FileMood

Download books

Books

Name

books

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

5.9 GB

Total Files

911

Hash

D63644FC3F0B29A97351BCF003458039C1734F34

/AAA_smistare/

(Information science and statistics) Christopher M. Bishop-Pattern Recognition and Machine Learning-Springer (2006).pdf

8.5 MB

15344.pdf

53.3 KB

2014-apt-study.pdf

169.5 KB

Aamir Lakhani, Joseph Muniz-Penetration Testing with Raspberry Pi-Packt Publishing (2015).pdf

10.2 MB

Aaron Johns-Mastering Wireless Penetration Testing for Highly-Secured Environments-Packt Publishing (2015).pdf

12.9 MB

advanced-persistent-threat-id52631.pdf

83.8 KB

Allen Downey B.-Think Bayes-O'Reilly Media (2013).pdf

12.3 MB

analisi_tecnica_rsi_relative_strentgh_index_significato_formula_intepretazione_tempi_ed_esempi.pdf

408.5 KB

Bachaalany, Elias_ Koret, Joxean-The Antivirus Hacker's Handbook-Wiley (2015).pdf

5.9 MB

Bastian Ballmann-Understanding Network Hacks_ Attack and Defense with Python-Springer (2015).pdf

11.4 MB

Ben Clark-Rtfm_ Red Team Field Manual-CreateSpace Independent Publishing Platform (2014).pdf

10.7 MB

Chris Sanders and Jason Smith (Auth.)-Applied Network Security Monitoring. Collection, Detection, and Analysis (2014).pdf

39.2 MB

Douglas Berdeaux-Penetration Testing with Perl-Packt Publishing - ebooks Account (2015).pdf

4.6 MB

Drew Conway, John Myles White-Machine Learning for Hackers-O'Reilly Media (2012).pdf

1.8 MB

FirstStrike_Plus.pdf

175.3 KB

Ivan Ristic-Bulletproof SSL and TLS_ Understanding and Deploying SSL_TLS and PKI to Secure Servers and Web Applications-Feisty Duck (2014).pdf

7.1 MB

J.J. MURPHY-ANALISI TECNICA DEI MERCATI FINANZIARI.pdf

16.2 MB

Jacob Perkins-Python 3 Text Processing with NLTK 3 Cookbook-Packt Publishing - ebooks Account (2014).pdf

1.7 MB

Jay Jacobs, Bob Rudis-Data-Driven Security_ Analysis, Visualization and Dashboards-Wiley (2014).pdf

8.6 MB

Jeremy Faircloth-Penetration Tester's Open Source Toolkit, Third Edition -Elsevier Science (2011).pdf

17.8 MB

Loraine Blaxter, Christina Hughes, Malcolm Tight-How to Research, 4th Edition -Open University Press (2010).pdf

1.3 MB

Luis Pedro Coelho, Willi Richert-Building Machine Learning Systems with Python-Packt Publishing (2015).pdf

6.8 MB

Lutz M.-Python pocket reference-O'Reilly (2014).pdf

2.5 MB

Matthew A. Russell-Mining the social web_ data mining Facebook, Twitter, LinkedIn, Google+, GitHub, and more-O'Reilly Media (2013).pdf

22.1 MB

Micha Gorelick, Ian Ozsvald-High Performance Python_ Practical Performant Programming for Humans-O'Reilly Media (2014).pdf

8.0 MB

Michael Collins-Network Security Through Data Analysis_ Building Situational Awareness-O'Reilly Media (2014).pdf

14.1 MB

Paulino Calderon Pale-Mastering Nmap Scripting Engine-Packt Publishing (2015).pdf

2.0 MB

Qing Li, Gregory Clark-Security Intelligence_ A Practitioner's Guide to Solving Enterprise Security Challenges-Wiley (2015).pdf

22.6 MB

Richard Lawson-Web Scraping with Python-Packt Publishing (2015).pdf

5.5 MB

Ryan Mitchell-Web Scraping with Python_ Collecting Data from the Modern Web-O'Reilly Media (2015).pdf

6.4 MB

Sam Newman-Building Microservices-O'Reilly Media (2015).pdf

5.0 MB

Steven Bird, Ewan Klein, Edward Loper-Natural Language Processing with Python-O'Reilly Media (2009).pdf

5.4 MB

The_Art_of_Human_Hacking.pdf

6.4 MB

Toby Segaran-Programming Collective Intelligence_ Building Smart Web 2.0 Applications-O'Reilly Media (2007).pdf

3.5 MB

Tyler Wrightson-Advanced Persistent Threat Hacking_ The Art and Science of Hacking Any Organization-McGraw-Hill (2015).pdf

11.1 MB

Wes McKinney-Python for Data Analysis-O'Reilly Media (2012).pdf

14.8 MB

wireless_hacking_presentation.pdf

2.3 MB

Yuxing Yan-Python for Finance-Packt Publishing - ebooks Account (2014).pdf

5.1 MB

Yves Hilpisch-Python for Finance_ Analyze Big Financial Data-O'Reilly Media (2014).pdf

11.0 MB

/Antiviruses/

2012_EPP_CAR_Consumer_Exploit_Evasion_Defenses_0.pdf

275.5 KB

34591.pdf

1.1 MB

An Automated Online Packing Service for Optimal Antivirus Evasion.pdf

175.6 KB

Antivirus , Firewall evasion techiniques.pdf

633.7 KB

AV-Sandbox-Presentation_v2.0.pdf

257.8 KB

AV_Evasion.pdf

443.4 KB

avevasion-techniques.pdf

771.2 KB

BypassAVDynamics.pdf

1.0 MB

bypassing-av.pdf

1.1 MB

Evading Antivirus Metasploit Webcast.pdf

628.9 KB

evasive_threats.pdf

1.3 MB

Fighting_Advanced_Threats.pdf

2.1 MB

IJOPCM(vol.1.2.3.S.08).pdf

86.5 KB

MalWareBytes_sSecurity_IO#113914_Eguide_031714_LI#839558.pdf

775.3 KB

Practical Anti-virus Evasion - avevasion_pentestmag.pdf

362.2 KB

rp-nss-labs-corporate-exploit-evasion-defenses.pdf

189.6 KB

Ryan Linn - Getting Shells When Metasploit Fails - Sector 2012.pdf

673.5 KB

security-guide-how-to-evade-anti-virus-detection.pdf

172.0 KB

Testing antivirus engines to determine theireffectiveness as a security layer.pdf

570.7 KB

The Deathof AV DefenseinDepth _- revisiting Anti-Virus Software.pdf

2.4 MB

The State of the Veil Framework - Will Schroeder and Chris Truncer.pdf

744.6 KB

us-14-Mesbahi-One-Packer-To-Rule-Them-All-WP.pdf

2.5 MB

us-15-Xenakis-ROPInjector-Using-Return-Oriented-Programming-For-Polymorphism-And-Antivirus-Evasion-wp.pdf

724.3 KB

us-15-Xenakis-ROPInjector-Using-Return-Oriented-Programming-For-Polymorphism-And-Antivirus-Evasion.pdf

383.5 KB

Why_Antivirus_Fails_-_Daniel_Sauder.pdf

1.3 MB

why_malware_works_in_face_of_antivirus_software.pdf

793.8 KB

woot09-polypack-pres.pdf

1.9 MB

WP_SerialVariantEvasionTactics.pdf

1.2 MB

Writing Zero Days for Security - APT Penetration Testing Framework v1.0.pdf

3.7 MB

/APT/

2014-apt-study.pdf

169.5 KB

advance-penetration-testing-kali-linux-training.pdf

36.1 KB

Advanced Penetration Testing for Highly Secured Environments.pdf

16.6 MB

Advanced Persistent Threat Hacking, The Art & Science...pdf

11.1 MB

b-advanced_persistent_threats_WP_21215957.en-us.pdf

3.1 MB

CybraryAdvancedPenSlides.pdf

2.4 MB

esg-apts-deep-discovery-whitepaper-en.pdf

494.0 KB

/Assembly/

Intel32-2-Instruction Set ReferenceA.pdf

2.3 MB

Intel32-2-Instruction Set ReferenceB.pdf

1.8 MB

No_NX.pdf

84.1 KB

Non-Executable Stack ARM Exploitation(def18).pdf

235.8 KB

On the Effectiveness of Address-Space Randomization.pdf

150.4 KB

pcasm.pdf

800.5 KB

Understanding the Low Fragmentation Heap-BH10.pdf

1.2 MB

Unix Assembly Codes Development for Vulnerabilities.pdf

280.1 KB

x86 Disassembly.pdf

1.2 MB

/Big Data/

Apress.Big.Data.Imperatives.Jun.2013.ISBN.1430248726.pdf

10.5 MB

Morgan.Kaufmann.Data.Warehousing.In.The.Age.Of.Big.Data.Jun.2013.ISBN.0124058914.pdf

