMTP, POP3, IMAP, and so on. Scrape websites and search for useful information Perform remote system administration tasks over Telnet and SSH connections Interact with popular websites via web services such as XML-RPC, SOAP, and REST APIs Monitor and analyze major common network security vulnerabilities In Detail Python is an excellent language to use to write code and have fun by prototyping applications quickly. The presence of lots of third-party libraries, also known as batteries, makes it even more easier and faster to prototype an application or to implement a new algorithm. If you are interested in creating the building blocks for many practical web and networking applications that rely on networking protocols then this book is a must-have. This book highlights major aspects of network programming in Python starting from writing simple networking clients, to developing complex screen-scraping and network security monitoring scripts. It creates the building blocks for many practical web and networking applications that rely on various networking protocols. This book presents the power and beauty of Python in solving the numerous real-world tasks in the area of network programming, system and network administration, network monitoring, and web-application development. This book develops your ability to solve a wide range of network programming tasks in Python. We will start by exploring the Python standard library functions to create client/server network and manipulate your local networking resources available under both IPv4 and IPv6. The practical focus continues with creating web and email clients, scraping web pages, fetching information from various websites, and searching for information on the Web such as Amazon, Flickr, and other sites. It further develops your skills to analyze your network security vulnerabilities using advanced network packet capture and analysis techniques. Link for download : password : Password [hide][Hidden Content]]
  12. 43 points
    CCNP and CCIE Enterprise Core & CCNP Advanced Routing Portable Command Guide: All ENCOR (350-401) and ENARSI (300-410) April 10, 2020 | ISBN: 978-0135768167 | English | 416 pages | PDF & EPUB | 14.6 MB & 9.67 MB All ENCOR (350-401) and ENARSI (300-410) Commands in One Compact, Portable Resource Use this fully updated quick reference resource to help memorize commands and concepts as you earn your CCNP or CCIE certification. Filled with valuable, easy-to-access information, it’s portable enough to use anywhere. This guide summarizes all Cisco IOS software commands, keywords, command arguments, and associated prompts associated with the CCNP and CCIE Enterprise Core (ENCOR 350-401) and CCNP Enterprise Advanced Routing and Services (ENARSI 300-410) certification exams. Tips and examples help you apply commands to real-world scenarios, and configuration samples show their use in network designs. Coverage includes: Layer 2: VLANs, STP, Inter-VLAN Routing Layer 3: EIGRP, OSPF, Redistribution, Path Control, BGP Infrastructure Services and Management Infrastructure Security Network Assurance Wireless Security and Troubleshooting Overlays and Virtualization This Portable Command Guide provides: Logical how-to topic groupings for a one-stop resource Great for review before your ENCOR 350-401 and ENARSI 300-410 certification exams Compact size makes it easy to carry with you wherever you go “Create Your Own Journal” section with blank, lined pages enables you to personalize the book for your needs This book is part of the Cisco Press Certification Self-Study Product Family, which offers readers a self-paced study routine for Cisco certification exams. Titles in the Cisco Press Certification Self-Study Product Family are part of a recommended learning program from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. (PDF) [hide][Hidden Content]] (EPUB) [hide][Hidden Content]]
  13. 31 points
    CCNP and CCIE Enterprise Core Command Guide. PDF Format. [Hidden Content] Make use of Hide Tag while posting download links. Usage: [ hide ] link [ /hide ] (without spaces). Read the Board Rules or get banned.
  14. 30 points
  15. 29 points
    [hide][Hidden Content]]
  16. 29 points
    Hi Can anyone download cobaltstrike 4.0 from below link and upload it to gdrive or mega [Hidden Content]
  17. 28 points
    Saw this in another forum, hence posting the content. 1 SD-WAN (Viptela) - basic & advanced 2. SD-ACCESS (DNAC) [Hidden Content] Slides [Hidden Content]
  18. 27 points
    @batety Would you please share the other link of Part 5... It's not being downloaded fully. I tried multiple times. Hidden Content I found that links for Lab-Minutes SD-Access , i used the leeching website for fast download ( [Hidden Content] & [Hidden Content] ) here are the Links .... Enjoy [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content]
  19. 26 points
    Penetration Testing with Kali Linux 2.0 (PWK 2.0) [hide][Hidden Content]] [hide][Hidden Content]]
  20. 23 points
    OSCP PDF only [hide][Hidden Content]]
  21. 23 points
  22. 23 points
    yes its all new video, looks good: [Hidden Content]
  23. 22 points
    [Hidden Content]
  24. 21 points
  25. 21 points
    Please mega shared Make use of Hide Tag while posting download links. Usage: [ hide ] link [ /hide ] (without spaces). Read the Board Rules or get banned.
