Podcast Episodes

Back to Search
PoC or GTFO, Volume 2

PoC or GTFO, Volume 2



This Book, "PoC or GTFO, Volume 2," is a compilation of articles written by a variety of authors on the subject of software exploitation. The articles discuss various aspects of hacking, including re…


Published on 4 months, 1 week ago

PoC or GTFO, Volume 3

PoC or GTFO, Volume 3



The Book titled "PoC or GTFO, Volume 3" which contains various articles discussing "Proof of Concept" exploits for a wide range of systems and devices. The book is a collection of writings from diffe…


Published on 4 months, 1 week ago

PoC or GTFO, Volume 1

PoC or GTFO, Volume 1



The Book, "PoC or GTFO, Volume 1" is a collection of articles and essays from various authors on the topic of computer security and reverse engineering. The authors, who are known for their expertise…


Published on 4 months, 2 weeks ago

Physical Red Team Operations: Physical Penetration Testing with the REDTEAMOPSEC Methodology

Physical Red Team Operations: Physical Penetration Testing with the REDTEAMOPSEC Methodology



The Book, Physical Red Team Operations: Physical Penetration Testing, is a guide for security professionals on how to plan and execute physical red team operations, or physical penetration testing. T…


Published on 4 months, 2 weeks ago

Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks

Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks



The Book material provides a comprehensive guide to phishing attacks, exploring various types, tactics, communication channels, and legal aspects. It examines social engineering techniques, different…


Published on 4 months, 2 weeks ago

PGP & GPG: Email for the Practical Paranoid

PGP & GPG: Email for the Practical Paranoid



This excerpt from the Book "PGP & GPG: Email for the Practical Paranoid" by Michael W. Lucas provides an overview of the open-source encryption programs PGP and GnuPG, which are used to protect the c…


Published on 4 months, 2 weeks ago

Personal Digital Security: Protecting Yourself from Online Crime

Personal Digital Security: Protecting Yourself from Online Crime



This excerpt from the Book, "Personal Digital Security: Protecting Yourself from Online Crime" provides advice on how to keep personal computers and mobile devices secure from malicious hackers. The …


Published on 4 months, 2 weeks ago

Perform a web penetration test

Perform a web penetration test



This Book teaches readers how to perform a web penetration test. The course explains the stages of a penetration test, beginning with understanding the nature of such a test and the ethics involved, …


Published on 4 months, 2 weeks ago

Penetration Testing With Perl

Penetration Testing With Perl



This excerpt from the Book "Pentesting With Perl" describes how to use Perl programming for penetration testing. The book covers a wide range of topics including how to use Perl to gather open-source…


Published on 4 months, 2 weeks ago

Linux Forensics

Linux Forensics



This Book, Linux Forensics, aims to provide a comprehensive guide to digital forensics using Linux. It explores various techniques for collecting, analyzing, and interpreting digital evidence from Li…


Published on 4 months, 2 weeks ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate