Jump to content

Leaderboard


Popular Content

Showing content with the highest reputation on 06/13/2020 in all areas

  1. 141 points
    English | 2020 | ISBN-13: 978-0136634324 | 750 Pages | EPUB | 58.31 MB Enterprise Networking, Security, and Automation (CCNA v7) Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the Enterprise Networking, Security, and Automation course and organize your time. The book’s features help you focus on important concepts to succeed in this course: Chapter Objectives – Review core concepts by answering the focus questions listed at the beginning of each chapter. Key Terms – Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter. Glossary – Consult the comprehensive Glossary with more than 250 terms. Summary of Activities and Labs – Maximize your study time with this complete list of all associated practice exercises at the end of each chapter. Check Your Understanding – Evaluate your readiness with the end-of-chapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer. How To – Look for this icon to study the steps you need to learn to perform certain tasks. Interactive Activities – Reinforce your understanding of topics with dozens of exercises from the online course identified throughout the book with this icon. Packet Tracer Activities – Explore and visualize networking concepts using Packet Tracer exercises interspersed throughout the chapters and provided in the accompanying Labs & Study Guide book. Videos – Watch the videos embedded within the online course. Hands-on Labs – Work through all the course labs and additional Class Activities that are included in the course and published in the separate Labs & Study Guide. Part of the Cisco Networking Academy Series from Cisco Press, books in this series support and complement the Cisco Networking Academy curriculum. [hide][Hidden Content]]
  2. 132 points
    Founds this in my travels. Authority Hacker Pro Seo Course 2020 by Gael Breton and Mark Webster. Grab it while the link is still available. Import, download and share. [Hidden Content]
  3. 90 points
    English | 2020 |ISBN-13: 978-0136633662 | 736 Pages | EPUB | 51.73 MB Introduction to Networks (CCNA v7) Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the Introduction to Networks course and organize your time. The book’s features help you focus on important concepts to succeed in this course: Chapter Objectives – Review core concepts by answering the focus questions listed at the beginning of each chapter. Key Terms – Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter. Glossary – Consult the comprehensive Glossary with more than 250 terms. Summary of Activities and Labs – Maximize your study time with this complete list of all associated practice exercises at the end of each chapter. Check Your Understanding – Evaluate your readiness with the end-of-chapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer. How To – Look for this icon to study the steps you need to learn to perform certain tasks. Interactive Activities – Reinforce your understanding of topics with dozens of exercises from the online course identified throughout the book with this icon. Videos – Watch the videos embedded within the online course. Packet Tracer Activities – Explore and visualize networking concepts using Packet Tracer. There are 40 exercises interspersed throughout the chapters and provided in the accompanying Labs & Study Guide book. Part of the Cisco Networking Academy Series from Cisco Press, books in this series support and complement the Cisco Networking Academy curriculum. [hide][Hidden Content]]
  4. 85 points
  5. 59 points
  6. 49 points
    Hello Everyone, I found, ACloud Guru - AZ-300 Microsoft Azure Architect Technologies 2020, by Nick Colyer. Please fine the same. [hide][Hidden Content]] Make use of Hide Tag while posting download links. Usage: [ hide ] link [ /hide ] (without spaces).
  7. 43 points
    HACKIN9 COURSES shared. once again updated link: 12-06-2020 New link as per request: Happy Hunting!!! [hide] reuploaded Link : [Hidden Content]]
  8. 40 points
    Hi Team, There are so many times this forum help me to grow my career and now I am preparing for #CISSP and its time for me to give it back to community. Below materials I have been collected from various sources including certcollection. Use below mega.nz link. Instead of download, import to your account before it get blocked. [Hidden Content] Another useful resource which I am using currently is FRSecure Youtube Channel (Look for 2020 FRSecure CISSP Mentor Program).
