By elvis, 28 July, 2024 Attacking Kubernetes ViewFrom Tags PDF BOOKS Attacking Kubernetes Kubernetes DevSecOpsGuides CICD CI CD
By elvis, 28 July, 2024 Attacking Pipeline ViewFrom DevSecOpsGuides.com 22 July 2024 Tags PDF BOOKS Attacking Pipeline Pipeline DevSecOpsGuides
By elvis, 28 July, 2024 Attacking AWS ViewFrom DevSecOpsGuides.com Tags PDF BOOKS Attacking AWS AWS Offensive Security DevSecOpsGuides
By elvis, 27 July, 2024 Splunk Use Cases ViewFrom Anonymous Tags PDF BOOKS Splunk SPL Use Cases Detection Engineering
By elvis, 27 July, 2024 Red Team Repo Links ViewFrom Vieh Group Tags PDF BOOKS Red Team Repo Links Vieh Group
By elvis, 27 July, 2024 Offensive Enumeration in Active Directory ViewFrom Hernan Rodriguez Tags PDF BOOKS Offensive Active Directory Active Directory Enumeration Hernan Rodriguez
By elvis, 27 July, 2024 Offensive Active Directory 101 ViewFrom Tactix Tags PDF BOOKS Offensive Active Directory Offensive Active Directory 101 Tactix
By elvis, 27 July, 2024 Lockbit 3.0 Ransomware - Malware Analysis Report ViewFrom Yusuf Amr Tags PDF BOOKS Lockbit Malware Malware Analysis report Ransomware Yusuf Amr
By elvis, 27 July, 2024 List of SPL Queries - SOC Monitoring ViewFrom Anonymous- Nikhil Sharma Tags PDF BOOKS SPL Splunk SOC SOC Monitoring
By elvis, 27 July, 2024 MITRE ATT&CK Detection Rules Part 1 ViewFrom Parastoo Razi Tags PDF BOOKS MITRE ATT&CK Detection Rules Detection Detection Engineering Parastoo Razi