├── Infographics ├── 10 free siems.jpeg ├── Placeholder.txt ├── api master guide.jpeg ├── crackmapexec chatsheet.jpeg ├── cyber security health list.jpeg ├── excel shortcuts.jpeg ├── how email works.gif ├── http status messages.gif ├── kafka architechture.gif ├── linux file systemù.gif ├── linux shell comparision.jpeg ├── linux terminal shortcuts.jpeg ├── networking essentials.jpeg ├── open redirect bypass.jpeg ├── os rank by vulnerabilities.jpeg ├── osi model.jpeg ├── osint cheat sheet.jpeg ├── oz outbreak.jpeg ├── siem homelab.jpeg ├── soap vs rest vs graphicql.gif ├── types of firewalls.gif └── web app test.jpeg └── README.md /Infographics/10 free siems.jpeg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CyberAlbSecOP/CyberSecurity_PDF_Vault/1143164f7379730340c6f173c4cc574b288ef4cc/Infographics/10 free siems.jpeg -------------------------------------------------------------------------------- /Infographics/Placeholder.txt: -------------------------------------------------------------------------------- 1 | 2 | -------------------------------------------------------------------------------- /Infographics/api master guide.jpeg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CyberAlbSecOP/CyberSecurity_PDF_Vault/1143164f7379730340c6f173c4cc574b288ef4cc/Infographics/api master guide.jpeg -------------------------------------------------------------------------------- /Infographics/crackmapexec chatsheet.jpeg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CyberAlbSecOP/CyberSecurity_PDF_Vault/1143164f7379730340c6f173c4cc574b288ef4cc/Infographics/crackmapexec chatsheet.jpeg -------------------------------------------------------------------------------- /Infographics/cyber security health list.jpeg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CyberAlbSecOP/CyberSecurity_PDF_Vault/1143164f7379730340c6f173c4cc574b288ef4cc/Infographics/cyber security health list.jpeg -------------------------------------------------------------------------------- /Infographics/excel shortcuts.jpeg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CyberAlbSecOP/CyberSecurity_PDF_Vault/1143164f7379730340c6f173c4cc574b288ef4cc/Infographics/excel shortcuts.jpeg -------------------------------------------------------------------------------- /Infographics/how email works.gif: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CyberAlbSecOP/CyberSecurity_PDF_Vault/1143164f7379730340c6f173c4cc574b288ef4cc/Infographics/how email works.gif -------------------------------------------------------------------------------- /Infographics/http status messages.gif: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CyberAlbSecOP/CyberSecurity_PDF_Vault/1143164f7379730340c6f173c4cc574b288ef4cc/Infographics/http status messages.gif -------------------------------------------------------------------------------- /Infographics/kafka architechture.gif: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CyberAlbSecOP/CyberSecurity_PDF_Vault/1143164f7379730340c6f173c4cc574b288ef4cc/Infographics/kafka architechture.gif -------------------------------------------------------------------------------- /Infographics/linux file systemù.gif: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CyberAlbSecOP/CyberSecurity_PDF_Vault/1143164f7379730340c6f173c4cc574b288ef4cc/Infographics/linux file systemù.gif -------------------------------------------------------------------------------- /Infographics/linux shell comparision.jpeg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CyberAlbSecOP/CyberSecurity_PDF_Vault/1143164f7379730340c6f173c4cc574b288ef4cc/Infographics/linux shell comparision.jpeg -------------------------------------------------------------------------------- /Infographics/linux terminal shortcuts.jpeg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CyberAlbSecOP/CyberSecurity_PDF_Vault/1143164f7379730340c6f173c4cc574b288ef4cc/Infographics/linux terminal shortcuts.jpeg -------------------------------------------------------------------------------- /Infographics/networking essentials.jpeg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CyberAlbSecOP/CyberSecurity_PDF_Vault/1143164f7379730340c6f173c4cc574b288ef4cc/Infographics/networking essentials.jpeg -------------------------------------------------------------------------------- /Infographics/open redirect bypass.jpeg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CyberAlbSecOP/CyberSecurity_PDF_Vault/1143164f7379730340c6f173c4cc574b288ef4cc/Infographics/open redirect bypass.jpeg -------------------------------------------------------------------------------- /Infographics/os rank by vulnerabilities.jpeg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CyberAlbSecOP/CyberSecurity_PDF_Vault/1143164f7379730340c6f173c4cc574b288ef4cc/Infographics/os rank by vulnerabilities.jpeg -------------------------------------------------------------------------------- /Infographics/osi model.jpeg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CyberAlbSecOP/CyberSecurity_PDF_Vault/1143164f7379730340c6f173c4cc574b288ef4cc/Infographics/osi model.jpeg -------------------------------------------------------------------------------- /Infographics/osint cheat sheet.jpeg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CyberAlbSecOP/CyberSecurity_PDF_Vault/1143164f7379730340c6f173c4cc574b288ef4cc/Infographics/osint cheat