diff --git a/cybersecurity_resources/pdf/A_Bug_Bounty_Hunting_Journey.pdf b/cybersecurity_resources/pdf/A_Bug_Bounty_Hunting_Journey.pdf new file mode 100644 index 0000000000..9b0e93068b Binary files /dev/null and b/cybersecurity_resources/pdf/A_Bug_Bounty_Hunting_Journey.pdf differ diff --git a/cybersecurity_resources/pdf/Advanced_Web_Attacks_and_Exploitation.pdf b/cybersecurity_resources/pdf/Advanced_Web_Attacks_and_Exploitation.pdf new file mode 100644 index 0000000000..ec12058361 Binary files /dev/null and b/cybersecurity_resources/pdf/Advanced_Web_Attacks_and_Exploitation.pdf differ diff --git a/cybersecurity_resources/pdf/Black_hat_Python_ Python_programming_for_hackers.pdf b/cybersecurity_resources/pdf/Black_hat_Python_ Python_programming_for_hackers.pdf new file mode 100644 index 0000000000..add669752e Binary files /dev/null and b/cybersecurity_resources/pdf/Black_hat_Python_ Python_programming_for_hackers.pdf differ diff --git a/cybersecurity_resources/pdf/BruteForcingAndSupplyChainAttacks.pdf b/cybersecurity_resources/pdf/BruteForcingAndSupplyChainAttacks.pdf new file mode 100644 index 0000000000..4582b592ce Binary files /dev/null and b/cybersecurity_resources/pdf/BruteForcingAndSupplyChainAttacks.pdf differ diff --git a/cybersecurity_resources/pdf/Bug_Bounty_Bootcampth_guide_to_finding_and_reporting_web_vulnerabilities.pdf b/cybersecurity_resources/pdf/Bug_Bounty_Bootcampth_guide_to_finding_and_reporting_web_vulnerabilities.pdf new file mode 100644 index 0000000000..27a9c9be6c Binary files /dev/null and b/cybersecurity_resources/pdf/Bug_Bounty_Bootcampth_guide_to_finding_and_reporting_web_vulnerabilities.pdf differ diff --git a/cybersecurity_resources/pdf/CCNA_Routing_and_Switching_Complete_Study_Guide_Exam_100_105_Exam_200_105_Exam_200_125.pdf b/cybersecurity_resources/pdf/CCNA_Routing_and_Switching_Complete_Study_Guide_Exam_100_105_Exam_200_105_Exam_200_125.pdf new file mode 100644 index 0000000000..f6a63bbfc4 Binary files /dev/null and b/cybersecurity_resources/pdf/CCNA_Routing_and_Switching_Complete_Study_Guide_Exam_100_105_Exam_200_105_Exam_200_125.pdf differ diff --git a/cybersecurity_resources/pdf/CompTIA.pdf b/cybersecurity_resources/pdf/CompTIA.pdf new file mode 100644 index 0000000000..9ea384d816 Binary files /dev/null and b/cybersecurity_resources/pdf/CompTIA.pdf differ diff --git a/cybersecurity_resources/pdf/CompTIA_Network_Exam_N10_006.pdf b/cybersecurity_resources/pdf/CompTIA_Network_Exam_N10_006.pdf new file mode 100644 index 0000000000..3c9f9e3930 Binary files /dev/null and b/cybersecurity_resources/pdf/CompTIA_Network_Exam_N10_006.pdf differ diff --git a/cybersecurity_resources/pdf/Computer_Hacking_for_Beginners.pdf b/cybersecurity_resources/pdf/Computer_Hacking_for_Beginners.pdf new file mode 100644 index 0000000000..4d8b25a9d6 Binary files /dev/null and b/cybersecurity_resources/pdf/Computer_Hacking_for_Beginners.pdf differ diff --git a/cybersecurity_resources/pdf/Defense_with_Python.pdf b/cybersecurity_resources/pdf/Defense_with_Python.pdf new file mode 100644 index 0000000000..69223a29dc Binary files /dev/null and b/cybersecurity_resources/pdf/Defense_with_Python.pdf differ diff --git "a/cybersecurity_resources/pdf/Gray_Hat Hacking_The_Ethical_Hacker\342\200\231s_Handbook.pdf" "b/cybersecurity_resources/pdf/Gray_Hat Hacking_The_Ethical_Hacker\342\200\231s_Handbook.pdf" new file mode 100644 index 0000000000..468d231802 Binary files /dev/null and "b/cybersecurity_resources/pdf/Gray_Hat Hacking_The_Ethical_Hacker\342\200\231s_Handbook.pdf" differ diff --git a/cybersecurity_resources/pdf/Hacking.pdf b/cybersecurity_resources/pdf/Hacking.pdf new file mode 100644 index 0000000000..91ab848111 Binary files /dev/null and b/cybersecurity_resources/pdf/Hacking.pdf differ diff --git a/cybersecurity_resources/pdf/Hacking_API.pdf b/cybersecurity_resources/pdf/Hacking_API.pdf