  9. 33 points
    here is the file in case of any problems [hide][Hidden Content]]
  10. 29 points
  11. 29 points
    direct links [hide][Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content]]
  12. 28 points
    ISACA CRISC review manual 6th ed [hide][Hidden Content]] Mega link: [hide][Hidden Content]]
  13. 28 points
  14. 24 points
    single direct link [Hidden Content]
  15. 23 points
    INE - TrustSec Course Description:- Learn how to protect your critical business assets with software-defined segmentation. Scalability, consistent policy enforcement, simplified provisioning and management of secure network access are just some of the benefits offered by Cisco TrustSec. This course discusses TrustSec in detail and explains how to implement, verify and troubleshoot this technology on different Cisco platforms. DOWNLOAD LINK 1:- [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] DOWNLOAD LINK 2:- [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]]
  16. 23 points
    The importance of Active Directory in an enterprise cannot be stressed enough. Used by more than 90% of Fortune 1000 companies, the all-pervasive AD is the focal point for adversaries. Still, when it comes to AD security, there is a large gap of knowledge, which security professionals and administrators struggle to fill. Over the years, we have taught numerous professionals in real world trainings on AD security and always found that there is a lack of quality material, which can take students from basics of Active Directory security, and teach them how to attack and defend it. Attacking and Defending Active Directory is beginner friendly course designed for security professionals who would like to enhance their AD security knowledge and want to understand practical threats and attacks in a modern Active Directory environment. The course is based on our years of experience of making and breaking Windows and AD environments and teaching security professionals. We cover topics like AD enumeration, trusts mapping, domain privilege escalation, domain persistence, Kerberos based attacks (Golden ticket, Silver ticket and more), ACL issues, SQL server trusts, Defenses and bypasses of defenses. You can either create your own Active Directory lab and follow along, or subscribe to one of our premium labs. A non-exhasutive list of topics to be covered include: – Active Directory Enumeration. Use scripts, built-in tools and MS ActiveDirectory module to enumerate the target domain. * Understand how useful information like users, groups, group memberships, computers, user properties etc. from the domain controller is available to even a normal user. * Understand and enumerate intra-forest and inter-forest trusts. Practice how to extract information from the trusts. * Enumerate Group policies. * Enumerate ACLs and learn to find out ‘interesting rights on ACLs in the target domain to carry out attacks. – Local Privilege Escalation * Learn different local privilege escalation techniques on a Windows machine. * Hunt for local admin privileges on machines in the target domain using multiple methods. * Abuse enterprise applications to execute complex attack paths that involve bypassing antivirus and pivoting to different machines. – Domain Privilege Escalation * Learn to find credentials and sessions of high privileges domain accounts like Domain Administrators, extracting their credentials and then using credential replay attacks to escalate privileges, all of this with just using built-in protocols for pivoting. * Learn to extract credentials from a restricted environment where application whitelisting is enforced. Abuse derivative local admin privileges and pivot to other machines to escalate privileges to domain level. * Understand the classic Kerberoast and its variants to escalate privileges. * Enumerate the domain for objects with unconstrained delegation and abuse it to escalate privileges. * Find domain objects with constrained delegation enabled. Understand and execute the attacks against such objects to escalate privileges to a single service on a machine and to the domain administrator using alternate tickets. * Learn how to abuse privileges of Protected Groups to escalate privileges. – Domain Persistence and Dominance * Abuse Kerberos functionality to persist with DA privileges. Forge tickets to execute attacks like Golden ticket and Silver ticket to persist. * Subvert the authentication on the domain level with Skeleton key and custom SSP. * Abuse