By elvis, 28 July, 2024 Attacking AWS ViewFrom DevSecOpsGuides.com Tags PDF BOOKS Attacking AWS AWS Offensive Security DevSecOpsGuides
By elvis, 27 July, 2024 Splunk Use Cases ViewFrom Anonymous Tags PDF BOOKS Splunk SPL Use Cases Detection Engineering
By elvis, 27 July, 2024 Red Team Repo Links ViewFrom Vieh Group Tags PDF BOOKS Red Team Repo Links Vieh Group
By elvis, 27 July, 2024 Offensive Enumeration in Active Directory ViewFrom Hernan Rodriguez Tags PDF BOOKS Offensive Active Directory Active Directory Enumeration Hernan Rodriguez
By elvis, 27 July, 2024 Offensive Active Directory 101 ViewFrom Tactix Tags PDF BOOKS Offensive Active Directory Offensive Active Directory 101 Tactix
By elvis, 27 July, 2024 Lockbit 3.0 Ransomware - Malware Analysis Report ViewFrom Yusuf Amr Tags PDF BOOKS Lockbit Malware Malware Analysis report Ransomware Yusuf Amr
By elvis, 27 July, 2024 List of SPL Queries - SOC Monitoring ViewFrom Anonymous- Nikhil Sharma Tags PDF BOOKS SPL Splunk SOC SOC Monitoring
By elvis, 27 July, 2024 MITRE ATT&CK Detection Rules Part 1 ViewFrom Parastoo Razi Tags PDF BOOKS MITRE ATT&CK Detection Rules Detection Detection Engineering Parastoo Razi
By elvis, 27 July, 2024 Red Teaming - Process Hiving ViewFrom Nettitude - Rob Bone and Ben Turner Tags PDF BOOKS Red Teaming Process Process Hiving Rob Bone Ben Turner
By elvis, 27 July, 2024 Pentesting Tactics, Techniques, & Procedures (TTPs) ViewFrom Chris Traynor Tags PDF BOOKS Pentesting TTP Tactics Techniques Procedures Chris Traynor