- Documents-solution-resources_white-papers108_en-usuploaded by
Sohel Ahmed
- DocumentMaster Thesis Finaluploaded by
Sohel Ahmed
- DocumentBug Bounty Essential Guidelines(1)uploaded by
Sohel Ahmed
- DocumentVimeo.IDORuploaded by
Sohel Ahmed
- DocumentPEN300-Syllabusuploaded by
Sohel Ahmed
- DocumentPhilipPolstra_USBForensics.pdfuploaded by
Sohel Ahmed
- DocumentRE4B-EN.pdfuploaded by
Sohel Ahmed
- Documentec-council-certified-security-analyst-ecsa-v8uploaded by
Sohel Ahmed
- Documentpwntoolsuploaded by
Sohel Ahmed
- Documentchfi-modules.pdfuploaded by
Sohel Ahmed
- DocumentGDB_and_PEDA_Slides.pdfuploaded by
Sohel Ahmed
- Documentemacs.pdfuploaded by
Sohel Ahmed
- Document2015-6-10_-_Blind Return Oriented Programminguploaded by
Sohel Ahmed
- Documentncat ccna cheat sheet.pdfuploaded by
Sohel Ahmed
- Document2019_BlackHat_US_Metcalf_Morowczynski_AttackingAndDefendingTheMicrosoftClouduploaded by
Sohel Ahmed
- Documenthello1.txtuploaded by
Sohel Ahmed
- Documentbug bounty tipuploaded by
Sohel Ahmed
- DocumentAirtel Bug Bounty TnCuploaded by
Sohel Ahmed
- DocumentCollection Of Bug Bounty Tip-Will Be updated daily - Bbinfosec - Mediumuploaded by
Sohel Ahmed
- Documentc programminguploaded by
Sohel Ahmed
- DocumentMb0039 Solved Assignmentuploaded by
Sohel Ahmed
- DocumentMb0038 Solved Asignmentuploaded by
Sohel Ahmed
- DocumentBC0056 - (solved) Unix Operating Systemuploaded by
Sohel Ahmed
- DocumentBC0053- (solved) Vb.net(2012)uploaded by
Sohel Ahmed
- DocumentBC0054 - (solved) Software Quality Management(2012)uploaded by
Sohel Ahmed
- DocumentBC0052 (Solved)Theory of Computer Science(2012)uploaded by
Sohel Ahmed