the DC safe mode Administrator for persistence. * Abuse the protection mechanism like AdminSDHolder for persistence. * Abuse minimal rights required for attacks like DCSync by modifying ACLs of domain objects. * Learn to modify the host security descriptors of the domain controller to persist and execute commands without needing DA privileges. – Cross trust attacks * Learn to elevate privileges from Domain Admin of a child domain to Enterprise Admin on the forest root by abusing Trust keys and krbtgt account. * Execute intra-forest trust attacks to access resources across forest. * Abuse database links to achieve code execution across forest by just using the databases. – Forest persistence and dominance * Understand forest persistence technique like DCShadow. Execute it to modify objects in the forest root without leaving change logs. Learn minimal permissions required to use DCShadow and avoid change logs for minimal permissions using Shadowception. – Defenses – Monitoring * Learn about useful events logged when the discussed attacks are executed. – Defenses and bypass – Architecture and Work culture Changes * Learn briefly about architecture and work culture changes required in an organization to avoid the discussed attacks. We discuss Temporal group membership, ACL Auditing, LAPS, SID Filtering, Selective Authentication, credential guard, device guard, Protected Users Group, PAW, Tiered Administration and ESAE or Red Forest. * Learn how Microsoft’s Advanced Threat Analytics and other similar tools detect domain attacks and the ways to avoid and bypass such tools. – Defenses and bypass – Deception * Understand how Deception can be effective deployed as a defense mechanism in AD. Deploy decoy user objects, which have interesting properties set, which have ACL rights over other users and have high privilege access in the domain along with available protections. Deploy computer objects and Group objects to deceive an adversary. Learn how adversaries can identify decoy objects and how defenders can avoid the detection. – Defenses and bypass – PowerShell * Learn about various improvements in Windows PowerShell v5 and their significance in detecting attacks. We will discuess System Wide Transcription, Enhance logging, Constrained Language Mode, AMSI etc. Learn how JEA helps in secure administration. Execute bypasses against the discussed defenses and the detection of bypasses. [Hidden Content]
  17. 23 points
    Check this out: [Hidden Content] Get it here: [Hidden Content]
  18. 23 points
    seriously people just google his title there's more multi-part links if you dont have premium account [Hidden Content] [Hidden Content] [Hidden Content]
  19. 22 points
    Cisco NetFlow - LiveLessons by Omar Santos Publisher: Cisco Press Release Date: April 2016 ISBN: 0134469844 Running time: 4:36:13 Topic: Cisco The Rough Cuts/Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing. Video training covering everything you need to know to deploy, configure, and troubleshoot NetFlow in many different Cisco platforms and learn big data analytics technologies for cyber security. Description Cisco NetFlow LiveLessons walks you through the steps for deploying, configuring, and troubleshooting NetFlow and learning big data analytics technologies for cyber security. Cisco NetFlow creates an environment where network administrators and security professionals have the tools to understand who, what, when, where, and how network traffic is flowing. Cisco NetFlow LiveLessons is a key resource for understanding the power behind the Cisco NetFlow solution. Omar Santos, a Cisco Product Security Incident Response Team (PSIRT) technical leader and author of Network Security with NetFlow and IPFIX, the CCNA Security 210-260 Official Cert Guide, and other key security video and book titles by Cisco Press demonstrates how NetFlow can be used by large enterprises and small-to-medium-sized businesses to meet critical network challenges. This video courseexplores everything you need to understand and implement the Cisco Cyber Threat Defense Solution, while also providing configuration and troubleshooting walk-throughs. Skill Level Intermediate What You Will Learn NetFlow and IPFIX basics NetFlow Deployment Scenarios Cisco Flexible NetFlow NetFlow Commercial and Open Source Monitoring and Analysis Software Packages Big Data Analytics Tools The Cisco Cyber Threat Defense Solution Troubleshooting NetFlow NetFlow for Anomaly Detection and Identifying DoS Attacks