Kitsune Csheet
shaggy@white-wolf.com
Wind_From_The_East
Lau
2001 WW4809 Witches and Pagans
Unknown
Transylvania by Night (1997)
Unauthorised Access
Allsopp , Wil
The Liquidsoap book
Samuel Mimram; Romain Beauxis
Wireshark for Security Professionals
Jessey Bullock & Jeff T. Parker
Tribe of Hackers Security Leaders
Marcus J. Carey & Jennifer Jin
Tribe of Hackers Blue Team
Tribe of Hackers
Tribe of Hackers Red Team
Transformational Security Awareness
Perry Carpenter
Practical Reverse Engineering
Bruce Dang & Alexandre Gazet & Elias Bachaalany
Cryptography Engineering: Design Principles and Practical Applications
Niels Ferguson & Bruce Schneier & Tadayoshi Kohno
Investigating Cryptocurrencies
Nick Furneaux
Cryptography Apocalypse
Roger A. Grimes
Hacking Multifactor Authentication
Social Engineering
Christopher Hadnagy
Kali Linux Penetration Testing Bible
Gus Khawaja
Malware Analyst's Cookbook and DVD
Michael Ligh & Steven Adair & Blake Hartstein & Matthew Richard
The Art of Memory Forensics
Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters
The Art of Deception
Kevin D. Mitnick & William L. Simon
The pfSense Book
Netgate
Windows PowerShell Tutorial for Beginners
netwrix
Cybersecurity and Third-Party Risk
Gregory C. Rasner
The Art of Attack
Maxie Reynolds
Quick Start Guide
John Schember
Applied Cryptography, Second Edition
Bruce Schneier
Liars and Outliers
Threat Modeling
Adam Shostack
The Art of Intrusion
Simon, William L. - Mitnick, Kevin D.
The Web Application Hacker’s Handbook
Dafydd Stuttard & Marcus Pinto
Cybersecurity Blue Team Toolkit
Nadean H. Tanner
thecarhackershand[..]
README
The Pentester Blueprint
Phillip L. Wylie & Kim Crawley