new file mode 100644 index 0000000000..ae224bee4b Binary files /dev/null and b/cybersecurity_resources/pdf/Hacking_API.pdf differ diff --git a/cybersecurity_resources/pdf/Hacking_APIs_1.pdf b/cybersecurity_resources/pdf/Hacking_APIs_1.pdf new file mode 100644 index 0000000000..589542543c Binary files /dev/null and b/cybersecurity_resources/pdf/Hacking_APIs_1.pdf differ diff --git a/cybersecurity_resources/pdf/Hacking_Practical_Guide_for_Beginners.pdf b/cybersecurity_resources/pdf/Hacking_Practical_Guide_for_Beginners.pdf new file mode 100644 index 0000000000..2220f9ed23 Binary files /dev/null and b/cybersecurity_resources/pdf/Hacking_Practical_Guide_for_Beginners.pdf differ diff --git a/cybersecurity_resources/pdf/Hacking_the_art_of_exploitation.pdf b/cybersecurity_resources/pdf/Hacking_the_art_of_exploitation.pdf new file mode 100644 index 0000000000..9fcef06ad9 Binary files /dev/null and b/cybersecurity_resources/pdf/Hacking_the_art_of_exploitation.pdf differ diff --git a/cybersecurity_resources/pdf/How_to_Hack_Computers.pdf b/cybersecurity_resources/pdf/How_to_Hack_Computers.pdf new file mode 100644 index 0000000000..136a64fefc Binary files /dev/null and b/cybersecurity_resources/pdf/How_to_Hack_Computers.pdf differ diff --git a/cybersecurity_resources/pdf/Linux_book.pdf b/cybersecurity_resources/pdf/Linux_book.pdf new file mode 100644 index 0000000000..3b55b549a4 Binary files /dev/null and b/cybersecurity_resources/pdf/Linux_book.pdf differ diff --git a/cybersecurity_resources/pdf/Owasp_Testing.pdf b/cybersecurity_resources/pdf/Owasp_Testing.pdf new file mode 100644 index 0000000000..87a8b6d27a Binary files /dev/null and b/cybersecurity_resources/pdf/Owasp_Testing.pdf differ diff --git a/cybersecurity_resources/pdf/Penetration_testing.pdf b/cybersecurity_resources/pdf/Penetration_testing.pdf new file mode 100644 index 0000000000..00c9ee4a12 Binary files /dev/null and b/cybersecurity_resources/pdf/Penetration_testing.pdf differ diff --git a/cybersecurity_resources/pdf/README.md b/cybersecurity_resources/pdf/README.md new file mode 100644 index 0000000000..da0f56dceb --- /dev/null +++ b/cybersecurity_resources/pdf/README.md @@ -0,0 +1,91 @@ +# Cybersecurity Resources + +This document provides a curated list of cybersecurity-related PDFs that can help you deepen your understanding of various topics in the field. + +## 1. A Bug Bounty Hunting Journey +*Description:* A comprehensive guide exploring the journey of bug bounty hunting, including strategies and experiences from professionals in the field. + +## 2. Advanced Web Attacks and Exploitation +*Description:* This resource covers advanced techniques for exploiting web applications and the corresponding defenses. + +## 3. Black Hat Python: Python Programming for Hackers and Pentesters +*Description:* A guide on how to use Python for hacking and penetration testing, focusing on tools and techniques that can be used in the field. + +## 4. Brute Forcing and Supply Chain Attacks +*Description:* An exploration of brute force attack methods and how supply chain vulnerabilities can be exploited. + +## 5. Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities +*Description:* A practical handbook for aspiring bug bounty hunters, detailing methodologies and reporting processes. + +## 6. CompTIA Network+ Exam N10-006 +*Description:* A study guide for the CompTIA Network+ certification, covering essential networking concepts. + +## 7. