Kali Linux Basics for Wireless Hacking, Penetration Testing, VPNs, Proxy Servers and Networking Command"Linux Essentials for Hackers & Pentesters" is …
Your ultimate guide to pentesting with Kali Linux Kali is a popular and powerful Linux distribution used by cybersecurity professionals …
Kali Linux is built for professional penetration testing and security auditing. It is the next-generation of BackTrack, the most popular …
Effectively perform effi cient and organized social engineering tests and penetration testing using Kali Linux Overview Learn about various attacks …
Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux …
A practical guide to testing your networks security with Kali Linux - the preferred choice of penetration testers and hackers …
Kali Linux is a Debian-based Linux distribution designed for digital forensics and penetration testing. It gives access to a large …
Kali Linux Network Scanning Cookbook will introduce you to critical scanning concepts. You will be shown techniques associated with a …
The Raspberry Pi is a low-cost credit-card sized computing system that can be customized for just about anything including penetration …
Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework consisting …
Enhance your skill set to pentest against real-world Microsoft infrastructure with hands-on exercises and by following attack/detect guidelines with OpSec …
Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead …
Explore the latest ethical hacking tools and techniques to perform penetration testing from scratchKey FeaturesLearn to compromise enterprise networks with …
Test, fuzz, and break web applications and services using Burp Suite’s powerful capabilitiesKey Features Master the skills to perform various …
Master key approaches used by real attackers to perform advanced pentesting in tightly secured infrastructure, cloud and virtualized environments, and …
Master the art of identifying and exploiting vulnerabilities with Metasploit, Empire, PowerShell, and Python, turning Kali Linux into your fighter …
Your one-stop guide to using Python along with creating your own hacking tools, and make the most out of available …