17.2 MB

OReilly.Data.Science.For.Business.Aug.2013.ISBN.1449361323.pdf

15.2 MB

OReilly.Ethics.Of.Big.Data.Sep.2012.ISBN.1449311792.pdf

6.2 MB

Packt.Big.Data.Analytics.With.R.And.Hadoop.Nov.2013.ISBN.178216328X.pdf

3.2 MB

Wiley.Big.Data.Oct.2013.ISBN.1118739574(1).pdf

21.6 MB

Wiley.Big.Feb.2015.ISBN.1118965833.pdf

4.8 MB

Wiley.Data.May.2013.ISBN.111844714X.pdf

33.6 MB

Wiley.Data.Mining.May.2014.ISBN.1119977134.pdf

16.5 MB

Wiley.Making.2nd.Edition.Aug.2014.ISBN.1118407415.pdf

8.4 MB

/BSD/

OpenBSD Remote Exploiting.pdf

262.6 KB

/C Stuff/

C Primer Plus 6th Edition Dec 2013.pdf

7.2 MB

Debugging with gdb.pdf

1.1 MB

Expert C Programming Deep C Secrets.pdf

2.3 MB

K & R - The C programming Language 2nd Edition.pdf

1.1 MB

Oreilly.Understanding.and.Using.C.Pointers.Apr.2013.pdf

7.7 MB

profCUDAc.pdf

53.1 MB

/CEH/

Advanced Python Programming.pdf

199.0 KB

Attacking The DNS Protocol.pdf

330.2 KB

CEH-Handbook-v2.0.pdf

56.6 MB

Certified Ethical Hacker 3.0 Official Course.pdf

27.1 MB

Hacking - CEH Cheat Sheet Exercises.pdf

336.2 KB

HII_Remote_and_Local_File_Inclusion_Vulnerabilities.pdf

1.9 MB

Pen_Testing_and_Ethical_Hacking_Study_Guide.pdf

1.7 MB

/CEH/CEH 2009/

CEH-Classroom-Lab-Setup-v6.pdf

1.6 MB

CEHv6 Module 00 Student Introduction.pdf

604.9 KB

CEHv6 Module 01 Introduction to Ethical Hacking.pdf

3.2 MB

CEHv6 Module 02 Hacking Laws.pdf

3.8 MB

CEHv6 Module 03 Footprinting.pdf

10.5 MB

CEHv6 Module 04 Google Hacking.pdf

4.4 MB

CEHv6 Module 05 Scanning.pdf

17.5 MB

CEHv6 Module 06 Enumeration.pdf

4.2 MB

CEHv6 Module 07 System Hacking.pdf

15.8 MB

CEHv6 Module 08 Trojans and Backdoors.pdf

9.5 MB

CEHv6 Module 09 Viruses and Worms.pdf

5.8 MB

CEHv6 Module 10 Sniffers.pdf

10.5 MB

CEHv6 Module 11 Social Engineering.pdf

5.3 MB

CEHv6 Module 12 Phishing.pdf

2.7 MB

CEHv6 Module 13 Hacking Email Accounts.pdf

1.9 MB

CEHv6 Module 14 Denial of Service.pdf

3.7 MB

CEHv6 Module 15 Session Hijacking.pdf

2.0 MB

CEHv6 Module 16 Hacking Webservers.pdf

5.1 MB

CEHv6 Module 17 Web Application Vulnerabilities.pdf

4.8 MB

CEHv6 Module 18 Web based Password Cracking Techniques.pdf

5.7 MB

CEHv6 Module 19 SQL Injection.pdf

3.4 MB

CEHv6 Module 20 Hacking Wireless Networks.pdf

13.6 MB

CEHv6 Module 21 Physical Security.pdf

3.2 MB

CEHv6 Module 22 Linux Hacking.pdf

6.4 MB

CEHv6 Module 23 Evading IDS Firewall and Honeypot.pdf

5.0 MB

CEHv6 Module 24 Buffer Overflows.pdf

1.4 MB

CEHv6 Module 25 Cryptography.pdf

4.3 MB

CEHv6 Module 26 Penetration Testing.pdf

5.9 MB

CEHv6 Module 28 Writing Virus Codes.pdf

613.4 KB

CEHv6 Module 29 Assembly Language Tutorial.pdf

1.0 MB

CEHv6 Module 30 Exploit Writing.pdf

2.1 MB

CEHv6 Module 31 Exploit Writing.pdf

244.7 KB

CEHv6 Module 32 Exploit Writing.pdf

656.2 KB

CEHv6 Module 33 Reverse Engineering Techniques.pdf

2.9 MB

CEHv6 Module 34 MAC OS X Hacking.pdf

1.3 MB

CEHv6 Module 35 Hacking Routers, Cable Modems and Firewalls.pdf

3.4 MB

CEHv6 Module 36 Hacking Mobile Phones, PDA and Handheld Devices.pdf

4.2 MB

CEHv6 Module 37 Bluetooth Hacking.pdf

2.6 MB

CEHv6 Module 38 VoIP Hacking.pdf

4.1 MB

CEHv6 Module 39 RFID Hacking.pdf

2.3 MB

CEHv6 Module 40 Spamming.pdf

2.8 MB

CEHv6 Module 41 Hacking USB Devices.pdf

1.9 MB

CEHv6 Module 42 Hacking Database Servers.pdf

1.7 MB

CEHv6 Module 43 Cyber Warfare- Hacking Al-Qaida and Terrorism.pdf

2.8 MB

CEHv6 Module 44 Internet Content Filtering Techniques.pdf

2.0 MB

CEHv6 Module 45 Privacy on the Internet.pdf

5.7 MB

CEHv6 Module 46 Securing Laptop Computers.pdf

2.0 MB

CEHv6 Module 47 Spying Technologies.pdf

4.5 MB

CEHv6 Module 48 Corporate Espionage by Insiders.pdf

2.3 MB

CEHv6 Module 49 Creating Security Policies.pdf

2.2 MB

CEHv6 Module 50 Software Piracy and W.pdf

2.2 MB

CEHv6 Module 51 Hacking and Cheating Online Games.pdf

2.1 MB

CEHv6 Module 52 Hacking RSS and Atom.pdf

1.7 MB

CEHv6 Module 53 Hacking Web Browsers.pdf

2.0 MB

CEHv6 Module 54 Proxy Server Technologies.pdf

2.4 MB

CEHv6 Module 55 Preventing Data Loss.pdf

3.9 MB

CEHv6 Module 56 Hacking Global Positioning System.pdf

2.2 MB

CEHv6 Module 57 Computer Forensics and Incident Handling.pdf

2.6 MB

CEHv6 Module 58 Credit Card Frauds.pdf

2.2 MB

CEHv6 Module 59 How to Steal Passwords.pdf

1.6 MB

CEHv6 Module 60 Firewall Technologies.pdf

3.0 MB

CEHv6 Module 61 Threats and Countermeasures.pdf

1.0 MB

CEHv6 Module 62 Case Studies.pdf

731.0 KB

CEHv6 Module 63 Botnets.pdf

1.2 MB

CEHv6 Module 64 Economic Espionage.pdf

668.9 KB

CEHv6 Module 65 Patch Management.pdf

7.4 MB

CEHv6 Module 66 Security Convergence.pdf

645.7 KB

CEHv6 Module 67 Identifying the Terrorists.pdf

1.8 MB

prova 312-50.pdf

2.9 MB

/CEH/CEH 2010/

CEH Official Certified Ethical Hacker Review Guide (2010) CT.pdf

8.4 MB

CEH v01 Ethical Hacking & Countermeasures Attack Phases (2010) CT.pdf

17.9 MB

CEH v02 Ethical Hacking & Countermeasures Threats & Defense Mechanisms (2010) CT.pdf

16.0 MB

CEH v03 Ethical Hacking & Countermeasures Web Applications & Data Servers (2010) CT.pdf

