| - | adversarialaiattacksmitigationsanddefensestrategies.pdf | 29042555 | pdf | 2026-02-12 22:17:51 |
| - | awspenetrationtesting.pdf | 15269487 | pdf | 2026-02-12 22:17:52 |
| - | bashshellscriptingforpentesters.pdf | 11438324 | pdf | 2026-02-12 22:17:51 |
| - | certifiedethicalhackercehv12312-50examguide.pdf | 15063246 | pdf | 2026-02-12 22:17:51 |
| - | cloudpenetrationtesting.pdf | 10849063 | pdf | 2026-02-12 22:17:51 |
| - | cybersecurity_attackanddefensestrategies3rdedition.pdf | 84223829 | pdf | 2026-02-12 22:17:51 |
| - | cybersecurityblueteamstrategies.pdf | 3088288 | pdf | 2026-02-12 22:17:50 |
| - | digitalforensicswithkalilinuxthirdedition.pdf | 37185387 | pdf | 2026-02-12 22:17:51 |
| - | hackthecybersecurityinterview2ndedition.pdf | 5449238 | pdf | 2026-02-12 22:17:50 |
| - | hands-onethicalhackingtactics.pdf | 15159941 | pdf | 2026-02-12 22:17:51 |
| - | incidentresponsetechniquesforransomwareattacks.pdf | 12995379 | pdf | 2026-02-12 22:17:50 |
| - | malwaredevelopmentforethicalhackers.pdf | 29069166 | pdf | 2026-02-12 22:17:49 |
| - | masteringkalilinuxforadvancedpenetrationtesting.pdf | 48682453 | pdf | 2026-02-12 22:17:51 |
| - | penetrationtestingazureforethicalhackers.pdf | 13839329 | pdf | 2026-02-12 22:17:49 |
| - | pentestingactivedirectoryandwindows-basedinfrastructure.pdf | 23543648 | pdf | 2026-02-12 22:17:50 |
| - | pentestingapis.pdf | 12312722 | pdf | 2026-02-12 22:17:50 |
| - | powershellautomationandscriptingforcybersecurity.pdf | 15138466 | pdf | 2026-02-12 22:17:51 |
| - | powershellforpenetrationtesting.pdf | 1885806 | pdf | 2026-02-12 22:17:51 |
| - | practicalhardwarepentesting.pdf | 8400849 | pdf | 2026-02-12 22:17:51 |
| - | pythonethicalhackingfromscratch.pdf | 6879169 | pdf | 2026-02-12 22:17:50 |
| - | ultimatekalilinuxbookthirdedition.pdf | 169187474 | pdf | 2026-02-12 22:17:52 |
| - | windowsandlinuxpenetrationtestingfromscratchsecondedition.pdf | 72394037 | pdf | 2026-02-12 22:17:51 |