NetFlow for Incident Response and Forensics Who Should Take This Course Network and security professionals interested in learning about the Cisco NetFlow solution; anyone wishing to build Cisco security About LiveLessons Video Training LiveLessons Video Training series publishes hundreds of hands-on, expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. This professional and personal technology video series features world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, IBM Press, Pearson IT Certification, Prentice Hall, Sams, and Que. Topics include: IT Certification, Programming, Web Development, Mobile Development, Home and Office Technologies, Business and Management, and more. View all LiveLessons on InformIT athttp://www.informit.com/livelessons. More Info: [Hidden Content] [hide] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content]]
  20. 22 points
    Another Free resource - [Hidden Content]
  21. 22 points
    Torrent links: Lynda - Cisco CCNP ENCOR (350-401) - 1 Architecture, Virtualization, and Infrastructure: [Hidden Content] Lynda - Cisco CCNP ENCOR (350-401) - 2 Network Management, Security, and Automation: [Hidden Content]
  22. 21 points
    Lynda (LinkedIn) Cisco CCNP ENCOR (350-401): 1 Architecture, Virtualization, and Infrastructure Cisco CCNP ENCOR (350-401): 2 Network Management, Security, and Automation Size: 1.76 GB + Size: 1.59 GB | Kevin Wallace | pwd: sanet.st [Hidden Content]
  23. 20 points
    Eforensics Magazine Full Collection [79 PDF + 13 EPUB] English | Size: 1.28 GB (1,369,162,749 bytes ) eForensics offers unique insights and ideas to become an expert in Digital Forensics, take your skills to a new level, and improve the security of your enterprise. eForensics offers online courses, ebooks as well as the PDF issues. Courses are structured as weekly online meetings; interaction with the course tutor. The courses are designed to fit around your schedule; you access the course whenever it is convenient for you. [hide] [Hidden Content] [Hidden Content] [Hidden Content] Premium link generator: [Hidden Content]]
  24. 19 points
  25. 19 points
    Here you are Pentester Academy – Attacking and Defending Active DirectBookmark [hide][Hidden Content]]
  26. 18 points
    looking fo this course please Cisco Certified CyberOps Associate Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0 Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0 @mavis @rahulkashyap
  27. 17 points
    [hide][Hidden Content]]
  28. 17 points
    Found this link in my travels to a 4 part Series on Cyber Security by StationX. Download while the links are still available. Enjoy. [Hidden Content]
  29. 16 points
    It requires permission so I can't seem to import.
  30. 16 points
    FortiGate KVM FortiManager KVM FortiAnalyzer KVM # Info: EVE-NG - How To's [Hidden Content] [Hidden Content] # Download: [Hidden Content]
  31. 16 points
    Found these links on the internet BUT can be downloaded with "premium account". If someone has please download and share on mega/one dirve. Nitroflare has free download too but it's super slow [Hidden Content]
  32. 16 points
    Whatever content i had is shared to Mega Get it. My 46GB torrent is stucked at 21-22%, rest of torrents + other content what i had is uploaded to mega below is link get it. »»»» F5 Networks 23GB «««« [Hidden Content]
  33. 16 points
    This link is working guys. Copy to your mega acc and download. Link: [hide][Hidden Content]]
  34. 16 points
    Configuring Azure VM and Container Security MP4 | Video: h264, 1920x1080 | Difficulty: Intermediate | Genre: eLearning | Language: English | Duration: 16 Lectures (1h 7m) | Size: 752 MB [hide][Hidden Content]]
  35. 16 points
    Here you go "Pentester Academy – Attacking and Defending Active Directory" with 13 videos: [hide][Hidden Content]]
  36. 15 points
    [Udemy] AWS Solutions Architect Associate Practice Exams 2020 ($13.99) "23 hours left" [Hidden Content] Coupon: 1F3D34EEEFD104004F55 4 Practice Tests What you'll learn: Take the best practice tests for the preperation of your certification exam You should be able to gain meaningful insight into the certification exam Learn scenario based questions Understand exam taking strategy Take 4 complete practice tests with answers Requirements: At least one year of hands-on experience Existing AWS certifications are a plus #Udemy #AWS #Practice MOVED TOPIC Topic is moved to proper section. Offer Kindly open topic in appropriate section with suitable prefix.