14.1 MB

CEH v04 Ethical Hacking & Countermeasures Linux, Macintosh & Mobile Systems (2010) CT.pdf

6.7 MB

CEH v05 Ethical Hacking & Countermeasures Secure Network Infrastructures (2010) CT.pdf

8.3 MB

CHFI v01 Computer Forensics Investigation Procedures & Response (2010) CT.pdf

4.0 MB

CHFI v02 Computer Forensics Investigating Hard Disks, File & Operating Systems (2010) CT.pdf

10.8 MB

CHFI v03 Computer Forensics Investigating Data & Image Files (2010) CT.pdf

18.2 MB

CHFI v04 Computer Forensics Investigating Network Intrusions & Cyber Crimes (2010) CT.pdf

25.2 MB

CHFI v05 Computer Forensics Investigating Wireless Networks & Devices (2010) CT.pdf

5.6 MB

ECDR-ECVT v01 Disaster Recovery (2011) CT.pdf

9.5 MB

ECDR-ECVT v02 Virtualization Security (2011) CT.pdf

8.0 MB

ECSA v01 Security Analysis (2011) CT.pdf

21.3 MB

ECSA v02 Procedures & Methodologies (2011) CT.pdf

8.3 MB

ECSA v03 Network & Perimeter Testing (2011) CT.pdf

11.2 MB

ECSA v04 Communication Media Testing (2011) CT.pdf

13.0 MB

ECSA v05 Network Threat Testing (2011) CT.pdf

8.8 MB

ENSA v01 Network Defense; Fundamentals & Protocols (2011) CT.pdf

16.6 MB

ENSA v02 Network Defense; Security Policy & Threats (2011) CT.pdf

13.1 MB

ENSA v03 Network Defense; Perimeter Defense Mechanisms (2011) CT.pdf

6.0 MB

ENSA v04 Network Defense; Securing & Troubleshooting Network Operating Systems (2011) CT.pdf

