Skip to content

Commit

Permalink
Update README.md
Browse files Browse the repository at this point in the history
  • Loading branch information
MrM8BRH authored Jul 1, 2020
1 parent c5a60d0 commit a8f807f
Showing 1 changed file with 177 additions and 1 deletion.
178 changes: 177 additions & 1 deletion README.md
Original file line number Diff line number Diff line change
@@ -1,2 +1,178 @@
# SuperLibrary
## SuperLibrary 📚
Information Security Library

The container contains the best books in cybersecurity, to cover many fields 👻
- Social engineering
- Network security
- Web application security
- OS security
- Penetration testing
- Digital forensics
- Reverse engineering
- Malware analysis

-- The container is scalable --

Enjoy ☺

## Library link : https://mega.nz/folder/h6RFQCZb#L3K86i4-qbrpsQ5Wg4rAZw

## Contact me 📱
1. E-mail : [email protected]
1. Signal : +970 595 011 892
## Container content 🧾
```
├───Group 0 [ Miscellaneous ]
│ 01 The Tagled Web A Guide to Securing Modern Web Applications.pdf
│ 02 [Michal_Zalewski]_Silence on the Wire A Field Guide to Passive Reconnaissance and Indirect Attacks.pdf
│ 03 Metasploit-The Penetration Tester s Guide.pdf
│ 04 the car hackers handbook.pdf
│ 05 practical forensic imaging.pdf
│ 06 [Nikolay_Elenkov]_Android_Security_Internals-_An_I(b-ok.cc).pdf
│ 07 gray hat c sharp.pdf
│ 08 Practical_Malware_Analysis.pdf
│ 09 iOS Application Security_ The Definitive Gude for Hackers and Developers - David Thiel.pdf
│ 10 Black Hat Python Python Programming for Hackers and Pentesters.pdf
│ 11 mwri-a-penetration-testers-guide-to-the-azure-cloud-v1.2.pdf
│ 12 Hacking- The Art of Exploitation (2nd ed. 2008) - Erickson.pdf
│ 13 Serious Cryptography A Practical Introduction to Modern Encryption (2).pdf
│ 14 Penetration Testing - A hands-on introduction to Hacking.pdf
│ 15 Attacking Network Protocols by James Forshaw.pdf
│ pic.jpg
├───Group 1 [ Network Security ]
│ Comp_TIA_Security_Guide_to_Network_Secur.pdf
│ New CCNA 200-301.pdf
│ Nmap Network Scanning _The Official Nmap Project Guide to Network Discovery and Security Scanning.pdf
│ understanding digital signal processing.pdf
│ Understanding Network Hacks Attack and Defense with Python.pdf
│ Wireshark Network Security.pdf
├───Group 2 [ Reverse Engineering - Malware Analysis ]
│ │ Advanced Windows Debugging.Nov.2007.pdf
│ │ Eldad_Eilam-Reversing__Secrets_of_Reverse_Engineering-Wiley(2005).pdf
│ │ Firmware_Security_Testing_Methodology_Version1.pdf
│ │ Inside Windows Debugging_ A Practical Guide to Debugging and Tracing Strategies in Windows.pdf
│ │ Malware Data Science Attack Detection and Attribution by Joshua Saxe Hillary Sanders.pdf
│ │ Mastering Malware Analysis by Alexey Kleymenov, Amr Thabet.pdf
│ │ Practical_Malware_Analysis.pdf
│ │ Professional Assembly Language.pdf
│ │ RE4B-EN.pdf
│ │ UEFI原理与编程_戴正华(著) 机械工业出版社_完整版.pdf
│ │
│ └───eLearnSecurity - Malware Analysis Professional
│ 101_Introduction_To_Malware_Analysis.pdf
│ 102_Static_Analysis_Techniques.pdf
│ 103_Assembly_Crash_Course.pdf
│ 104_Behavior_Analysis.pdf
│ 105_Debugging_And_Disassembly_Techniques.pdf
│ 106_Obfuscation_Techniques.pdf
├───Group 3 [ Arabic ]
│ │ CCNA2016 Arabic.pdf
│ │ Exploit Development x86.pdf
│ │ pink_python.pdf
│ │ أساسيات-أمن-المعلومات.pdf
│ │ فيزياء تكنولوجيا المعلومات.pdf
│ │ مقدمة_في_البرمجة_عن_طريق_لغة_بايثون.pdf
│ │
│ ├───Ahmed Bin El Slanti
│ │ تطبيقات اندرويد مفتوحة المصدر وأمنه.pdf
│ │ دليل إدارة الأعمال.pdf
