The Cloud is the latest trend and every organization is rushing to shift its infrastructure to it. Here, AWS rules the roost with its market share. This book will help pentesters and sysadmins via a hands-on approach to pentesting AWS services using Kali Linux. There is a strong focus on providing detailed screenshots and custom scripts to ..
The massive development of technology especially in computers, mobile devices, and networking has br...
This work is focused on penetration testing of web applications. The theoretical part describes this...
The goal of the thesis was to design and implement a cloud platform on which to run an open-source p...
Kali NetHunter is a free-to-use version of Kali that allows for extreme mobility, flexibility and ra...
Written as an interactive tutorial, this book covers the core of Kali Linux with real-world examples...
Hacking with Kali introduces you the most current distribution of the de facto standard tool for Lin...
This book is targeted at information security professionals, penetration testers and network/system ...
If you are a security professional, pentester, or anyone interested in getting to grips with wireles...
Nowadays, computers, smart phones, smart watches, printers, projectors, washing machines, fridges, a...
This slide deck provides a deep dive into penetration testing with a focus on the capabilities of Ka...
With the current rate of hacking, it is very important to pentest your environment in order to ensur...
Nowadays, computers, smart phones, smart watches, printers, projectors, washing machines, fridges, a...
The Basics of Hacking and Penetration Testing, 2nd Ed. serves as an introduction to the steps requir...
Taking a highly practical approach and a playful tone, Kali Linux CTF Blueprints provides step-by-st...
The massive development of technology especially in computers, mobile devices, and networking has br...
The massive development of technology especially in computers, mobile devices, and networking has br...
This work is focused on penetration testing of web applications. The theoretical part describes this...
The goal of the thesis was to design and implement a cloud platform on which to run an open-source p...
Kali NetHunter is a free-to-use version of Kali that allows for extreme mobility, flexibility and ra...
Written as an interactive tutorial, this book covers the core of Kali Linux with real-world examples...
Hacking with Kali introduces you the most current distribution of the de facto standard tool for Lin...
This book is targeted at information security professionals, penetration testers and network/system ...
If you are a security professional, pentester, or anyone interested in getting to grips with wireles...
Nowadays, computers, smart phones, smart watches, printers, projectors, washing machines, fridges, a...
This slide deck provides a deep dive into penetration testing with a focus on the capabilities of Ka...
With the current rate of hacking, it is very important to pentest your environment in order to ensur...
Nowadays, computers, smart phones, smart watches, printers, projectors, washing machines, fridges, a...
The Basics of Hacking and Penetration Testing, 2nd Ed. serves as an introduction to the steps requir...
Taking a highly practical approach and a playful tone, Kali Linux CTF Blueprints provides step-by-st...
The massive development of technology especially in computers, mobile devices, and networking has br...
The massive development of technology especially in computers, mobile devices, and networking has br...
This work is focused on penetration testing of web applications. The theoretical part describes this...
The goal of the thesis was to design and implement a cloud platform on which to run an open-source p...