13.8 MB

ENSA v05 Network Defense; Security & Vulnerability Assessment (2011) CT.pdf

13.0 MB

Network 5; Network Safety Certification (2011) CT.pdf

3.3 MB

Wireless 5; Wireless Safety Certification (2010) CT.pdf

3.5 MB

/CEH/CEH 7&8/

CEHV7 - Module 01 - Introduction to Ethical Hacking.pdf

5.2 MB

CEHV7 - Module 02 - Footprinting and Reconnaissance.pdf

8.9 MB

CEHV7 - Module 03 - Scanning Networks.pdf

16.7 MB

CEHV7 - Module 04 - Enumeration.pdf

7.0 MB

CEHV7 - Module 05 - System Hacking.pdf

23.9 MB

CEHV7 - Module 06 - Trojans and Backdoors.pdf

15.2 MB

CEHV7 - Module 07 - Viruses and Worms.pdf

12.0 MB

CEHV7 - Module 08 - Sniffers.pdf

13.8 MB

CEHV7 - Module 09 - Social Engineering.pdf

11.1 MB

CEHV7 - Module 10 - Denial of Service.pdf

10.0 MB

CEHV7 - Module 11 - Session Hijacking.pdf

7.9 MB

CEHV7 - Module 12 - Hacking Webservers.pdf

12.3 MB

CEHV7 - Module 13 - Hacking Web Applications.pdf

24.7 MB

CEHV7 - Module 14 - SQL Injection.pdf

15.4 MB

CEHV7 - Module 15 - Hacking Wireless Networks.pdf

25.0 MB

CEHV7 - Module 16 - Evading IDS, Firewalls, and Honeypots.pdf

17.2 MB

CEHV7 - Module 17 - Buffer Overflow.pdf

8.7 MB

CEHV7 - Module 18 - Cryptography.pdf

7.4 MB

CEHV7 - Module 19 - Penetration Testing.pdf

10.9 MB

CEHV7- Certified Ethical Hacker Study Guide.pdf

7.0 MB

CEHV8 - Hacker Halted.pdf

1.2 MB

CEHV8 - Module 00 - Labs Countermeasures.pdf

101.5 KB

CEHV8 - Module 01 - Introduction to Ethical Hacking.pdf

4.1 MB

CEHV8 - Module 02 - Footprinting and Reconnaissance.pdf

8.2 MB

CEHV8 - Module 02 - Labs Footprinting and Reconnaissance.pdf

3.6 MB

CEHV8 - Module 03 - Labs Scanning Networks.pdf

6.8 MB

CEHV8 - Module 03 - Scanning Networks.pdf

8.7 MB

CEHV8 - Module 04 - Enumeration.pdf

4.0 MB

CEHV8 - Module 04 - Labs Enumeration.pdf

1.5 MB

CEHV8 - Module 05 - Labs System Hacking.pdf

4.8 MB

CEHV8 - Module 05 - System Hacking .pdf

14.7 MB

CEHV8 - Module 06 - Labs Trojans and Backdoors.pdf

4.4 MB

CEHV8 - Module 06 - Trojans and Backdoors.pdf

9.1 MB

CEHV8 - Module 07 - Labs Viruses and Worms.pdf

2.5 MB

CEHV8 - Module 07 - Viruses and Worms.pdf

5.1 MB

CEHV8 - Module 08 - Labs Sniffers.pdf

4.4 MB

CEHV8 - Module 08 - Sniffing.pdf

8.4 MB

CEHV8 - Module 09 - Labs Social Engineering.pdf

1.2 MB

CEHV8 - Module 09 - Social Engineering.pdf

5.4 MB

CEHV8 - Module 10 - Denial of Service.pdf

5.1 MB

CEHV8 - Module 10 - Labs Denial of Service.pdf

523.9 KB

CEHV8 - Module 11 - Labs Session Hijacking.pdf

684.0 KB

CEHV8 - Module 11 - Session Hijacking.pdf

4.5 MB

CEHV8 - Module 12 - Hacking Webservers.pdf

6.0 MB

CEHV8 - Module 12 - Labs Hacking Webservers.pdf

1.3 MB

CEHV8 - Module 13 - Hacking Web Applications .pdf

12.5 MB

CEHV8 - Module 13 - Labs Hacking Web Applications.pdf

907.4 KB

CEHV8 - Module 14 - Labs SQL Injection.pdf

1.6 MB

CEHV8 - Module 14 - SQL Injection.pdf

7.2 MB

CEHV8 - Module 15 - Hacking Wireless Networks.pdf

12.7 MB

CEHV8 - Module 15 - Labs Hacking Wireless Networks.pdf

1.3 MB

CEHV8 - Module 16 - Hacking Mobile Platforms.pdf

7.3 MB

CEHV8 - Module 17 - Evading IDS, Firewalls, and Honeypots.pdf

6.8 MB

CEHV8 - Module 17 - Labs Evading IDS, Firewalls and Honeypots.pdf

2.4 MB

CEHV8 - Module 18 - Buffer Overflow.pdf

4.2 MB

CEHV8 - Module 18 - Labs Buffer Overflow.pdf

466.7 KB

CEHV8 - Module 19 - Cryptography.pdf

4.2 MB

CEHV8 - Module 19 - Labs Cryptography.pdf

1.9 MB

CEHV8 - Module 20 - Penetration Testing.pdf

4.6 MB

CEHV8 - References.pdf

2.9 MB

Cybercriminalité, Enquète sur les mafias qui envahissent le web.pdf

3.4 MB

Frankenstein Slides.pdf

2.0 MB

Les virus informatiques théorie, pratique et applications [584 pages].pdf

20.5 MB

Techniques virales avancées [292 pages].pdf

14.7 MB

/CEH/CEHv6/

Exploit Writing Using Metasploit Framework.pdf

656.2 KB

Module 03 Footprinting.pdf

10.5 MB

Module 04 Google Hacking.pdf

4.4 MB

Module 05 Scanning.pdf

17.5 MB

Module 06 Enumeration.pdf

4.2 MB

Module 07 System Hacking.pdf

15.8 MB

Module 08 Trojans and Backdoors.pdf

9.5 MB

Module 09 Viruses and Worms.pdf

5.8 MB

Module 10 Sniffers.pdf

10.5 MB

Module 11 Social Engineering.pdf

5.3 MB

Module 12 Phishing.pdf

2.7 MB

Module 13 Hacking Email Accounts.pdf

1.9 MB

Module 14 Denial of Service.pdf

3.7 MB

Module 15 Session Hijacking.pdf

2.0 MB

Module 16 Hacking Webservers.pdf

5.1 MB

Module 17 Web Application Vulnerabilities.pdf

4.8 MB

Module 18 Web based Password Cracking Techniques.pdf

5.7 MB

Module 19 SQL Injection.pdf

3.4 MB

Module 20 Hacking Wireless Networks.pdf

13.6 MB

Module 21 Physical Security.pdf

3.2 MB

Module 22 Linux Hacking.pdf

6.4 MB

Module 23 Evading IDS Firewall and Honeypot.pdf

5.0 MB

Module 24 Buffer Overflows.pdf

1.4 MB

Module 25 Cryptography.pdf

4.3 MB

Module 26 Penetration Testing.pdf

5.9 MB

Module 28 Writing Virus Codes.pdf

613.4 KB

Module 29 Assembly Language Tutorial.pdf

1.0 MB

Module 30 Exploit Writing.pdf

2.1 MB

Module 31 Windows Based Buffer Overflow Exploit Writing.pdf

244.7 KB

Module 33 Reverse Engineering Techniques.pdf

2.9 MB

Module 34 MAC OS X Hacking.pdf

1.3 MB

Module 35 Hacking Routers, Cable Modems and Firewalls.pdf

3.4 MB

Module 36 Hacking Mobile Phones, PDA and Handheld Devices.pdf

4.2 MB

Module 37 Bluetooth Hacking.pdf

2.6 MB

Module 38 VoIP Hacking.pdf

4.1 MB

Module 39 RFID Hacking.pdf

2.3 MB

Module 40 Spamming.pdf

2.8 MB

Module 41 Hacking USB Devices.pdf

1.9 MB

Module 42 Hacking Database Servers.pdf

1.7 MB

Module 43 Cyber Warfare- Hacking Al-Qaida and Terrorism.pdf

2.8 MB

Module 44 Internet Content Filtering Techniques.pdf

2.0 MB

Module 45 Privacy on the Internet.pdf

5.7 MB

Module 46 Securing Laptop Computers.pdf

2.0 MB

Module 47 Spying Technologies.pdf

4.5 MB

Module 48 Corporate Espionage by Insiders.pdf

2.3 MB

Module 49 Creating Security Policies.pdf

2.2 MB

Module 50 Software Piracy and Warez.pdf

2.2 MB

Module 51 Hacking and Cheating Online Games.pdf

2.1 MB

Module 52 Hacking RSS and Atom.pdf

1.7 MB

Module 53 Hacking Web Browsers.pdf

2.0 MB

Module 54 Proxy Server Technologies.pdf

2.4 MB

Module 55 Preventing Data Loss.pdf

3.9 MB

Module 56 Hacking Global Positioning System.pdf

2.2 MB

Module 57 Computer Forensics and Incident Handling.pdf

2.6 MB

Module 58 Credit Card Frauds.pdf

2.2 MB

Module 59 How to Steal Passwords.pdf

1.6 MB

Module 60 Firewall Technologies.pdf

3.0 MB

Module 61 Threats and Countermeasures.pdf

26.1 MB

Module 62 Case Studies.pdf

731.0 KB

Module 63 Botnets.pdf

1.2 MB

Module 64 Economic Espionage.pdf

668.9 KB

Module 65 Patch Management.pdf

7.4 MB

Module 66 Security Convergence.pdf

645.7 KB

Module 67 Identifying the Terrorists.pdf

1.8 MB

/Computer Security/

Addison.Wesley.Crimeware.Understanding.New.Attacks.And.Defenses.Apr.2008.ISBN.0321501950.chm

10.8 MB

Addison.Wesley.The.Technical.And.Social.History.Of.Software.Engineering.Dec.2013.ISBN.0321903420.pdf

1.6 MB

Apress.Healthcare.Jun.2014.ISBN.1430266767.pdf

2.5 MB

McGraw.Hill.Principles.Of.Computer.Security.CompTIA.Security.Plus.And.Beyond.Lab.Manual.2nd.Edition.Dec.2010.ISBN.0071748563.pdf

5.8 MB

/Cryptography/

A cryptographic file system for unix.pdf

112.3 KB

ADVANCED ENCRYPTION STANDARD.pdf

1.4 MB

Attacking NTLM with Precomputed Hashtables.pdf

122.2 KB

Attacking Unbalanced RSA-CRT Using SPA.pdf

239.1 KB

Cryptanalysis of Hash Functions of the MD4-Family.pdf

933.8 KB

Cryptography.pdf

1.7 MB

D1T2 - Skyper - Cracking the GSM A5_1 Encryption in Seconds.pdf

3.6 MB

Defeating_Encryption.pdf

502.8 KB

DES.pdf

443.4 KB

Detecting and Defeating Government Interception Attacks Against SSL.pdf

607.2 KB

Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines.pdf

506.5 KB

DETECTING HIDDEN MESSAGES USING HIGHER-ORDER STATISTICAL MODELS.pdf

171.3 KB

Detecting Steganographic Content on the Internet.pdf

840.9 KB

FUNDAMENTALS OF CRYPTOLOGY.pdf

3.0 MB

How to Break MD5 and Other Hash Functions.pdf

188.9 KB

Improved Collision Attack on Hash Function MD5.pdf

321.9 KB

Improved Collision Attack on MD5.pdf

163.9 KB

Information Hiding—A Survey.pdf

3.5 MB

IntroToCrypto.pdf

3.7 MB

Malicious Cryptography Techniques for Unreversable.pdf

1.3 MB

Malicious Cryptology and Mathematics 29700.pdf

293.1 KB

MD5.pdf

421.8 KB

MONOALPHABETIC UNILATERAL SUBSTITUTION.pdf

536.5 KB

On The Limits of Steganography.pdf

159.5 KB

Pen_Testing_and_Ethical_Hacking_Study_Guide.pdf

1.7 MB

PublicandPrivateKeyCryptographyWhitePaper-Dec2014.pdf

1.7 MB

Securing_Enterprise_Web_Applications_at_the_Source.pdf

2.1 MB

Serpent: A Proposal for the Advanced Encryption Standard.pdf

194.8 KB

steganography seeing the unseen by neil f. johnson.pdf

2.4 MB

Syndrome Decoding in the Non-Standard Cases.pdf

109.7 KB

Weakness in the key scheduling algorithm of RC4.pdf

289.6 KB

westfeld-pfitzmann-ihw99.pdf

988.0 KB

Wiley.Malicious.Cryptography.Exposing.Cryptovirology.Feb.2004.ISBN.0764549758.pdf

30.5 MB

/DEP & ASLR & ROP/

ASLR - Address Space Layout Randomization.pdf

264.9 KB

ASLR Smack_Reference.pdf

521.4 KB

Bypassing DEP with WPM & ROP.pdf

341.9 KB

Defeating DEP and ASLR.pdf

1.3 MB

DEPinDepth.pdf

608.9 KB

ROPdefender_ A Detection Tool to Defend Against ROP Attacks.pdf

433.0 KB

/Ethical Hacking/

Ethical Hacking.pdf

23.5 MB

McGraw.Hill.Gray.Hat.Hacking.4th.Edition.Jan.2015.ISBN.0071832386.pdf

33.9 MB

McGraw.Hill.Hacking.Exposed.Linux.3rd.Edition.Jul.2008.ISBN.0072262575.pdf

11.0 MB

McGraw.Hill.Hacking.Exposed.Network.Security.Secrets.And.Solutions.2nd.Edition.Oct.2000.ISBN.0072127481.pdf

8.4 MB

McGraw.Hill.Hacking.Exposed.Network.Security.Secrets.And.Solutions.3rd.Edition.Sep.2001.ISBN.0072193816.pdf

6.1 MB

/Exploit/

Addison.Wesley.Exploiting.Software.How.To.Break.Code.Feb.2004.ISBN.0201786958.pdf

8.0 MB

/Forensics/

Prentice.Hall.Network.Forensics.Jun.2012.ISBN.0132564718.pdf

20.8 MB

Sybex.Mastering.Windows.Network.Forensics.And.Investigation.2nd.Edition.Jun.2012.ISBN.1118163826.pdf