│ │ مذكرات هاكر.pdf
│ │ مواقع ويب خارجه عن السيطره.pdf
│ │
│ └───جميل حسين طويله
│ أختبار-اختراق-سيرفرات-تطبيقات-الويب.pdf
│ أختراق-الشبكات-اللاسلكية.pdf
│ التحليل-الجنائي-الرقمي.pdf
│ فك التشفير بلغة البايثون - مملكة الكتب المدفوعة.pdf
│ مالوير - البرمجيات الخبيثة.pdf
│ منهج شهادة مدير شبكة لاسلكية باللغة العربية - الجزء 1.pdf
│ منهج شهادة مدير شبكة لاسلكية باللغة العربية - الجزء 2.pdf
│ منهج شهادة مدير شبكة لاسلكية باللغة العربية - الجزء 3.pdf
├───Group 4 [ Web Penetration Testing ]
│ │ Bug Bounty Playbook.pdf
│ │ Practical_Attacks_using_HTTP_Request_Smuggling.pptx
│ │ The.Web.Application.Hackers.Handbook.Oct.2007.pdf
│ │ XSS CHEAT SHEET 2020 edition.pdf
│ │
│ ├───elearnsecurity WAPTx
│ │ WAPTx sec 1.pdf
│ │ WAPTx sec 2.pdf
│ │ WAPTx sec 3.pdf
│ │ WAPTx sec 4.pdf
│ │ WAPTx sec 5.pdf
│ │ WAPTx sec 6.pdf
│ │ WAPTx sec 7.pdf
│ │ WAPTx sec 8.pdf
│ │ WAPTx sec 9.pdf
│ │
│ └───Lists
│ OWASPv4_Checklist.xlsx
│ summary.jpg
│ Web Application Attacks List.txt
│ Web Security Topics for selfstudy.txt
├───Group 5 [ Offensive-Security ]
│ Kali Linux Revealed Mastering the Penetration Testing Distribution.pdf
│ Offensive Security OSCP v2020.pdf
├───Group 6 [ EC-Council ]
│ │ CEH v10 EC-Council (Certified Ethical Hacker Complete).pdf
│ │
│ └───Computer Hacking Forensic Investigator CHFIv9
│ │ CHFIv9 Module 00.pdf
│ │ CHFIv9 Module 01 Computer Forensics in Today_s World.pdf
│ │ CHFIv9 Module 02 Computer Forensics Investigation Process.pdf
│ │ CHFIv9 Module 03 Understanding Hard Disks and File Systems.pdf
│ │ CHFIv9 Module 04 Data Acquisition and Duplication.pdf
│ │ CHFIv9 Module 05 Defeating Anti-forensics Techniques.pdf
│ │ CHFIv9 Module 06 Operating System Forensics.pdf
│ │ CHFIv9 Module 07 Network Forensics.pdf
│ │ CHFIv9 Module 08 Investigating Web Attacks.pdf
│ │ CHFIv9 Module 09 Database Forensics.pdf
│ │ CHFIv9 Module 10 Cloud Forensics.pdf
│ │ CHFIv9 Module 11 Malware Forensics.pdf
│ │ CHFIv9 Module 12 Investigating Email Crimes.pdf
│ │ CHFIv9 Module 13 Mobile Forensics.pdf
│ │ CHFIv9 Module 14 Forensics Report Writing and Presentation.pdf
│ │ CHFIv9 References.pdf
│ │
│ └───Labs
│ CHFIv9 Labs Module 00.pdf
│ CHFIv9 Labs Module 02 Computer Forensics Investigation Process.pdf
│ CHFIv9 Labs Module 03 Understanding Hard Disks and File Systems.pdf
│ CHFIv9 Labs Module 04 Data Acquisition and Duplication.pdf
│ CHFIv9 Labs Module 05 Defeating Anti-forensics Techniques.pdf
│ CHFIv9 Labs Module 06 Operating System Forensics.pdf
│ CHFIv9 Labs Module 07 Network Forensics.pdf
│ CHFIv9 Labs Module 08 Investigating Web Attacks.pdf
│ CHFIv9 Labs Module 09 Database Forensics.pdf
│ CHFIv9 Labs Module 10 Cloud Forensics.pdf
│ CHFIv9 Labs Module 11 Malware Forensics.pdf
│ CHFIv9 Labs Module 12 Investigating Email Crimes.pdf
│ CHFIv9 Labs Module 13 Mobile Forensics.pdf
├───Group 7 [ SANS ]
│ SANS 501.rar
│ SANS 660.rar
│ sans-listing.txt
│ SANS_Collection.torrent
│ SEC 560.rar
├───Group 8 [ (ISC)² ]
│ CISSP_CheatSheet.zip
│ Official (ISC)² guide to the HCISPP CBK.pdf
│ Official ISC2 Guide to the CISSP CBK.pdf
│ The Official (ISC)2 Guide to the CCSP CBK.pdf
└───Group 9 [ CompTIA ]
CompTIA A+ Certification All-in-One 220-801 & 220-802 Exam Guide, [8th Edition].pdf
CompTIA CySA+ Practice Tests.pdf
CompTIA IT Fundamentals Study Guide.pdf
CompTIA Linux+ Practice Tests Exam XK0-004.pdf
Comptia Pentest+ Practice Tests Exam Pt0-001.pdf
CompTIA Server+ Study Guide.pdf
```

0 comments on commit a8f807f

Please sign in to comment.