Podcast Episodes
Back to Search
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
This Book titled "Practical Reverse Engineering." It provides a comprehensive guide to reverse engineering techniques for x86, x64, and ARM architect…
1 year, 1 month ago
Practical Linux Security Cookbook
The Book "Practical Linux Security Cookbook," which provides a guide to configuring and implementing security measures on Linux systems. It covers to…
1 year, 1 month ago
Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things
This Book, "Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things" provides a comprehensive guide to the security vulnerabi…
1 year, 2 months ago
PowerShell for Sysadmins: Workflow Automation Made Easy
The provided Book "PowerShell for Sysadmins: Workflow Automation Made Easy" by Adam Bertram. The excerpt is a guide to using PowerShell for automatin…
1 year, 2 months ago
PowerShell 7 for IT Professionals: A Guide to Using PowerShell 7 to Manage Windows Systems
The provided Book is an excerpt from a book titled "PowerShell 7 for IT Professionals: A Guide to Using PowerShell 7 to Manage Windows Systems," focu…
1 year, 2 months ago
Power BI: Moving Beyond the Basics of Power BI and Learning about DAX Language
The Book provides a comprehensive guide to Microsoft Power BI, a powerful business intelligence tool. It begins with a basic overview of Power BI's c…
1 year, 2 months ago
PoC or GTFO, Volume 2
This Book, "PoC or GTFO, Volume 2," is a compilation of articles written by a variety of authors on the subject of software exploitation. The article…
1 year, 2 months ago
PoC or GTFO, Volume 3
The Book titled "PoC or GTFO, Volume 3" which contains various articles discussing "Proof of Concept" exploits for a wide range of systems and device…
1 year, 2 months ago
PoC or GTFO, Volume 1
The Book, "PoC or GTFO, Volume 1" is a collection of articles and essays from various authors on the topic of computer security and reverse engineeri…
1 year, 2 months ago
Physical Red Team Operations: Physical Penetration Testing with the REDTEAMOPSEC Methodology
The Book, Physical Red Team Operations: Physical Penetration Testing, is a guide for security professionals on how to plan and execute physical red t…
1 year, 2 months ago