42.1 MB

Wiley.Memory.Jul.2014.ISBN.1118825098.pdf

7.5 MB

/Format Strings/

Exploiting Format String Vulnerabilities.pdf

234.4 KB

FormatStringAttack.pdf

124.0 KB

/Fuzzing/

Fuzzing Brute Force Vulnerability Discovery.pdf

29.8 MB

Fuzzing Making software Dumber.pdf

79.8 KB

Fuzzing.pdf

4.7 MB

Fuzzing_ Grammar-based Whitebox Fuzzing.pdf

175.9 KB

Fuzzing_for_software_vulnerability_discovery.pdf

5.9 MB

You Can't See Me - Practical Steganography.pdf

60.3 KB

/Hacking Exposed/

Hacking Exposed 7 Network Security Secre - Stuart McClure.pdf

34.6 MB

Hacking Exposed Web Applications 3rd ed - J. Scambray, et al., (McGraw-Hill, 2011) BBS.pdf

7.3 MB

Hacking Exposed Windows, 3rd Edition.pdf

10.1 MB

/Hadoop/

Dayong Du-Apache Hive Essentials-Packt Publishing - ebooks Account (2015).epub

1.4 MB

Getting Started with Impala.pdf

808.1 KB

Getting Started with Impala2.pdf

798.4 KB

hadoop-illuminated.pdf

9.5 MB

Hadoop.pdf

923.8 KB

John Russell-Getting Started with Impala_ Interactive SQL for Apache Hadoop-O'Reilly Media (2014).epub

208.1 KB

Manning.Hadoop.In.Practice.Oct.2012.ISBN.1617290238.pdf

15.5 MB

OReilly.Apache.Sqoop.Cookbook.Jul.2013.ISBN.1449364624.pdf

9.0 MB

OReilly.Hadoop.Operations.Oct.2012.ISBN.1449327052.pdf

7.7 MB

OReilly.Hadoop.The.Definitive.Guide.3rd.Edition.May.2012.ISBN.1449311520.pdf

14.5 MB

orielly-cloudera-impala-ebook.pdf

6.5 MB

Packt.Hadoop.Beginners.Guide.Feb.2013.ISBN.1849517304.pdf

12.0 MB

Packt.Hadoop.Cluster.Deployment.Nov.2013.ISBN.1783281715.pdf

4.5 MB

Packt.Learning.Cloudera.Impala.Dec.2013.ISBN.1783281278.pdf

2.9 MB

/Javascript/

Apress.Pro.Data.Visualization.Using.R.And.JavaScript.Jun.2013.ISBN.1430258063.pdf

9.2 MB

Apress.Pro.PHP.And.JQuery.Add.Quick.Smooth.And.Easy.Interactivity.To.Your.PHP.Sites.With.JQuery.Jun.2010.ISBN.1430228474.pdf

11.4 MB

Manning.Secrets.Of.The.JavaScript.Ninja.Dec.2012.ISBN.193398869X.pdf

15.6 MB

Morgan.Kaufmann.Object.Oriented.Construction.Handbook.Oct.2004.ISBN.1558606874.pdf

6.3 MB

No.Starch.The.Principles.Of.Object.Oriented.JavaScript.Feb.2014.ISBN.1593275404.pdf

2.7 MB

OReilly.JavaScript.Testing.With.Jasmine.Apr.2013.ISBN.1449356370.pdf

1.5 MB

OReilly.JQuery.Cookbook.Solutions.And.Examples.For.JQuery.Developers.Dec.2009.ISBN.0596159773.pdf

6.0 MB

OReilly.Programming.JavaScript.Applications.Jul.2014.ISBN.1491950293.pdf

8.5 MB

Packt.CoffeeScript.Programming.With.JQuery.Rails.And.Node.JS.Dec.2012.ISBN.1849519587.pdf

4.2 MB

Packt.Creating.2nd.Edition.Feb.2015.ISBN.1783555114.pdf

4.5 MB

Packt.Creating.Mobile.Apps.With.JQuery.Mobile.Apr.2013.ISBN.178216006X.pdf

4.1 MB

Packt.JQuery.Mobile.Cookbook.Nov.2012.ISBN.1849517223.pdf

4.7 MB

Packt.JQuery.UI.1.8.The.User.Interface.Library.For.JQuery.Aug.2011.ISBN.1849516529.pdf

7.5 MB

Packt.Object.Oriented.JavaScript.2nd.Edition.Jul.2013.ISBN.1849693129.pdf

2.2 MB

Packt.Object.Oriented.JavaScript.Create.Scalable.Reusable.High.Quality.JavaScript.Applications.And.Libraries.Jul.2008.ISBN.1847194141.pdf

7.5 MB

Packt.PHP.AJAX.Cookbook.Dec.2011.ISBN.1849513082.pdf

5.8 MB

Sitepoint.Javascript.Jan.2015.ISBN.0992461251.pdf

5.1 MB

SitePoint.JQuery.Novice.To.Ninja.2nd.Edition.Feb.2012.ISBN.0987153013.pdf

16.9 MB

/Javascript/nodejs/

Alex R. Young, Marc Harter-Node.js in Practice-Manning (2015).pdf

7.6 MB

Basarat Ali Syed (auth.)-Beginning Node.js-Apress (2014).pdf

7.3 MB

Fernando Doglio (auth.)-Pro REST API Development with Node.js-Apress (2015).pdf

7.5 MB

Krasimir Tsonev-Node.js By Example-Packt Publishing - ebooks Account (2015).epub

2.0 MB

Mario Casciaro-Node.js Design Patterns-Packt Publishing (2014).pdf

15.4 MB

/Kali Tutorials/

CreateSpace.Publishing.Basic.Security.Testing.With.Kali.Linux.Jan.2014.ISBN.1494861275.pdf

14.4 MB

Packt.Kali.Linux.Apr.2014.ISBN.184951948X.pdf

8.2 MB

Packt.Kali.Linux.Cookbook.Oct.2013.ISBN.1783289597.pdf

11.2 MB

Packt.Kali.Linux.CTF.Blueprints.Jul.2014.ISBN.1783985984.pdf

3.7 MB

Packt.Kali.Linux.Network.Scanning.Cookbook.Aug.2014.ISBN.1783982144.pdf

4.8 MB

Packt.Kali.Linux.Social.Engineering.Dec.2013.ISBN.1783283270.pdf

4.0 MB

Packt.Mastering.Kali.Linux.For.Advanced.Penetration.Testing.Jun.2014.ISBN.1782163123.pdf

9.4 MB

Packt.Web.Penetration.Testing.With.Kali.Linux.Sep.2013.ISBN.1782163166.pdf

20.2 MB

/Linux Exploitation Series/

1 Linux exploit writing tutorial part 1 - Stack overflow.pdf

867.0 KB

1-Stack_Based_Overflows.pdf

3.2 MB

10-Chaining_DEPwithROP.pdf

6.2 MB

11-heap-spraying-demystified.pdf

7.8 MB

2 Linux exploit writing tutorial part 2 - Stack Overflow ASLR bypass using ret2reg.pdf

780.1 KB

2-Writing_BufferOverflow_Exploits.pdf

2.1 MB

3 Linux exploit development part 3 - ret2libc.pdf

566.3 KB

3-Writing_SEH_BasedExploits-A.pdf

3.6 MB

3-Writing_SEH_BasedExploits-B.pdf

1.4 MB

4-FromExploit_to_Metasploit_Basics.pdf

1.9 MB

4a Linux exploit development part 3 (rev 2) - Real app demo.pdf

311.7 KB

4b Linux exploit development part 2 (rev 2) - Real app demo (part 2).pdf

586.1 KB

5 Linux exploit development part 4 - ASCII armor bypass + return-to-plt.pdf

614.6 KB

5-Debugger modules_&_plugins_speedup.pdf

2.6 MB

6-Bypassing_StackCookies_SafeSeh_SEHOP_HWDEP_ASLR.pdf

5.1 MB

7-Unicode.pdf

2.5 MB

8-Win32_Egg_Hunting.pdf

5.6 MB

9-Win32_shellcoding.pdf

5.1 MB

/Linux/

A Guide to Kernel Exploitation Attacking the Core.pdf

5.5 MB

Introduccion-Explotacion-Software-Linux.pdf

565.1 KB

McGraw.Hill.Hacking.Exposed.Linux.Third.Edition.Jul.2008.pdf

11.0 MB

RTFM - Red Team Field Manual.pdf

3.1 MB

TLCL-13.07.pdf

2.1 MB

/Malwares/

03_La complessità del malware.pdf

4.2 MB

0x90.se_-_Malware_Analysis_-_Part_I.pdf

927.3 KB

1507.06955v1.pdf

159.2 KB

34516.pdf

207.6 KB

34591.pdf

1.1 MB

Addison.Wesley.The.Art.Of.Computer.Virus.Research.And.Defense.Feb.2005.ISBN.0321304543.chm