  26. 21 points
    SD Access: [hide][Hidden Content]]
  27. 20 points
    Hello all, Learn how to program in Python while making and breaking ciphers—algorithms used to create and send secret messages! After a crash course in Python programming basics, you’ll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère cipher. You’ll begin with simple programs for the reverse and Caesar ciphers and then work your way up to public key cryptography, the type of encryption used to secure today’s online transactions, including digital signatures, email, and Bitcoin. Each program includes the full code and a line-by-line explanation of how things work. By the end of the book, you’ll have learned how to code in Python and you’ll have the clever programs to prove it! You’ll also learn how to: - Combine loops, variables, and flow control statements into real working programs - Use dictionary files to instantly detect whether decrypted messages are valid English or gibberish - Create test programs to make sure that your code encrypts and decrypts correctly - Code (and hack!) a working example of the affine cipher, which uses modular arithmetic to encrypt a message - Break ciphers with techniques such as brute-force and frequency analysis There’s no better way to learn to code than to play with real programs. Cracking Codes with Python makes the learning fun! Paperback: 416 pages Publisher: No Starch Press (January 23, 2018) Language: English password : Password [hide][Hidden Content]]
  28. 19 points
    ITProTV – Cisco CCNP Enterprise ENCOR (350-401) [Hidden Content]
  29. 19 points
  30. 17 points
    all 83 Videos from CBT NUGGETS JNCIA DEVOPS series Files list included in the link Learn how to apply DevOps and automation skills to Juniper devices and network functions as you prepare for the JN0-220, the one Juniper exam you need to pass to earn the JNCIA-DevOps certification. Cover topics related to the automation of Junos devices and networks: Junos automation stack, tools, frameworks, and APIs Extensible Markup Language (XML), XML API, XPath, and the Network Configuration Protocol (NETCONF) YAML Ain't Markup Language (YAML) and Javascript Object Notation (JSON) data serialization Ansible architecture, playbooks, and Juniper Junos Ansible modules The Junos REST API and REST API Explorer Python and Junos PyEZ tools, including Remote Procedure Calls (RPCs) and PyEZ exception handling Start this entry-level series today to become qualified at administering and automating modern-day Juniper networks. [Hidden Content] [hide][Hidden Content]]
  31. 17 points
    Thanks to JinBaba [Hidden Content] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]]
  32. 17 points
    Learn Protect data with encryption and hashing Explore and compare various encryption methods Encrypt data using the Caesar Cipher technique Make hashes and crack them Learn how to use three NIST-recommended systems: AES, SHA, and RSA Understand common errors in encryption and exploit them About Cryptography is essential for protecting sensitive information, but it is often performed inadequately or incorrectly. Hands-On Cryptography with Python starts by showing you how to encrypt and evaluate your data. The book will then walk you through various data encryption methods,such as obfuscation, hashing, and strong encryption, and will show how you can attack cryptographic systems. You will learn how to create hashes, crack them, and will understand why they are so different from each other. In the concluding chapters, you will use three NIST-recommended systems: the Advanced Encryption Standard (AES), the Secure Hash Algorithm (SHA), and the Rivest-Shamir-Adleman (RSA). By the end of this book, you will be able to deal with common errors in encryption. Features Explore popular and important cryptographic methods Compare cryptographic modes and understand their limitations Learn to perform attacks on cryptographic systems password : Password [hide][Hidden Content]]
  33. 17 points
    [hide][Hidden Content]] MOVED TOPIC Topic is moved to proper section. Open topic in appropriate section with suitable prefix.