sheet.jpeg -------------------------------------------------------------------------------- /Infographics/oz outbreak.jpeg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CyberAlbSecOP/CyberSecurity_PDF_Vault/1143164f7379730340c6f173c4cc574b288ef4cc/Infographics/oz outbreak.jpeg -------------------------------------------------------------------------------- /Infographics/siem homelab.jpeg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CyberAlbSecOP/CyberSecurity_PDF_Vault/1143164f7379730340c6f173c4cc574b288ef4cc/Infographics/siem homelab.jpeg -------------------------------------------------------------------------------- /Infographics/soap vs rest vs graphicql.gif: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CyberAlbSecOP/CyberSecurity_PDF_Vault/1143164f7379730340c6f173c4cc574b288ef4cc/Infographics/soap vs rest vs graphicql.gif -------------------------------------------------------------------------------- /Infographics/types of firewalls.gif: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CyberAlbSecOP/CyberSecurity_PDF_Vault/1143164f7379730340c6f173c4cc574b288ef4cc/Infographics/types of firewalls.gif -------------------------------------------------------------------------------- /Infographics/web app test.jpeg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CyberAlbSecOP/CyberSecurity_PDF_Vault/1143164f7379730340c6f173c4cc574b288ef4cc/Infographics/web app test.jpeg -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | ![image](https://github.com/CyberAlbSecOP/CyberSecurity_PDF_Vault/assets/145022163/cccc78af-ab56-4e84-a6c5-2890821b012c) 2 | 3 | # 🛡️ CyberSecurity PDF Vault 4 | 5 | Welcome to the **CyberSecurity PDF Vault**—a treasure trove of essential cybersecurity knowledge. This repository is a comprehensive collection of PDFs covering various aspects of cybersecurity, from guides and research papers to in-depth studies on cryptography, malware analysis, penetration testing, and more. Whether you're a student, researcher, or professional, you'll find valuable resources to enhance your cybersecurity skills and knowledge. 6 | 7 | --- 8 | 9 | ## 📂 Collection Overview 10 | 11 | ### What You'll Find Inside: 12 | - **Guides:** Step-by-step instructions for cybersecurity practices. 13 | - **Research Papers:** Scholarly articles and cutting-edge research. 14 | - **Educational Materials:** Resources for learning and teaching cybersecurity. 15 | - **Information Security:** Fundamentals of protecting digital information. 16 | - **Network Security:** Protecting data during transfer across networks. 17 | - **Cryptography:** The art of securing communication. 18 | - **Malware Analysis:** Techniques to understand and mitigate malware threats. 19 | - **Penetration Testing & Ethical Hacking:** Practical guides to testing and securing systems. 20 | - **Data Protection & Privacy:** Ensuring personal and organizational data stays safe. 21 | - **Threat Intelligence & Incident Response:** Strategies for identifying and responding to cyber threats. 22 | - **Digital Forensics:** Techniques for investigating and analyzing cyber incidents. 23 | 24 | ### 📥 [Mega Link](https://mega.nz/folder/iyxWGQ5K#yIsCknFVdHp3VmrJCat8Qw) 25 | 26 | --- 27 | 28 | ## 📚 Resources 29 | 30 | Explore the following categories of resources: 31 | 32 | - **📕 PDFs:** A vast collection of documents covering all areas of cybersecurity. 33 | - **🖼️ Infographics:** Visual aids and diagrams for quick understanding of complex topics. 34 | 35 | --- 36 | 37 | ## 🙌 Credits 38 | 39 | A huge thank you to all the creators who have contributed to these PDFs. 40 | 41 | --- 42 | 43 | ## 🔑 Keywords 44 | 45 | This repository covers an extensive range of cybersecurity topics, including but not limited to: 46 | 47 | CyberSecurity, PDF, Vault, Repository, Guides, Research Papers, Education, Information Security, Network Security, Cryptography, Malware Analysis, Penetration Testing, Ethical Hacking, Data Protection, Privacy, Threat Intelligence, Incident Response, Digital Forensics, Firewall, Intrusion Detection System, Vulnerability Scanning, Risk Assessment, Security Policy, Access Control, Authentication, Encryption, Public Key Infrastructure, Secure Sockets Layer, Transport Layer Security, Secure Shell, Wireless Security, Cloud Security, Mobile Security, Internet of Things Security, Application Security, Web Security, Endpoint Security, Security Information and Event Management, Identity and Access Management, Data Loss Prevention, Antivirus, Anti-Malware, Ransomware, Phishing, Social Engineering, Denial of Service, Distributed Denial of Service, Botnet, Zero-Day Exploit, Patch Management, Compliance, General Data Protection Regulation, Payment Card Industry Data Security Standard, Health Insurance Portability and Accountability Act, ISO 27001, Cyber Threat Intelligence, Cybersecurity Framework, Cybersecurity Standards, Cybersecurity Best Practices. 48 | 49 | --- 50 | 51 | ## 📢 Contributions and Support 52 | 53 | We welcome contributions to expand this repository. If you have additional resources, corrections, or suggestions, please feel free to submit a pull request or open an issue. Your support and feedback help us keep this collection up to date and valuable for the cybersecurity community. 54 | 55 | --- 56 | 57 | --------------------------------------------------------------------------------