techniques

  1. pindakaas

    What are some safe fraud techniques for amazon?

    Im looking for relatively safe fraud techniques
  2. Shadow Warrior

    [LEAK] [PDF] OSINT Techniques: Resources for Uncovering Online Information (NEW)

    [leak] [pdf] osint techniques: resources for uncovering online information (NEW) This is author Michael Bazzell's book leak, OSINT Techniques: Resources for Uncovering Online Information in PDF format. This book looks at OSINT from a different angle. It draws on external resources to...
  3. Sauron

    Defending APIs: Uncover advanced defense techniques to craft secure application programming interfaces

    Get up to speed with API security using this comprehensive guide full of best practices for building safer and secure APIs Key Features: Develop a profound understanding of the inner workings of APIs with a sharp focus on security Learn the tools and techniques employed by API security...
  4. Sauron

    Hacking the Hacker: My Top 10 Unconventional Cybersecurity Techniques

    Are you tired of relying on traditional, reactive cybersecurity methods that always seem one step behind the hackers? Do you want to take your organization’s cyber defense to the next level and proactively prevent, detect, and respond to even the most advanced and persistent threats? Then this...
  5. Sauron

    The Hack Is Back: Techniques to Beat Hackers at Their Own Games

    Have you wondered how hackers and nation-states gain access to confidential information on some of the most protected systems and networks in the world? Where did they learn these techniques and how do they refine them to achieve their objectives? How do I get started in a career in cyber and...
  6. LeakGod

    Linux System Programming Techniques: Become a proficient Linux system programmer using expert recipes and techniques

    Find solutions to all your problems related to Linux system programming using practical recipes for developing your own system programs Key Features * Develop a deeper understanding of how Linux system programming works * Gain hands-on experience of working with different Linux projects with the...
  7. Sauron

    Malware Analysis: Initial Access Techniques

    Malware is often delivered through complex and convoluted distribution channels. This course will teach you the basics of performing fast and effective techniques for analyzing these chains and identifying important indicators of compromise. Malware is distributed through a wide variety of...
  8. Sauron

    Antivirus Bypass Techniques

    Antivirus Bypass Techniques Antivirus software is built to detect, prevent, and remove malware from systems, but this does not guarantee the security of your antivirus solution as certain changes can trick the antivirus and pose a risk for users. This book will help you to gain a basic...
  9. GraphicsKing

    ADOBE PHOTOSHOP 2024: Beginners to Expert Guide to Explore all... Photoshop 2024 Features, Layers, Color Techniques, Typography, Selection Tools, Mask

    you a creative visionary or an individual on the hunt for a design powerhouse that doesn't drain your wallet but offers an abundance of features? Are you in need of a versatile application equipped with a toolkit that empowers you to effortlessly enhance your images? How about a design suite...
  10. LeakGod

    A Complete Guide to DevOps with AWS. Deploy, Build, and Scale Services with AWS Tools and Techniques

    Gain a thorough understanding of DevOps concepts and learn to deploy AWS DevOps services in an organization. This book covers AWS DevOps deployment and building applications and services for enhanced performance. A Complete Guide to DevOps with AWS will show you how to use AWS DevOps to...
  11. LeakGod

    Fast Python high performance techniques for large datasets

    Master Python techniques and libraries to reduce run times, efficiently handle huge datasets, and optimize execution for complex machine learning applications. Fast Python is a toolbox of techniques for high performance Python including: Writing efficient pure-Python code Optimizing the NumPy...
  12. Sauron

    Ethical Hacking Workshop: Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity

    Get a hands-on training and experience in tools, techniques, and best practices for effective ethical hacking to combat cyber threats at any scale Key Features Advice on how to use the ethical hacking methodology and thought process to perform a successful ethical hack An exploration of the...
  13. Sauron

    Windows Forensics Analyst Field Guide: Engage in proactive cyber defense using digital forensics techniques

    Build your expertise in Windows incident analysis by mastering artifacts and techniques for efficient cybercrime investigation with this comprehensive guide Key Features Gain hands-on experience with reputable and reliable tools such as KAPE and FTK Imager Explore artifacts and techniques for...
  14. LeakGod

    Web API Development with ASP.NET Core 8: Learn techniques, patterns, and tools for building high-performance, robust, and scalable web APIs

    Develop web API applications using design patterns, advanced customization, and advanced technologies such as SignalR, gRPC, and GraphQL, while leveraging powerful cloud platforms and tools to accelerate development. Key Features Gain skills in building modern ASP.NET Core web API applications...
  15. LeakGod

    ASP.NET 8 Best Practices: Explore techniques, patterns, and practices to develop effective large-scale .NET web apps

    Improve your ASP.NET skills with industry-proven methodologies and practices to make code efficient and maintainable throughout the software development lifecycle. Key Features Understand standard best practices for each stage of the SDLC, including pre-coding, encoding, and post-coding stages...
  16. ANKUSH-IDFC$

    Sales of hacking techniques and databases of more than 100 thousand TB

    I want to sell a database in the form of PDF files and also text, around 100 thousand TB more than a database and I want to sell it to everyone here who wants to buy it. Yes, I also made my own program, where in the world of hacking, many beginner hackers want to hack the system. I have the...
  17. Sauron

    Mobile Security and Hacking v3.0 Android + iOS

    Do you want to learnHow to Hack and Secure your mobile device (Android + iOS)?This course covers tools and techniques to hack a mobile device in order to teach you how to protect your mobile devices from hackers. It’s a quickly learn course which focuses on hacking and security techniques for...
  18. Sauron

    Software Testing Bootcamp

    Software Testing Course What you’ll learn Software Testing Course Basic Concepts of Software Testing Test case & Bug Report Writing Black-Box Test Techniques Requirements Review & Test Scenarios Writing using Trello Implementing the test process on a Test Management Tool (Testlink) Basics of...
  19. Sauron

    Mobile Security and Hacking v3.0

    Do you want to learnHow to Hack and Secure your mobile device (Android + iOS)?This course covers tools and techniques to hack a mobile device in order to teach you how to protect your mobile devices from hackers. It’s a quickly learn course which focuses on hacking and security techniques for...
  20. Admin

    Top 106 videos tutorial techniques which hackers use for web hacking

    Top 106 videos tutorial techniques which hackers use for web hacking : 🔲SQL Injection attacks 🔲Cross Site Scripting (XSS) 🔲Denial of Service (DoS/DDoS) 🔲Cross-site request forgery 🔲DNS Spoofing (DNS cache poisoning) 🔲Social engineering techniques 🔲Phishing 🔲Baiting 🔲Pretexting 🔲Dorking Size...
Top