  34. 17 points
    Below is Cisco's list of free study material for the ENCOR 350-401 written exam. [Hidden Content]
  35. 17 points
    Dear All , [Hidden Content] Please, hide your links next time. Usage: [ hide ] All your Download links [ /hide ] (without spaces)
  36. 16 points
  37. 16 points
    You are amazing. Thank you
  38. 15 points
    Hello! This is a sync share that contains only SANS text and video materials. All I could find across the universe. PDF: ICS410 - ICS/SCADA Security Essentials 2016 [*]AUD507 - Auditing & Monitoring Networks, Perimeters & Systems 2016 [*]DEV540 - Secure DevOps and Cloud Application Security 2017 [*]FOR500 - Windows Forensic Analysis 2017 [*]FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting 2019 [*]FOR518 - Mac and iOS Forensic Analysis and Incident Response 2015 [*]FOR526 - Memory Forensics In-Depth 2015 [*]FOR572 - Advanced Network Forensics Threat Hunting, Analysis, and Incident Response 2017 [*]FOR585 - Advanced Smartphone Forensics 2017 [*]FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques 2017 [*]MGT512 - SANS Security Leadership Essentials For Managers with Knowledge Compression 2011 [*]MGT514 - Security Strategic Planning, Policy, and Leadership 2016 [*]MGT517 - Managing Security Operations Detection, Response, and Intelligence 2018 [*]SEC201 - Computing & Technology Essentials 2017 [*]SEC401 - Security Essentials Bootcamp Style 2017 [*]SEC460 - Enterprise Threat and Vulnerability Assessment 2018 [*]SEC487 - Open-Source Intelligence (OSINT) Gathering and Analysis 2018 [*]SEC501 - Advanced Security Essentials - Enterprise Defender 2016 [*]SEC503 - Intrusion Detection In-Depth 2015 [*]SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling 2016 [*]SEC505 - Securing Windows and PowerShell Automation 2017 [*]SEC506 - Securing Linux-Unix 2017 [*]SEC511 - Continuous Monitoring and Security Operations 2016 [*]SEC524 - Cloud Security Fundamentals 2012 [*]SEC542 - Web App Penetration Testing and Ethical Hacking 2016 [*]SEC545 - Cloud Security Architecture and Operations 2017 [*]SEC550 - Active Defense, Offensive Countermeasures and Cyber Deception 2016 [*]SEC555 - SIEM with Tactical Analytics 2017 [*]SEC560 - Network Penetration Testing and Ethical Hacking 2018 [*]SEC561 - Immersive Hands-On Hacking Techniques 2015 [*]SEC564 - Red Team Operations and Threat Emulation 2017 [*]SEC566 - Implementing and Auditing the Critical Security Controls - In-Depth 2016 [*]SEC573 - Automating Information Security with Python 2017 [*]SEC579 - Virtualization and Software-Defined Security 2016 [*]SEC580 - Metasploit Kung Fu for Enterprise Pen Testing 2016 [*]SEC599 - Defeating Advanced Adversaries - Implementing Kill Chain Defenses 2019 [*]SEC617 - Wireless Penetration Testing and Ethical Hacking 2019 [*]SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques 2017 [*]SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking 2019 [*]SEC760 - Advanced Exploit Development for Penetration Testers 2016 Video: AUD507 - Auditing & Monitoring Networks, Perimeters & Systems 2008 [*]FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting 2015 [*]FOR610 - Reverse-Engineering Malware: Malware Analysis Tools and Techniques 2015 [*]SEC401 - Security Essentials Bootcamp Style 2017 [*]SEC503 - Network Intrusion Detection 2018 [*]SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling 2017 [*]SEC505 - Securing Windows and PowerShell Automation 2017 [*]SEC506 - Securing Linux-Unix 2011 [*]SEC542 - Web App Penetration Testing and Ethical Hacking 2018 [*]SEC560 - Network Penetration Testing and Ethical Hacking 2018 [*]SEC564 - Red Team Exercises and Adversary Emulation 2020 [*]SEC575 - Mobile Device Security and Ethical Hacking 2017 [*]SEC580 - Metasploit Kung Fu for Enterprise Pen Testing 2011 [*]SEC617 - Wireless Penetration Testing and Ethical Hacking 2019 [*]SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques 2015 [*]SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking 2019 [Hidden Content] If you have any new stuff, just PM me. I will add it to the share. Stay synchronised and seed. There will be updates! Kudos to @LFNTHNTR for the baseline.