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide +*Description:* An in-depth study guide for the CompTIA Security+ exam, with tips and resources to help pass. + +## 8. Computer Hacking for Beginners +*Description:* A beginner-friendly introduction to computer hacking, covering fundamental concepts and techniques. + +## 9. Gray Hat Hacking: The Ethical Hacker’s Handbook +*Description:* This handbook discusses ethical hacking principles and practices for penetration testing. + +## 10. Hacking APIs: Breaking Web Application Programming Interfaces +*Description:* A detailed examination of API security, including common vulnerabilities and attack vectors. + +## 11. Hacking: Practical Guide for Beginners +*Description:* A beginner's guide to hacking techniques and tools, with practical examples and exercises. + +## 12. Hacking For Dummies +*Description:* A comprehensive introduction to hacking, covering essential skills and knowledge for aspiring hackers. + +## 13. Hacking with Kali Linux: Practical Guide +*Description:* This guide provides insights on using Kali Linux for ethical hacking and penetration testing. + +## 14. Hacking: The Art of Exploitation +*Description:* A book that delves into the techniques and methods used in hacking and exploitation. + +## 15. OWASP Testing Guide v4 +*Description:* A comprehensive guide to testing web applications for security vulnerabilities according to OWASP standards. + +## 16. Penetration Testing: A Hands-On Introduction to Hacking +*Description:* An introductory book on penetration testing methodologies and tools. + +## 17. Real-World Bug Hunting: A Field Guide to Web Hacking +*Description:* This guide offers practical advice and techniques for hunting bugs in web applications. + +## 18. The Hacker Playbook 2: Practical Guide to Penetration Testing +*Description:* A follow-up to the original, this book includes advanced techniques and strategies for penetration testing. + +## 19. The Hacker Playbook 3: Practical Guide to Penetration Testing +*Description:* Continuing from the previous volumes, this book presents the latest trends and practices in penetration testing. + +## 20. The Hardware Hacking Handbook +*Description:* A resource that explores hardware hacking techniques and methodologies. + +## 21. The Web Application Hacker's Handbook +*Description:* A definitive guide for testing the security of web applications, with techniques and case studies. + +## 22. Understanding Network Hacks: Attack and Defense with Python +*Description:* A book that covers network security from a hacking perspective, including attack and defense strategies using Python. + +## 23. WiFi Hacking for Beginners +*Description:* An introductory guide to WiFi security, including common vulnerabilities and exploitation techniques. + +## 24. Zed Attack Proxy (ZAP) +*Description:* A resource on using the ZAP tool for finding vulnerabilities in web applications. + +## 25. Breaking into InfoSec +*Description:* A guide for newcomers to information security, covering essential skills and pathways into the field. + +## 26. eLearnSecurity Junior Penetration Testing Notes +*Description:* Study notes designed for aspiring junior penetration testers, summarizing key concepts and methodologies. + +## 27. Web Hacking 101 +*Description:* A foundational guide for understanding web application security and common vulnerabilities. + +## 28. Zseano's Bug Bounty Methodology +*Description:* A structured approach to bug bounty hunting, detailing techniques and methodologies for effective testing. + +--- + + diff --git a/cybersecurity_resources/pdf/Real_World_Bug_Hunting.pdf b/cybersecurity_resources/pdf/Real_World_Bug_Hunting.pdf new file mode 100644 index 0000000000..8cfa9860d2 Binary files /dev/null and b/cybersecurity_resources/pdf/Real_World_Bug_Hunting.pdf differ diff --git a/cybersecurity_resources/pdf/Social_Engineering_The_Art_of_Psychological_Warfare_Human_Hacking_Persuasion_Deception.pdf b/cybersecurity_resources/pdf/Social_Engineering_The_Art_of_Psychological_Warfare_Human_Hacking_Persuasion_Deception.pdf new file mode 100644 index 0000000000..4da521c436 Binary files /dev/null and b/cybersecurity_resources/pdf/Social_Engineering_The_Art_of_Psychological_Warfare_Human_Hacking_Persuasion_Deception.pdf