7.0 MB

Advanced Polymorphic Techniques.pdf

731.0 KB

botnets-detection-measurement-disinfection-defence.pdf

4.1 MB

darkhotel_kl_07.11.pdf

2.7 MB

darkhotelappendixindicators_kl.pdf

1.4 MB

Data Mining Tools for Malware Detection Mehedy Masud, Latifur Khan, Bhavani Thuraisingham--Auerbach Publications,CRC Press (2011).pdf

9.4 MB

Detect_Malware_w_Memory_Forensics.pdf

2.5 MB

fighter-pos-whitepaper-en.pdf

5.8 MB

Financial Malware Analysis - Secrets of ZeuS.pdf

642.5 KB

FireEye_AdvMalwareExposed.pdf

795.5 KB

Malware Analyst's Cookbook and DVD.pdf

9.4 MB

Mohssen Mohammed_ Al-Sakib Khan Pathan-Automatic defense against zero-day polymorphic worms in communication networks-Auerbach (2013).pdf

17.1 MB

No.Starch.Practical.Malware.Analisys.Mar.2012.ISBN.1593272901.pdf

9.9 MB

Packt.Cuckoo.Malware.Analysis.Oct.2013.ISBN.1782169237.pdf

7.5 MB

Pattern-Oriented-Diagnostics-Debugging-Malware-Analysis-Reversing.pdf

10.2 MB

Patterns of a Cooperative Malware Analysis Workflow.pdf

621.8 KB

Springer.Android.Malware.Jun.2013.ISBN.1461473934.pdf

3.6 MB

Springer.Computer.Viruses.And.Malware.Advances.In.Information.Security.Jul.2006.ISBN.0387302360.pdf

11.3 MB

Springer.Computer.Viruses.From.Theory.To.Applications.Sep.2005.ISBN.2287239391.pdf

2.8 MB

Springer.Malware.Forensics.Field.Guide.For.Windows.Systems.Jun.2012.ISBN.1597494720.pdf

29.7 MB

Spyware_Adware.pdf

3.7 MB

The.Rootkit.Arsenal.Escape.and.Evasion.in.the.Dark.Corners.of.the.System,Second.Edition.pdf

98.7 MB

WGM12349USEN.PDF

2.5 MB

/Malwares/crypters/

18242.pdf

1.0 MB

419evolution [DataScrambler ].pdf

1.9 MB

Hyperion_ Implementation of a PE-Crypter.pdf

238.7 KB

Malware Obfuscation with Threat Emulation.pdf

381.0 KB

Malware1.pdf

2.6 MB

Malware_Magazine_1.pdf

5.7 MB

MITM ATTACK WITH PATCHING BINARIES ON THE FLY BY ADDING SHELLCODES.pdf

10.9 MB

NocONName_2012-Evadiendo_Antivirus-Uso_de_Crypters.pdf

32.2 MB

ScyllaHide.pdf

429.4 KB

UNPROTECTING THE CRYPTER.pdf

1.0 MB

Utilisation de Stub En VB.NET.pdf

556.7 KB

vb201407-VB6.pdf

348.5 KB

/Malwares/mem injection/

DEFCON-20-King-Reflective-Injection-Detection.pdf

447.7 KB

fatkit_dll_rc3.pdf

101.9 KB

HS-P005_ReflectiveDllInjection.pdf

165.9 KB

lumension_reflective-memory-injection.pdf

404.5 KB

/Malwares/vectors/

An7i Security.html

870.7 KB

Vulnerability analysis, Security Papers, Exploit Tutorials - Part 32480.html

21.8 KB

/.../An7i Security_files/

4205868711-css_bundle_v2.css

43.0 KB

422439_10150655860234757_828564756_8927229_56595808_n.jpg

1.4 KB

a.jpeg

1.6 KB

anon36.png

1.7 KB

arrow_dropdown.gif

0.1 KB

authorization.css

0.1 KB

Avatar.jpeg

1.8 KB

b36-rounded.png

0.8 KB

cbgapi.loaded_0

171.2 KB

cbgapi.loaded_1

37.1 KB

cbgapi.loaded_2

7.9 KB

comment-iframe.html

8.2 KB

css.css

0.3 KB

fastbutton.html

39.0 KB

icon18_edit_allbkg.gif

0.2 KB

icon18_wrench_allbkg.png

0.5 KB

icon_feed12.png

0.5 KB

openid36-rounded.png

1.3 KB

photo.jpg

1.8 KB

photo_002.jpg

1.8 KB

photo_003.jpg

1.5 KB

photo_004.jpg

1.6 KB

postmessageRelay.html

0.6 KB

shCore.css

6.2 KB

shThemeDefault.css

2.9 KB

subscribe-netvibes.png

1.4 KB

subscribe-yahoo.png

0.6 KB

/.../comment-iframe_data/

4079081201-cmtfp.css

16.6 KB

blank.gif

0.0 KB

close.gif

0.3 KB

/.../An7i Security_files/fastbutton_data/

photo.jpg

0.8 KB

/.../Vulnerability analysis, Security Papers, Exploit Tutorials - Part 32480_files/

codecolorer.css

11.4 KB

css.css

1.5 KB

css_002.css

0.7 KB

Defaults.css

22.4 KB

edb-2015-theme-logo641.png

19.9 KB

exploit.css

5.0 KB

font-awesome.css

30.5 KB

fotorama.css

15.1 KB

magnific-popup.css

9.2 KB

motioncss-responsive.css

2.1 KB

motioncss.css

43.3 KB

responsive.css

10.9 KB

settings.css

55.2 KB

style.css

184.6 KB

ultimate.css

471.3 KB

us_impreza_custom_styles.css

34.8 KB

wbt.css

181.5 KB

/Malwares/worms/

CHAPTER 9 Strategies of Computer Worms.pdf

1.7 MB

jxia-JCS-wormdetection.pdf

434.0 KB

/Memory/

Bypassing Browser Memory Protections(BH08).pdf

700.5 KB

The Art of Memory Forensics.pdf

7.5 MB

/Memory/Overflow/

A Buffer Overflow Study Attacks & Defenses.pdf

496.5 KB

Detecting and exploiting integer overflows.pdf

505.5 KB

Exploiting Stack Overflows in the Linux Kernel.pdf

296.3 KB

Stack Based Buffer Overflows and Protection Mechanisms.pdf

514.4 KB

/.../1. Instant Metasploit Starter/

Instant Metasploit Starter - Ranganath, Karthik.epub

8.4 MB

Instant Metasploit Starter - Ranganath, Karthik.jpg

34.1 KB

Instant Metasploit Starter - Ranganath, Karthik.opf

1.2 KB

/.../2. Learning Metasploit Exploitation and Development/

Learning Metasploit Exploitation and Development - Balapure, Aditya.epub

26.0 MB

Learning Metasploit Exploitation and Development - Balapure, Aditya.jpg

39.8 KB

Learning Metasploit Exploitation and Development - Balapure, Aditya.opf

1.3 KB

/Metasploit/

Aditya Balapure-Learning Metasploit Exploitation and Development-Packt Publishing (2013).pdf

9.5 MB

Monika Agarwal, Abhinav Singh-Metasploit Penetration Testing Cookbook, Second Edition-Packt Publishing (2013).pdf

