├── API Gateway Security_ Implementation and Best Practices.pdf ├── Active Directory Security Event Monitoring_ Enterprise Domain Protection and Threat Detection.pdf ├── Advanced Threat Modeling_ Methodologies and Implementation Strategies for Security Architects.pdf ├── Azure Security Check List - Final.pdf ├── Buffer Overflow - English-2.pdf ├── DNS Güvenliği ve Tünelleme Tehdidi (DNS Security and Tunneling Threads).pdf ├── Directory_Traversel (2).pdf ├── Dns Tünelleme Aracı Kullanıcı Dokümantasyonu (DNS-Tunneling Tool and Documentation).pdf ├── Essential Linux Commands for Cybersecurity Specialists.pdf ├── File_Inclusion.pdf ├── IDOR.pdf ├── Linux Commands for Cybersecurity Specialists.pdf ├── Metasploit Framework Mastery_ Advanced Techniques and Command Reference.pdf ├── OWASP Top 10 API Security Risks – 2023 (1).pdf ├── Phishing, Smishing and vishing_ How these cyber attacks work and how to prevent them?.pdf ├── README.md ├── Redis Security Complete Guide for Enterprise Cache and Data Store Systems.pdf ├── Redis Security_ Complete Guide for Enterprise Cache and Data Store Systems.pdf ├── SOME EL KİTABI - (Security Operations Center Handbook).pdf ├── Sosyal Mühendislik Saldırıları (Social Engineering Attacks).pdf ├── Top 50 Kali Linux Tools_ Comprehensive Guide for Security Professionals.pdf ├── VoIP (Voice over Internet Protocol).pdf ├── Windows Event Log Analysis_ Advanced Threat Detection and Investigation in Enterprise Security.pdf ├── Windows and PowerShell Commands_ Essential Guide for Cybersecurity Professionals.pdf ├── XSS.pdf └── command-injection-v3.pdf /API Gateway Security_ Implementation and Best Practices.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/okanyildiz/MySecurityArticle/HEAD/API Gateway Security_ Implementation and Best Practices.pdf -------------------------------------------------------------------------------- /Active Directory Security Event Monitoring_ Enterprise Domain Protection and Threat Detection.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/okanyildiz/MySecurityArticle/HEAD/Active Directory Security Event Monitoring_ Enterprise Domain Protection and Threat Detection.pdf -------------------------------------------------------------------------------- /Advanced Threat Modeling_ Methodologies and Implementation Strategies for Security Architects.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/okanyildiz/MySecurityArticle/HEAD/Advanced Threat Modeling_ Methodologies and Implementation Strategies for Security Architects.pdf -------------------------------------------------------------------------------- /Azure Security Check List - Final.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/okanyildiz/MySecurityArticle/HEAD/Azure Security Check List - Final.pdf -------------------------------------------------------------------------------- /Buffer Overflow - English-2.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/okanyildiz/MySecurityArticle/HEAD/Buffer Overflow - English-2.pdf -------------------------------------------------------------------------------- /DNS Güvenliği ve Tünelleme Tehdidi (DNS Security and Tunneling Threads).pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/okanyildiz/MySecurityArticle/HEAD/DNS Güvenliği ve Tünelleme Tehdidi (DNS Security and Tunneling Threads).pdf -------------------------------------------------------------------------------- /Directory_Traversel (2).pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/okanyildiz/MySecurityArticle/HEAD/Directory_Traversel (2).pdf -------------------------------------------------------------------------------- /Dns Tünelleme Aracı Kullanıcı Dokümantasyonu (DNS-Tunneling Tool and Documentation).pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/okanyildiz/MySecurityArticle/HEAD/Dns Tünelleme Aracı Kullanıcı Dokümantasyonu (DNS-Tunneling Tool and Documentation).pdf -------------------------------------------------------------------------------- /Essential Linux Commands for Cybersecurity Specialists.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/okanyildiz/MySecurityArticle/HEAD/Essential Linux Commands for Cybersecurity Specialists.pdf -------------------------------------------------------------------------------- /File_Inclusion.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/okanyildiz/MySecurityArticle/HEAD/File_Inclusion.pdf -------------------------------------------------------------------------------- /IDOR.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/okanyildiz/MySecurityArticle/HEAD/IDOR.pdf -------------------------------------------------------------------------------- /Linux Commands for Cybersecurity Specialists.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/okanyildiz/MySecurityArticle/HEAD/Linux Commands for Cybersecurity Specialists.pdf -------------------------------------------------------------------------------- /Metasploit Framework Mastery_ Advanced Techniques and Command Reference.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/okanyildiz/MySecurityArticle/HEAD/Metasploit Framework Mastery_ Advanced Techniques and Command Reference.pdf -------------------------------------------------------------------------------- /OWASP Top 10 API Security Risks – 2023 (1).pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/okanyildiz/MySecurityArticle/HEAD/OWASP Top 10 API Security Risks – 2023 (1).pdf -------------------------------------------------------------------------------- /Phishing, Smishing and vishing_ How these cyber attacks work and how to prevent them?.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/okanyildiz/MySecurityArticle/HEAD/Phishing, Smishing and vishing_ How these cyber attacks work and how to prevent them?.pdf -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/okanyildiz/MySecurityArticle/HEAD/README.md -------------------------------------------------------------------------------- /Redis Security Complete Guide for Enterprise Cache and Data Store Systems.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/okanyildiz/MySecurityArticle/HEAD/Redis Security Complete Guide for Enterprise Cache and Data Store Systems.pdf -------------------------------------------------------------------------------- /Redis Security_ Complete Guide for Enterprise Cache and Data Store Systems.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/okanyildiz/MySecurityArticle/HEAD/Redis Security_ Complete Guide for Enterprise Cache and Data Store Systems.pdf -------------------------------------------------------------------------------- /SOME EL KİTABI - (Security Operations Center Handbook).pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/okanyildiz/MySecurityArticle/HEAD/SOME EL KİTABI - (Security Operations Center Handbook).pdf -------------------------------------------------------------------------------- /Sosyal Mühendislik Saldırıları (Social Engineering Attacks).pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/okanyildiz/MySecurityArticle/HEAD/Sosyal Mühendislik Saldırıları (Social Engineering Attacks).pdf -------------------------------------------------------------------------------- /Top 50 Kali Linux Tools_ Comprehensive Guide for Security Professionals.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/okanyildiz/MySecurityArticle/HEAD/Top 50 Kali Linux Tools_ Comprehensive Guide for Security Professionals.pdf -------------------------------------------------------------------------------- /VoIP (Voice over Internet Protocol).pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/okanyildiz/MySecurityArticle/HEAD/VoIP (Voice over Internet Protocol).pdf -------------------------------------------------------------------------------- /Windows Event Log Analysis_ Advanced Threat Detection and Investigation in Enterprise Security.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/okanyildiz/MySecurityArticle/HEAD/Windows Event Log Analysis_ Advanced Threat Detection and Investigation in Enterprise Security.pdf -------------------------------------------------------------------------------- /Windows and PowerShell Commands_ Essential Guide for Cybersecurity Professionals.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/okanyildiz/MySecurityArticle/HEAD/Windows and PowerShell Commands_ Essential Guide for Cybersecurity Professionals.pdf -------------------------------------------------------------------------------- /XSS.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/okanyildiz/MySecurityArticle/HEAD/XSS.pdf -------------------------------------------------------------------------------- /command-injection-v3.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/okanyildiz/MySecurityArticle/HEAD/command-injection-v3.pdf --------------------------------------------------------------------------------