forked from MrM8BRH/SuperLibrary
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
1 changed file
with
177 additions
and
1 deletion.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,2 +1,178 @@ | ||
# SuperLibrary | ||
## SuperLibrary 📚 | ||
Information Security Library | ||
|
||
The container contains the best books in cybersecurity, to cover many fields 👻 | ||
- Social engineering | ||
- Network security | ||
- Web application security | ||
- OS security | ||
- Penetration testing | ||
- Digital forensics | ||
- Reverse engineering | ||
- Malware analysis | ||
|
||
-- The container is scalable -- | ||
|
||
Enjoy ☺ | ||
|
||
## Library link : https://mega.nz/folder/h6RFQCZb#L3K86i4-qbrpsQ5Wg4rAZw | ||
|
||
## Contact me 📱 | ||
1. E-mail : [email protected] | ||
1. Signal : +970 595 011 892 | ||
## Container content 🧾 | ||
``` | ||
├───Group 0 [ Miscellaneous ] | ||
│ 01 The Tagled Web A Guide to Securing Modern Web Applications.pdf | ||
│ 02 [Michal_Zalewski]_Silence on the Wire A Field Guide to Passive Reconnaissance and Indirect Attacks.pdf | ||
│ 03 Metasploit-The Penetration Tester s Guide.pdf | ||
│ 04 the car hackers handbook.pdf | ||
│ 05 practical forensic imaging.pdf | ||
│ 06 [Nikolay_Elenkov]_Android_Security_Internals-_An_I(b-ok.cc).pdf | ||
│ 07 gray hat c sharp.pdf | ||
│ 08 Practical_Malware_Analysis.pdf | ||
│ 09 iOS Application Security_ The Definitive Gude for Hackers and Developers - David Thiel.pdf | ||
│ 10 Black Hat Python Python Programming for Hackers and Pentesters.pdf | ||
│ 11 mwri-a-penetration-testers-guide-to-the-azure-cloud-v1.2.pdf | ||
│ 12 Hacking- The Art of Exploitation (2nd ed. 2008) - Erickson.pdf | ||
│ 13 Serious Cryptography A Practical Introduction to Modern Encryption (2).pdf | ||
│ 14 Penetration Testing - A hands-on introduction to Hacking.pdf | ||
│ 15 Attacking Network Protocols by James Forshaw.pdf | ||
│ pic.jpg | ||
│ | ||
├───Group 1 [ Network Security ] | ||
│ Comp_TIA_Security_Guide_to_Network_Secur.pdf | ||
│ New CCNA 200-301.pdf | ||
│ Nmap Network Scanning _The Official Nmap Project Guide to Network Discovery and Security Scanning.pdf | ||
│ understanding digital signal processing.pdf | ||
│ Understanding Network Hacks Attack and Defense with Python.pdf | ||
│ Wireshark Network Security.pdf | ||
│ | ||
├───Group 2 [ Reverse Engineering - Malware Analysis ] | ||
│ │ Advanced Windows Debugging.Nov.2007.pdf | ||
│ │ Eldad_Eilam-Reversing__Secrets_of_Reverse_Engineering-Wiley(2005).pdf | ||
│ │ Firmware_Security_Testing_Methodology_Version1.pdf | ||
│ │ Inside Windows Debugging_ A Practical Guide to Debugging and Tracing Strategies in Windows.pdf | ||
│ │ Malware Data Science Attack Detection and Attribution by Joshua Saxe Hillary Sanders.pdf | ||
│ │ Mastering Malware Analysis by Alexey Kleymenov, Amr Thabet.pdf | ||
│ │ Practical_Malware_Analysis.pdf | ||
│ │ Professional Assembly Language.pdf | ||
│ │ RE4B-EN.pdf | ||
│ │ UEFI原理与编程_戴正华(著) 机械工业出版社_完整版.pdf | ||
│ │ | ||
│ └───eLearnSecurity - Malware Analysis Professional | ||
│ 101_Introduction_To_Malware_Analysis.pdf | ||
│ 102_Static_Analysis_Techniques.pdf | ||
│ 103_Assembly_Crash_Course.pdf | ||
│ 104_Behavior_Analysis.pdf | ||
│ 105_Debugging_And_Disassembly_Techniques.pdf | ||
│ 106_Obfuscation_Techniques.pdf | ||
│ | ||
├───Group 3 [ Arabic ] | ||
│ │ CCNA2016 Arabic.pdf | ||
│ │ Exploit Development x86.pdf | ||
│ │ pink_python.pdf | ||
│ │ أساسيات-أمن-المعلومات.pdf | ||
│ │ فيزياء تكنولوجيا المعلومات.pdf | ||
│ │ مقدمة_في_البرمجة_عن_طريق_لغة_بايثون.pdf | ||
│ │ | ||
│ ├───Ahmed Bin El Slanti | ||
│ │ تطبيقات اندرويد مفتوحة المصدر وأمنه.pdf | ||
│ │ دليل إدارة الأعمال.pdf | ||
│ │ مذكرات هاكر.pdf | ||
│ │ مواقع ويب خارجه عن السيطره.pdf | ||
│ │ | ||
│ └───جميل حسين طويله | ||
