53 Gráficos e Designs de facanha para Camisetas e Merch print on demand

Baixar designs de camisetas e para merch, como capas de livro, capas de celular, tote bags e mais de facanha

Ordenar por

Mais relevante
Exploit Icon Element For Design
Zero day attack RGB color icon. Vulnerable software. Fixing program with patch. Cybercrime. Isolated vector illustration. Simple filled line drawing. Editable stroke. Arial font used
Vector icon for Psychological Manipulation. Human figure with a shadowy hand above, symbolizing hidden control, deceit, and emotional exploitation.
Asteroid Mining is the hypothetical exploitation of materials from asteroids and other minor planets, including near-Earth objects, text concept message bubble
Exploit Icon Element For Design
Modern Slavery Concept, Child labor, illegal activities or Corporate Workers under the strict supervision of management. Editable Clip Art.
Exploit Icon Element For Design
Vulnerability Assessment and Penetration Testing for vulnerability testing  to determine whether unauthorized access or other malicious activity is possible
Cybersecurity vulnerability linear icon. System weakness and flaw. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Exploit Icon Element For Design
Business woman exploitation by male boss vector concept. Woman doing all hard work. Discrimination, inequality symbol. Eps10 illustration.
System Vulnerabilities and Exploit Detection with Unauthorized Access, Malicious Website, and Infected Server Risks Darker Background Version with Editable Stroke and Colors.
Fair trade with sustainable environment attitude as ethical business .Eco friendly and honest salary for work or resources exploitation .flat character life .
vector illustration of man manipulating people as puppets with social media influence
World day against child labor vector concept. Man giving command on boy to work mining rocks
Privilege Escalation, Exploit Glyph Solid Icon
violence against children - online grooming - girl looking at candy on the computer
System Vulnerabilities and Exploit Detection with Unauthorized Access, Malicious Website, and Infected Server Risks. Vector Editable Stroke and Colors.
Creative industry concept icon. Game design industry benefits. Exploitation of information. Perspective idea thin line illustration. Vector isolated outline RGB color drawing. Editable stroke
Advanced Persistent Threat (APT) concept – APT attack, APT Cyber Attack Vector, Cyber Espionage Graphic, Network Exploitation SymbolEditable Stroke and Colors.
Oil industry black glyph icon. Petroleum refinery station, fossil fuel extraction plant. Natural resources exploitation silhouette symbol on white space. Oil pump, derrick vector isolated illustration
Warning sign (exploitation), vector illustration.
Domination or manipulate by control puppet doll, marionette or exploitation, authority or boss micro management, dictator or slave concept.flat characters.
Red Team Engagement Icon Representing Penetration Testing, Vulnerability Exploitation, and Cyber Defense Evaluation
Creative industry concept icon. Game design industry benefits. Exploitation of knowledge. Perspective idea thin line illustration. Vector isolated outline RGB color drawing. Editable stroke
Exploit Icon Element For Design
Burden of monarchy authority and class struggle line illustration concept. King walking ahead with impoverished servants exploitation outline 2D characters isolated. Ink linear drawing vector art
business chief is seeking benefits exploit coworkers working together
World day against child labor vector concept. Man ordering child to build bricks wall
Exposure, Exploit Glyph Solid Icon
Hardwood timber production flat vector illustration. Industrial wood. Forest exploitation. Logging. Furniture manufacturing. Indonesian business. Isolated cartoon concept on white background
Incident, Exploit, Error Outline Icon
Exploit Icon Element For Design
Exposure, Exploit, Security Risk Outline Icon
Exploit Icon Element For Design
Microchip with skull line and solid icon, hacker attacks concept. Vector graphics. Processor with hacker exploit tool, hardware sign on white background, outline style icon for mobile or web design
Privilege Escalation, Exploit Outline Icon
Incident, Exploit Glyph Solid Icon
Exploit Multi Style Icon Set
Particles of charcoal on transparent background. Abstract black powder splatter. Vector realistic exploding black powder
O golpista está segurando uma máscara. Roubo de identidade por meio de representação digital e perfis roubados. O cibercriminoso se esconde atrás de uma máscara falsa para explorar as informações do usuário. Fraude on-line
Penetration Testing Icon Representing Vulnerability Exploitation, Security Hardening, and Cyber Risk Analysis. Editable Stroke.
Vector illustration of business concept, two businessman kneel down before their leader at the top of upstairs
Privilege Escalation Icon, Gaining Administrator Access and Security Exploit Symbol
Privilege Escalation Icon, Gaining Administrator Access and Security Exploit Symbol
vector illustration for international day of innocent children victims of aggression
Child slavery blue concept icon. Children forced to work abstract idea thin line illustration. Illegal enslavement of kids. Children abuse. Vector isolated outline color drawing. Editable stroke
African businessmen exploit by co-workers working together
Working for the man - Oppressive leader making employee work very hard. Manual labour, unappreciative boss and oppression concept. Vector illustration.
Manipulator concept vector illustration. Puppet master hands manipulate man mind, silhouette. Mental control ropes. Domination exploitation background.
Resultados patrocinados da Shutterstock Logo
Ganhe 15% de desconto com o código: VEXELS15

do 2