  37. 15 points
    SANS - 760 -Advanced Exploit Development for Pen Testers - 2019 - PDF only Download fast [Hidden Content]
  38. 15 points
    AZure Fundamentals from : =>CBT Nuggets => Linux Academy => Lynda => Pluralsight [Hidden Content]
  39. 15 points
  40. 15 points
    This is an updating post! ALL LinuxAcad Course materials, please make your copy Thanks to @Tupdare we made it in a very hard way so again please make your copy I will update the post today to contain EVERYTHING 1- [Hidden Content] 3- [Hidden Content] 4- [Hidden Content]
  41. 15 points
    Linkedin - Microsoft 365 Security Administration: Implement and Manage Identity and Access (2020) MP4 | Video: AVC, 1280x720 30 fps | Audio: AAC, 48 KHz, 2 Ch | Duration: 2h 1m Skill Level: Intermediate | Genre: eLearning | Language: English + Subtitles | Size: 207.27 MB Unfortunately, up to 99% of cloud security failures are the fault of customers. Beat the statistics. Learn how to implement secure user access to your Microsoft 365 tenant using this step-by-step configuration guide from Microsoft Certified Trainer Ugo Lopez. Ugo covers managing user and groups, setting password policies, implementing multi-factor authentication, configuring Azure AD Identity Protection, working with Active Directory Federation Services (ADFS), and installing Azure AD Connect. He also provides an introduction to conditional access and device management. Don’t let Microsoft 365 be the point of failure for your organization. Use this course to plan and implement solid security strategies and ensure compliance with all applicable policies and regulations. Note: This course is aligned with the objectives in the first domain of the Microsoft 365 Security Administration exam (MS-500), Implement and Manage Identity and Access Topics include: Managing user and groups Managing password policies Configuring Azure AD Privileged Identity Management Setting up multi-factor authentication Adding role assignments with Azure RBAC Managing Azure AD Identity Protection Installing Azure AD Connect Setting up conditionals and device access [Hidden Content]
  42. 14 points
    Offensive Security - OSCP [PWK] v2020 [PDF Version and Videos] [Download links] PWK is the foundational penetration testing course here at Offensive Security, and the only official training for the industry-leading OSCP exam. The original version of the course has enabled thousands of information security professionals to build their careers. Updating PWK to integrate the latest technology, tools and processes is critical to continuing to support our students. Our teams have worked hard to not only develop new additions to the content, but also to completely revise all the modules for a better experience. INDEX OF VIDEOS(capital letters): With the full chapter name: 02 Getting Comfortable with Kali Linux.avi 03 Command Line Fun.avi 04 Practical Tools.avi 05 Bash Scripting.avi 06 Passive Information Gathering.avi 07 Active Information Gathering.avi 08 Vulnerability Scanning.avi 09 Web Application Attacks.avi 10 Intruduction to Buffer Overflows.avi 11 Windows Buffer Overflows.avi 12 Linux Buffer Overflows.avi 13 Client-Side Attacks.avi 14 Locating Public Exploits.avi 15 Fixing Exploits.avi 16 File Transfers.avi 17 Antivirus Evasion.avi 18 Privilege Escalation.avi 19 Password Attacks.avi 20 Port Redirection and Tunneling.avi 21 Active Directory Attacks.mp4 22 The Metasploit Framework.avi 23 PowerShell Empire.avi 24 Assembling the Pieces-Penetration Test Breakdown.avi [hide][Hidden Content]] Make use of Hide Tag while posting download links. Usage: [ hide ] link [ /hide ] (without spaces). Read the Board Rules or get banned.