differ diff --git a/cybersecurity_resources/pdf/THE_ADVANCED_PENETRATING_TESTING_Made.pdf b/cybersecurity_resources/pdf/THE_ADVANCED_PENETRATING_TESTING_Made.pdf new file mode 100644 index 0000000000..b9ad5acd60 Binary files /dev/null and b/cybersecurity_resources/pdf/THE_ADVANCED_PENETRATING_TESTING_Made.pdf differ diff --git a/cybersecurity_resources/pdf/The_Hacker_Playbook 3_ Practical_Guide_To_Penetration_Testing.pdf b/cybersecurity_resources/pdf/The_Hacker_Playbook 3_ Practical_Guide_To_Penetration_Testing.pdf new file mode 100644 index 0000000000..f2ba2bc1ec Binary files /dev/null and b/cybersecurity_resources/pdf/The_Hacker_Playbook 3_ Practical_Guide_To_Penetration_Testing.pdf differ diff --git a/cybersecurity_resources/pdf/The_Hacker_Playbook _Practical_Guide_To_Penetration_Testing.pdf b/cybersecurity_resources/pdf/The_Hacker_Playbook _Practical_Guide_To_Penetration_Testing.pdf new file mode 100644 index 0000000000..3ce8042cea Binary files /dev/null and b/cybersecurity_resources/pdf/The_Hacker_Playbook _Practical_Guide_To_Penetration_Testing.pdf differ diff --git a/cybersecurity_resources/pdf/The_Hacker_Playbook_Practical_Guide_To_Penetration_Testing.pdf b/cybersecurity_resources/pdf/The_Hacker_Playbook_Practical_Guide_To_Penetration_Testing.pdf new file mode 100644 index 0000000000..326d9f145b Binary files /dev/null and b/cybersecurity_resources/pdf/The_Hacker_Playbook_Practical_Guide_To_Penetration_Testing.pdf differ diff --git a/cybersecurity_resources/pdf/The_Hardware_Hacking_Handbook.pdf b/cybersecurity_resources/pdf/The_Hardware_Hacking_Handbook.pdf new file mode 100644 index 0000000000..72ed282650 Binary files /dev/null and b/cybersecurity_resources/pdf/The_Hardware_Hacking_Handbook.pdf differ diff --git a/cybersecurity_resources/pdf/The_Web_Application _Hacker_Handbook.pdf b/cybersecurity_resources/pdf/The_Web_Application _Hacker_Handbook.pdf new file mode 100644 index 0000000000..38e637928d Binary files /dev/null and b/cybersecurity_resources/pdf/The_Web_Application _Hacker_Handbook.pdf differ diff --git a/cybersecurity_resources/pdf/WiFi_Hacking_for_Beginners_(James Wells)_(Z-Library).pdf b/cybersecurity_resources/pdf/WiFi_Hacking_for_Beginners_(James Wells)_(Z-Library).pdf new file mode 100644 index 0000000000..3d5ee4769c Binary files /dev/null and b/cybersecurity_resources/pdf/WiFi_Hacking_for_Beginners_(James Wells)_(Z-Library).pdf differ diff --git a/cybersecurity_resources/pdf/Zed_Attack_Pro_(Z-Library).pdf b/cybersecurity_resources/pdf/Zed_Attack_Pro_(Z-Library).pdf new file mode 100644 index 0000000000..c1ff01f301 Binary files /dev/null and b/cybersecurity_resources/pdf/Zed_Attack_Pro_(Z-Library).pdf differ diff --git a/cybersecurity_resources/pdf/breaking_to_infosec .pdf b/cybersecurity_resources/pdf/breaking_to_infosec .pdf new file mode 100644 index 0000000000..08098a5021 Binary files /dev/null and b/cybersecurity_resources/pdf/breaking_to_infosec .pdf differ diff --git a/cybersecurity_resources/pdf/eLearnSecurity_Junior_Penetration_Testing_Notes_by_Joas.pdf b/cybersecurity_resources/pdf/eLearnSecurity_Junior_Penetration_Testing_Notes_by_Joas.pdf new file mode 100644 index 0000000000..bc3f3ced9b Binary files /dev/null and b/cybersecurity_resources/pdf/eLearnSecurity_Junior_Penetration_Testing_Notes_by_Joas.pdf differ diff --git a/cybersecurity_resources/pdf/web_hacking_101.pdf b/cybersecurity_resources/pdf/web_hacking_101.pdf new file mode 100644 index 0000000000..3ef1fbc9d5 Binary files /dev/null and b/cybersecurity_resources/pdf/web_hacking_101.pdf differ diff --git a/cybersecurity_resources/pdf/zseanos_bugbounty_methodology.pdf b/cybersecurity_resources/pdf/zseanos_bugbounty_methodology.pdf new file mode 100644 index 0000000000..d732c0cce2 Binary files /dev/null and b/cybersecurity_resources/pdf/zseanos_bugbounty_methodology.pdf differ