7.2 MB

No.Starch.Meta.Jun.2011.ISBN.159327288X.pdf

7.2 MB

No.Starch.Metasploit.Jul.2011.epub

3.7 MB

No.Starch.Metasploit.Jul.2011.pdf

7.3 MB

Packt.Mastering.Metasploit.May.2014.ISBN.1782162224.pdf

14.8 MB

Packt.Metasploit.Jun.2012.ISBN.1849517428.pdf

5.2 MB

/Misc/

32719.pdf

1.8 MB

Access_Denied - Code_Breakers_Guide.pdf

5.3 MB

Android Hacker's Handbook.pdf

9.5 MB

Blackhat-europe-09-Damele-SQLInjection-slides.pdf

256.6 KB

Blackhatonomics.pdf

6.7 MB

Chapter02 - RuntimeAttacks.pdf

7.0 MB

Cyber Warfare, 2nd Ed By Jason Andress.pdf

9.0 MB

Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition (2011).pdf

12.8 MB

Instant.Burp.Suite.Starter.pdf

2.1 MB

IRandDF3rdEdition.pdf

16.6 MB

No.Starch.A.Bug.Hunters.Diary.Nov.2011.pdf

5.4 MB

nsa.pdf

11.9 MB

Radware_DDoS_Handbook_2015.pdf

1.0 MB

The Art of Computer Virus Research and Defense.pdf

10.4 MB

The Browser Hacker's Handbook.pdf

13.1 MB

The Ida Pro Book.pdf

27.1 MB

The.IDA.Pro.Book.2nd.Edition.Jun.2011.pdf

9.7 MB

The_Hacker_Playbook.pdf

27.3 MB

Worm- The First Digital World War.pdf

113.1 MB

/Mobile/

OReilly.20.Recipes.For.Programming.PhoneGap.Apr.2012.ISBN.1449319548.pdf

6.7 MB

Packt.PhoneGap.3.X.Mobile.Application.Development.Hotshot.May.2014.ISBN.1783287926.pdf

6.1 MB

/Modern Web/

No.Starch.The.Modern.Web.Apr.2013.ISBN.1593274874.pdf

8.6 MB

OReilly.Building.Hypermedia.APIs.With.HTML5.And.Node.Dec.2011.ISBN.1449306578.pdf

7.2 MB

OReilly.Building.Web.Apps.With.Ember.JS.Aug.20214.ISBN.1449370926.pdf

12.1 MB

OReilly.Enterprise.Web.Development.Building.HTML5.Jul.2014.ISBN.1449356818.pdf

46.2 MB

OReilly.Getting.Started.With.GEO.CouchDB.And.Node.JS.Aug.2011.ISBN.1449307523.pdf

7.2 MB

OReilly.Programming.3D.Applications.With.HTML5.And.WebGL.Mar.2014.ISBN.1449362966.pdf

67.1 MB

OReilly.Programming.HTML5.Applications.Nov.2011.ISBN.1449399088.pdf

8.4 MB

OReilly.Restful.Web.Services.Cookbook.Mar.2010.ISBN.0596801688.pdf

2.3 MB

OReilly.Restful.Web.Services.May.2007.ISBN.0596529260.pdf

3.2 MB

OReilly.Web.Development.With.Node.And.Express.Jul.2014.ISBN.1491949309.pdf

8.5 MB

Packt.Building.Impressive.Presentations.With.Impress.Dot.JS.Mar.2013.ISBN.1849696489.pdf

2.2 MB

Packt.Data.Visualization.With.D3.JS.Cookbook.Oct.2013.ISBN.178216216X.pdf

3.2 MB

Packt.Data.Visualization.With.D3.JS.Oct.2013.ISBN.1782160000.pdf

3.6 MB

Packt.Developing.Windows.Store.Apps.With.HTML5.And.JavaScript.Aug.2013.ISBN.1849687102.pdf

2.5 MB

Packt.Ember.Feb.2013.ISBN.1782163387.pdf

3.8 MB

Packt.Getting.Started.With.Memcached.Nov.2013.ISBN.1782163220.pdf

870.8 KB

Packt.HTML5.Graphing.And.Data.Visualization.Cookbook.Nov.2012.ISBN.1849693706.pdf

3.8 MB

Packt.HTML5.IPhone.Web.Application.Development.May.2013.ISBN.1849691029.pdf

9.2 MB

Packt.HTML5.Web.Application.Development.By.Example.Jun.2013.ISBN.1849695946.pdf

3.0 MB

Packt.Oracle.Application.Express.4.0.With.Ext.JS.Mar.2011.ISBN.1849681066.pdf

10.0 MB

Packt.Social.Data.Visualization.With.HTML5.And.JavaScript.Sep.2013.ISBN.1782166548.pdf

1.3 MB

Packt.Tableau.Data.Visualization.Cookbook.Aug.2013.ISBN.1849689784.pdf

3.7 MB

Wrox.Developing.Jul.2009.ISBN.0470414642.pdf

6.5 MB

/Network/

Dissecting.the.Hack.The.F0rb1dd3n.Networkook.pdf

2.7 MB

Hack-Proofing-Your-Network.pdf

9.2 MB

Hands-On Ethical Hacking and Network Defense, 2nd Edition.pdf

20.8 MB

Nmap Network Discovery III.PDF

146.4 MB

/Penetration Testing/

Coding for Penetration Testers.pdf

10.4 MB

Ethical Hacking and Penetration Testing Guide.pdf

23.5 MB

Metasploit - The Penetration Tester's Guide.pdf

7.3 MB

Packt.Penetration.Testing.with.the.Bash.shell.May.2014.pdf

3.6 MB

Penetration Testing (2014).pdf

12.8 MB

Penetration Testing With BackBox.pdf

3.7 MB

Professional Penetration Testing Creating and Operating a Formal Hacking Lab.pdf

9.3 MB

The Basics of Hacking and Penetration Testing.pdf

7.0 MB

/Pentesting Books/

No.Starch.Black.Hat.Python.Dec.2014.ISBN.1593275900.pdf

2.8 MB

No.Starch.Gray.Hat.Python.Aug.2009.ISBN.1593271921.pdf

3.7 MB

/Pentesting Books/PenTest/

33859.pdf

1.5 MB

Cisco.Press.Penetration.Testing.And.Network.Defense.Nov.2005.ISBN.1587052083.chm

15.3 MB

CRC.Press.Ethical.Hacking.And.Penetration.Testing.Guide.Aug.2014.ISBN.1482231611.pdf

23.5 MB

CreateSpace.Publishing.The.Hacker.Playbook.Mar.2014.ISBN.1494932636.pdf

27.4 MB

Linux Penetration Testing Laptop Setup v2.pdf

35.9 KB

Linux Penetration Testing Laptop Setup v4.pdf

88.3 KB

No.Starch.Penetration.Testing.Jun.2014.ISBN.1593275641.pdf

12.8 MB

Packt.Penetration.Testing.With.BackBox.Feb.2014.ISBN.1783282975.pdf

6.6 MB

Packt.Penetration.Testing.With.The.Bash.Shell.May.2014.ISBN.1849695105.pdf

3.6 MB

Penetration Testing Philipp Lachberger.pdf

317.1 KB

Penetration_Testing_Guidance_March_2015.pdf

1.1 MB

The Basics of Hacking and Penetration.pdf

3.9 MB

Wargames.pdf

302.1 KB

/.../Professional Penetration Testing 2E- Syngress 2013 [Epub]/

Professional Penetration Testing - Wilhelm, Thomas.epub

26.3 MB

Professional Penetration Testing Cover.jpg

191.9 KB

/.../The Basics of Web Hacking- Syngress 2013 [Epub]/

Basics of Web Hacking, The - Pauli, Josh.epub

3.7 MB

Basics of Web Hacking, The - Pauli, Josh.jpg

122.9 KB

Basics of Web Hacking, The - Pauli, Josh.opf

1.3 KB

/Programming/

Advanced Programming in the UNIX Envinronment, 2013.pdf

20.6 MB

Intel32-3-System Programming Guide.pdf

4.7 MB

Programming_from_the_Ground_Up.pdf

1.4 MB

Return-oriented Programming without Returns (on the x86).pdf

440.2 KB

The Linux Programming Interface.pdf

7.8 MB

/Python/

Black Hat Python, Python Programming for Hackers.pdf

3.2 MB

book_007.pdf

1.1 MB

byteofpython_120.pdf

240.4 KB

Head First Python.pdf

29.6 MB

No_Starch_Press_-_Gray_Hat_Python_-_Python_Programming_for_Hackers_and_Reverse_Engineers_[]_(2009)_en.pdf