  43. 14 points
    [Hidden Content] If you want to see the content of the Download Hidden links, Please use the "REACTION" button as shown in the announcements: [Hidden Content]
  44. 13 points
    Latest AZ-900 dump, valid as of June 2020 (new version after recent changes to exam format) [Hidden Content] Enjoy and good luck, DM
  45. 13 points
    CBT Nuggets - Cisco CCNP Automating Enterprise Solutions (300-435 ENAUTO) Google Drive Link : [hide][Hidden Content]] TITLE VIDEOS TRAINERS RELEASED Implement Source Control with Git 9 Ben Finkel 04/24/2020 Collaborate with Git 6 Ben Finkel 12/12/2019 Describe Characteristics of API Styles 6 Ben Finkel 04/24/2020 Understand the Challenges of Consuming APIs 6 Ben Finkel 04/24/2020 Interpret Python Scripts 10 Ben Finkel 04/24/2020 Python Virtual Environments 6 Ben Finkel 04/24/2020 Configuration Management for IOS XE 6 Ben Finkel 04/24/2020 Understand and Explore Data Models 6 Knox Hutchinson 04/24/2020 Automate Cisco IOS-XE Devices with Netconf 7 Knox Hutchinson 04/24/2020 Automate IOS-XE Devices with Restconf 7 Knox Hutchinson 04/24/2020 Other Automation Techniques for Cisco IOS-XE Devices 7 Knox Hutchinson 04/24/2020 SD-Access Automation with DNA Center Platform 7 Knox Hutchinson 04/27/2020 Deeper Automation Techniques with DNA Center Platform 6 Knox Hutchinson 04/27/2020 Automating with the SD-WAN vManage API 7 Knox Hutchinson 04/27/2020 Deeper Automation with the vManage API 7 Knox Hutchinson 04/27/2020 Develop for the Meraki Dashboard API and Webhooks 8 Knox Hutchinson 04/27/2020 Deploy a Python Azure Function App with VS Code 6 Knox Hutchinson 01/22/2020 Implement the Meraki Location Scanning API 6 Knox Hutchinson 04/27/2020 Deploy the Meraki Captive Portal API 7 Knox Hutchinson 04/27/2020 Automate Cisco Meraki Security Cameras with MV Sense API 6 Knox Hutchinson
  46. 13 points
    ALL SANS PDF SANS Live Online training offers live-streamed training with the same instruction, content, and learning results you would receive in-person. Training on the cutting edge: All courses are designed to align with dominant security team roles, duties, and disciplines. Explore the Training Roadmap to find the right courses for your immediate cyber security skill development. Learn from the best: SANS instructors are active security practitioners who bring their extensive knowledge and real-world experiences to the classroom. Virtual Bonus Sessions: Content-loaded bonus sessions presented by industry experts, plus virtual NetWars! GIAC Certification: Several certifications align with these training courses, validating student mastery for professional use in critical, specialized InfoSec domains, and job-specific roles. The SANS Promise: You will be able to apply the skills and techniques you’ve learned as soon as you return to work. [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]]
  47. 13 points
  48. 12 points
    No password Need I updated the link with new Burpsuite All versions Burp Suite Enterprise 2020.4.3 + Professional 2020.5 + Demo-License You can now choose to display non-printing characters as "lozenges" in the HTTP message editor. This is supported for any bytes with a hexadecimal value lower than 20, which includes tabs, line feeds, carriage returns, and null bytes. This feature will be greatly beneficial for many use cases, including: Spotting subtle differences between byte values in responses Experimenting with HTTP request smuggling vulnerabilities Studying line endings to identify potential HTTP header injection vulnerabilities Observing how null-byte injections are handled by the server Non-printing characters are hidden by default, but you can toggle the lozenges on and off by clicking the "\n" button at the bottom of the editor These non-printing characters can currently only be displayed in the message editor. For now, you have to edit bytes using Burp's hex view. However, we plan to enable you to do this directly in the message editor in the near future. Fix some bugs: We have also implemented several minor bug fixes, most notably: The response received/completed times are now displayed for 401 responses. The response time is now displayed even when the time taken was < 1ms. "Check session is valid" session handling rules are now applied properly when session tracing is running The content discovery tool no longer erroneously displays the "Session is not running" message. This release also provides the following minor improvements to various areas of Burp: The embedded Chromium browser for the experimental browser-driven scanning mode has been upgraded to version 83. Java 14 is now supported for both Professional and Community Edition. Burp Proxy no longer intercepts requests for SVG or font files by default. Crawling of static content is now faster. [Hidden Content]
  49. 12 points
    [hide][Hidden Content]]
  50. 12 points
    @butterfly someone uploaded the previous file you can check .this one from @sea1731 ..might be helpful [Hidden Content] Thanks
×
×
  • Create New...