│ أختبار-اختراق-سيرفرات-تطبيقات-الويب.pdf | ||
│ أختراق-الشبكات-اللاسلكية.pdf | ||
│ التحليل-الجنائي-الرقمي.pdf | ||
│ فك التشفير بلغة البايثون - مملكة الكتب المدفوعة.pdf | ||
│ مالوير - البرمجيات الخبيثة.pdf | ||
│ منهج شهادة مدير شبكة لاسلكية باللغة العربية - الجزء 1.pdf | ||
│ منهج شهادة مدير شبكة لاسلكية باللغة العربية - الجزء 2.pdf | ||
│ منهج شهادة مدير شبكة لاسلكية باللغة العربية - الجزء 3.pdf | ||
│ | ||
├───Group 4 [ Web Penetration Testing ] | ||
│ │ Bug Bounty Playbook.pdf | ||
│ │ Practical_Attacks_using_HTTP_Request_Smuggling.pptx | ||
│ │ The.Web.Application.Hackers.Handbook.Oct.2007.pdf | ||
│ │ XSS CHEAT SHEET 2020 edition.pdf | ||
│ │ | ||
│ ├───elearnsecurity WAPTx | ||
│ │ WAPTx sec 1.pdf | ||
│ │ WAPTx sec 2.pdf | ||
│ │ WAPTx sec 3.pdf | ||
│ │ WAPTx sec 4.pdf | ||
│ │ WAPTx sec 5.pdf | ||
│ │ WAPTx sec 6.pdf | ||
│ │ WAPTx sec 7.pdf | ||
│ │ WAPTx sec 8.pdf | ||
│ │ WAPTx sec 9.pdf | ||
│ │ | ||
│ └───Lists | ||
│ OWASPv4_Checklist.xlsx | ||
│ summary.jpg | ||
│ Web Application Attacks List.txt | ||
│ Web Security Topics for selfstudy.txt | ||
│ | ||
├───Group 5 [ Offensive-Security ] | ||
│ Kali Linux Revealed Mastering the Penetration Testing Distribution.pdf | ||
│ Offensive Security OSCP v2020.pdf | ||
│ | ||
├───Group 6 [ EC-Council ] | ||
│ │ CEH v10 EC-Council (Certified Ethical Hacker Complete).pdf | ||
│ │ | ||
│ └───Computer Hacking Forensic Investigator CHFIv9 | ||
│ │ CHFIv9 Module 00.pdf | ||
│ │ CHFIv9 Module 01 Computer Forensics in Today_s World.pdf | ||
│ │ CHFIv9 Module 02 Computer Forensics Investigation Process.pdf | ||
│ │ CHFIv9 Module 03 Understanding Hard Disks and File Systems.pdf | ||
│ │ CHFIv9 Module 04 Data Acquisition and Duplication.pdf | ||
│ │ CHFIv9 Module 05 Defeating Anti-forensics Techniques.pdf | ||
│ │ CHFIv9 Module 06 Operating System Forensics.pdf | ||
│ │ CHFIv9 Module 07 Network Forensics.pdf | ||
│ │ CHFIv9 Module 08 Investigating Web Attacks.pdf | ||
│ │ CHFIv9 Module 09 Database Forensics.pdf | ||
│ │ CHFIv9 Module 10 Cloud Forensics.pdf | ||
│ │ CHFIv9 Module 11 Malware Forensics.pdf | ||
│ │ CHFIv9 Module 12 Investigating Email Crimes.pdf | ||
│ │ CHFIv9 Module 13 Mobile Forensics.pdf | ||
│ │ CHFIv9 Module 14 Forensics Report Writing and Presentation.pdf | ||
│ │ CHFIv9 References.pdf | ||
│ │ | ||
│ └───Labs | ||
│ CHFIv9 Labs Module 00.pdf | ||
│ CHFIv9 Labs Module 02 Computer Forensics Investigation Process.pdf | ||
│ CHFIv9 Labs Module 03 Understanding Hard Disks and File Systems.pdf | ||
│ CHFIv9 Labs Module 04 Data Acquisition and Duplication.pdf | ||
│ CHFIv9 Labs Module 05 Defeating Anti-forensics Techniques.pdf | ||
│ CHFIv9 Labs Module 06 Operating System Forensics.pdf | ||
│ CHFIv9 Labs Module 07 Network Forensics.pdf | ||
│ CHFIv9 Labs Module 08 Investigating Web Attacks.pdf | ||
│ CHFIv9 Labs Module 09 Database Forensics.pdf | ||
│ CHFIv9 Labs Module 10 Cloud Forensics.pdf | ||
│ CHFIv9 Labs Module 11 Malware Forensics.pdf | ||
│ CHFIv9 Labs Module 12 Investigating Email Crimes.pdf | ||
│ CHFIv9 Labs Module 13 Mobile Forensics.pdf | ||
│ | ||
├───Group 7 [ SANS ] | ||
│ SANS 501.rar | ||
│ SANS 660.rar | ||
│ sans-listing.txt | ||
│ SANS_Collection.torrent | ||
│ SEC 560.rar | ||
│ | ||
├───Group 8 [ (ISC)² ] | ||
│ CISSP_CheatSheet.zip | ||
│ Official (ISC)² guide to the HCISPP CBK.pdf | ||
│ Official ISC2 Guide to the CISSP CBK.pdf | ||
│ The Official (ISC)2 Guide to the CCSP CBK.pdf | ||
│ | ||
└───Group 9 [ CompTIA ] | ||
CompTIA A+ Certification All-in-One 220-801 & 220-802 Exam Guide, [8th Edition].pdf | ||
CompTIA CySA+ Practice Tests.pdf | ||
CompTIA IT Fundamentals Study Guide.pdf | ||
CompTIA Linux+ Practice Tests Exam XK0-004.pdf | ||
Comptia Pentest+ Practice Tests Exam Pt0-001.pdf | ||
CompTIA Server+ Study Guide.pdf | ||
``` |