  39. 15 points
    Hello, Im preparing for the Entreprise LAB, so you can join me in case you will go for the CCIE EI gd luck
  40. 14 points
    enjoy [Hidden Content]
  41. 14 points
    [hide][Hidden Content]] [hide][Hidden Content]]
  42. 13 points
    Copyright 2020 Dimensions: 7-3/8" x 9-1/8" Pages: 904 Edition: 1st Book ISBN-10: 0-13-597197-7 ISBN-13: 978-0-13-597197-0 The CCNP Security Core SCOR 300-701 Official Cert Guide serves as comprehensive guide for individuals who are pursuing the Cisco CCNP Security certification. This book helps any network professionals that want to learn the skills required to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. Complete and easy to understand, it explains key concepts and techniques through real-life examples. This book will be valuable to any individual that wants to learn about modern cybersecurity concepts and frameworks. EPUB [hide][Hidden Content]] PDF [hide][Hidden Content]]
  43. 13 points
    All 67 Videos from CBT Nuggets List of files included on the link !! Gain an understanding of iSCSI, the Data Center Bridging Exchange (DCBX) protocol, role-based access control (RBAC), hypervisors, and more as you cover concepts related to the Cisco Unified Computing System (UCS): Fundamental and advanced networking elements of UCS environments Components of Fibre Channel (FC), such as fabrics, zoning, and port types Backup types of UCS, including logical, all, system, and full state Maintenance windows for UCS upgrades Components of UCS multitenancy, including organizations and locales UCS storage networking, such as VSAN, DAS, unified ports, NPIV, NPV, and FLOGI Start this series today to learn the foundational elements UCS administrators should be aware of when working in data centers. [Hidden Content] [hide][Hidden Content]]
  44. 13 points
    see in attached archive redhatexams2018.7z.zip
  45. 12 points
    Amazon, [Hidden Content] This course is specifically designed for the aspirants who intend to give the "AWS Solutions Architect - Professional" level certification as well as for those who intend to gain deeper understanding related to AWS. Keeping the standards high similar to other best seller courses of Zeal, this course has a perfect balance and the things are explained in a simplified way with practical scenarios. With tons of quizzes, great lectures and fantastic support from the Instructor, this course is all you need to master the AWS Solutions Architect Professional certification. [Hidden Content]
  46. 12 points
    hi guys, this is some questions from cfg2 : D [hide][Hidden Content]]
  47. 11 points
    all the 340 Videos from Cbt Nuggets All courses list is included on the link In this Cisco DevNet Associate exam course, trainers Keith Barker, Ben Finkel, and Knox Hutchinson will cover the 200-901 DEVASC exam objectives. The 200-901 DEVASC is the one required exam to earn the DevNet Associate certification. Given the breadth of Cisco technologies in the marketplace, properly trained professionals with the DevNet Associate are very valuable across industries. After watching these 55 skills, you'll not only find yourself more marketable as a networking professional, but also gain valuable routing and switching skills. With the right experience, DevOps professionals who complete this DevNet Associate training will be well-positioned to step into network or DevOps engineer roles. For IT managers, this DevNet Associate training can be used for exam prep, on-boarding new DevOps professionals, or as part of a team training plan. DevNet Associate 200-901 DEVASC: What You Need to Know This 55-skill DevNet training maps to the Cisco 200-901 DEVASC exam objectives and covers these topics: Software development and design Understanding and using APIs Cisco platforms and development Application deployment and security Infrastructure and automation Network fundamentals [Hidden Content] 200-901 DEVASC [hide][Hidden Content]]
  48. 11 points
    My friendz, I share with you gretes dump ever. Exam qestion for: ex183 ex200 ex210 ex220 ex234 ex236 ex248 ex276 ex280 ex283 ex300 ex310 ex318 ex342 ex403 ex405 ex407 ex413 ex421 ex427 ex436 ex442 ex450 ex453 ex465 Plase download and shar wif oters. Questions are from reall exam serverz from myfriend redhat examiner. [hide][Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content]]
  49. 11 points
    Arguably one of the most highly regarded and widely used enterprise level operating systems available today is the Red Hat Enterprise Linux 8 distribution. Not only is it considered to be among the most stable and reliable operating systems, it is also backed by the considerable resources and technical skills of Red Hat, Inc. RHEL 8 Essentials is designed to provide detailed information on the installation, use and administration of the Red Hat Enterprise Linux 8 distribution. For beginners, the book covers topics such as operating system installation, the basics of the GNOME desktop environment, configuring email and web servers and installing packages and system updates using App Streams. Additional installation topics such as dual booting with Microsoft Windows are also covered, together with allimportant security topics such as configuring a firewall and user and group administration. For the experienced user, topics such as remote desktop access, the Cockpit web interface, logical volume management (LVM), disk partitioning, swap management, KVM virtualization, Secure Shell (SSH), Linux Containers and file sharing using both Samba and NFS are covered in detail to provide a thorough overview of this enterprise class operating system. [Hidden Content]
  50. 11 points
    Hi guys, I have uploaded the baisc and advanced series but without the missing videos, i do not have them and appreciate if any one will share the missing videos [hide][Hidden Content] [Hidden Content]]
  • Create New...