Infernalism
Storyteller Companion (3rd Edition)
Unknown
ww6000 Wraith The Oblivion.pdf
Nuwisha character Sheet
shaggy@white-wolf.com
The Pentester Blueprint
Phillip L. Wylie & Kim Crawley
README
thecarhackershand[..]
Cybersecurity Blue Team Toolkit
Nadean H. Tanner
The Web Application Hacker’s Handbook
Dafydd Stuttard & Marcus Pinto
The Art of Intrusion
Simon, William L. - Mitnick, Kevin D.
Threat Modeling
Adam Shostack
Liars and Outliers
Bruce Schneier
Applied Cryptography, Second Edition
Quick Start Guide
John Schember
The Art of Attack
Maxie Reynolds
Cybersecurity and Third-Party Risk
Gregory C. Rasner
Windows PowerShell Tutorial for Beginners
netwrix
The pfSense Book
Netgate
The Art of Deception
Kevin D. Mitnick & William L. Simon
The Art of Memory Forensics
Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters
Malware Analyst's Cookbook and DVD
Michael Ligh & Steven Adair & Blake Hartstein & Matthew Richard
Kali Linux Penetration Testing Bible
Gus Khawaja
Social Engineering
Christopher Hadnagy
Hacking Multifactor Authentication
Roger A. Grimes
Cryptography Apocalypse
Investigating Cryptocurrencies
Nick Furneaux
Cryptography Engineering: Design Principles and Practical Applications
Niels Ferguson & Bruce Schneier & Tadayoshi Kohno
Practical Reverse Engineering
Bruce Dang & Alexandre Gazet & Elias Bachaalany
Transformational Security Awareness
Perry Carpenter
Tribe of Hackers Red Team
Marcus J. Carey & Jennifer Jin
Tribe of Hackers
Tribe of Hackers Blue Team
Tribe of Hackers Security Leaders
Wireshark for Security Professionals
Jessey Bullock & Jeff T. Parker
The Liquidsoap book
Samuel Mimram; Romain Beauxis
Unauthorised Access
Allsopp , Wil