3.2 MB

Packt.Python.Data.Visualization.Cookbook.Nov.2013.ISBN.1782163360.pdf

5.5 MB

Packt.Python.Penetration.Testing.Essentials.Feb.2015.ISBN.1784398586.pdf

3.3 MB

Python Cookbook 3rd Edition 2013.pdf

10.3 MB

Python Programming for the Absolute Beginner, 3rd Edition -nelly-.pdf

13.2 MB

python27.pdf

1.4 MB

thinkpython.pdf

835.2 KB

/.../Invent with Python/Comp Files/

AISim1.py

9.1 KB

AISim2.py

9.4 KB

AISim3.py

11.6 KB

animation.py

2.7 KB

background.mid

7.2 KB

baddie.png

0.4 KB

bagels.py

2.3 KB

buggy.py

0.3 KB

cherry.png

0.4 KB

cipher.py

1.4 KB

collisionDetection.py

4.0 KB

dodger.py

7.1 KB

dragon.py

1.2 KB

gameover.wav

258.9 KB

guess.py

0.9 KB

hangman.py

4.1 KB

hello.py

0.2 KB

hello2.py

0.2 KB

jokes.py

0.4 KB

pickup.wav

8.5 KB

player.png

0.9 KB

pygameHelloWorld.py

1.9 KB

pygameInput.py

3.6 KB

reversi.py

10.1 KB

sonar.py

7.3 KB

spritesAndSounds.py

4.3 KB

tictactoe.py

6.3 KB

/.../Invent with Python/

Invent with Python.pdf

4.8 MB

/.../Learn Python The Hard Way/

LearnPythonTheHardWay.epub

20.0 MB

LearnPythonTheHardWay.pdf

2.7 MB

/.../Learning Penetration Testing with Python/

C# Programming From Problem Analysis to Program Design, 3rd Edition.pdf

58.3 MB

JavaScript by Example, 2nd Edition.pdf

28.2 MB

Learning Penetration Testing wi - Christopher Duffy.pdf

9.6 MB

Learning Penetration Testing with Python.pdf

9.6 MB

/Python/Violent Python/Companion Files/CH1/

1-vulnScanner.py

1.3 KB

2-passwdCrack.py

0.8 KB

3-zipCrack.py

1.0 KB

dictionary.txt

0.1 KB

evil.zip

35.8 KB

passwords.txt

0.1 KB

vuln-banners.txt

0.4 KB

/Python/Violent Python/Companion Files/CH2/

1-portScan.py

1.7 KB

2-nmapScan.py

0.9 KB

3-botNet.py

1.1 KB

3-bruteKey.py

2.4 KB

3-pxsshCommand.py

0.4 KB

3-sshBrute.py

1.9 KB

3-sshCommand.py

1.1 KB

4-anonLogin.py

0.5 KB

4-bruteLogin.py

0.8 KB

4-defaultPages.py

0.6 KB

4-injectPage.py

0.6 KB

4-massCompromise.py

3.5 KB

5-conficker.py

3.2 KB

6-freeFloat.py

3.1 KB

pass.txt

0.0 KB

userpass.txt

0.1 KB

/Python/Violent Python/Companion Files/CH3/

1-discoverNetworks.py

2.4 KB

2-dumpRecycleBin.py

1.0 KB

3-pdfRead.py

0.8 KB

4-exifFetch.py

1.8 KB

5-skypeParse.py

3.1 KB

6-firefoxParse.py

3.7 KB

7-iphoneMessages.py

1.6 KB

firefox_profile.zip

32.4 KB

skype_profile.zip

10.7 KB

/Python/Violent Python/Companion Files/CH4/

1-geoIP.py

0.5 KB

10-idsFoil.py

2.3 KB

2-printDirection.py

0.5 KB

3-geoPrint.py

1.3 KB

4-googleEarthPcap.py

1.6 KB

5-findDDoS.py

2.9 KB

6-spoofDetect.py

1.4 KB

7-testFastFlux.py

0.7 KB

8-testDomainFlux.py

0.6 KB

9-mitnickAttack.py

2.0 KB

attack.pcap

10.0 MB

domainFlux.pcap

4.3 KB

download.pcap

1.0 KB

fastFlux.pcap

8.7 KB

geotest.kml

2.1 KB

geotest.pcap

0.7 KB

hivemind.pcap

0.5 KB

/Python/Violent Python/Companion Files/CH5/

1-testSniff.py

0.4 KB

10-iphoneFinder.py

0.9 KB

11-rfcommScan.py

0.4 KB

12-sdpScan.py

0.4 KB

13-ninjaPrint.py

0.3 KB

14-blueBug.py

0.4 KB

2-creditSniff.py

1.1 KB

3-hotelSniff.py

0.9 KB

4-googleSniff.py

1.1 KB

5-ftpSniff.py

1.0 KB

6-sniffHidden.py

0.8 KB

6-sniffProbe.py

0.4 KB

7-dup.py

1.4 KB

7-uavSniff.py

1.9 KB

8-fireCatcher.py

1.1 KB

9-btFind.py

0.5 KB

9-btScan.py

0.4 KB

dup.py

1.4 KB

/Python/Violent Python/Companion Files/CH6/

1-viewPage.py

0.2 KB

10-sendMail.py

0.8 KB

10-sendSpam.py

2.7 KB

2-proxyTest.py

0.3 KB

3-userAgentTest.py

0.4 KB

4-printCookies.py

0.3 KB

5-kittenTest.py

0.3 KB

6-linkParser.py

1.1 KB

7-imageMirror.py

1.3 KB

8-anonGoogle.py

1.3 KB

8-googleJson.py

0.4 KB

8-googleJumbled.py

0.3 KB

9-twitterClass.py

2.6 KB

9-twitterGeo.py

2.1 KB

9-twitterInterests.py

2.4 KB

9-twitterRecon.py

1.3 KB

anonBrowser.py

1.2 KB

anonBrowser.pyc

2.4 KB

mlb-cities.txt

0.3 KB

twitterClass.py

2.6 KB

/Python/Violent Python/Companion Files/CH7/

1-bindshell.py

1.6 KB

2-virusCheck.py

2.5 KB

/Python/Violent Python/

Violent Python - A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers.pdf

8.2 MB

/Reverse Engineering/

Practical Reverse Engineering - Bruce Dang.pdf

3.9 MB

Practical Reverse Engineering.pdf

5.5 MB

Reversing-Secrets of Reverse Engineering.pdf

8.8 MB

/Security/

Corporate Computer Security (3rd Edition).pdf

14.7 MB

Low Tech Hacking Street Smarts for Security Professionals.pdf

8.0 MB

/SEH Exploitation/

SEH Exploitation.pdf

388.9 KB

Understanding SEH Exploitation.pdf

1.2 MB

/Semantic web/

Academic.Press.Introduction.To.The.Semantic.Web.And.Semantic.Web.Services.Jun.2007.ISBN.1584889330.pdf

9.2 MB

IGI.Global.Semantic.Web.Services.Theory.Tools.And.Applications.Mar.2007.ISBN.159904045X.pdf

10.2 MB

IOS.Press.Ontology.And.The.Semantic.Web.Volume.156.Frontiers.In.Artificial.Intelligence.And.Applications.Apr.2007.ISBN.1586037293.pdf

2.0 MB

MIT.Press.A.Semantic.Web.Primer.2nd.Edition.Mar.2008.ISBN.0262012421.pdf

2.5 MB

OReilly.Programming.The.Semantic.Web.Jul.2009.ISBN.0596153813.pdf

6.5 MB

Springer.Agent.Based.Semantic.Web.Service.Composition.Aug.2012.ISBN.1461446627.pdf

3.3 MB

Springer.Modeling.Semantic.Web.Services.The.Web.Service.Modeling.Language.Jul.2008.ISBN.3540681698.pdf

4.6 MB

Springer.Ontology.Management.Semantic.Web.Semantic.Web.Services.And.Business.Applications.Dec.2007.ISBN.038769899X.pdf

3.9 MB

Springer.Sem.Apr.2013.ISBN.3642364020.pdf

13.0 MB

Springer.Semantic.Web.Concepts.Technologies.And.Applications.Jan.2007.ISBN.184628581X.pdf

4.6 MB

Wiley.Semantic.Web.And.Model.Driven.Engineering.Jun.2012.ISBN.1118004175.pdf

6.8 MB

/Shells/

the_shellcoders_handbook.pdf

9.2 MB

Wiley.The.Shellcoders.Handbook.2nd.Edition.Aug.2007.ISBN.047008023X.pdf

3.7 MB

/Smashing The Stack/

Smashing The Stack For Fun And Profit.pdf

182.4 KB

Smashing the stack in 2010.pdf

2.2 MB

/Social Engineering/

Hacking the Human.pdf

12.8 MB

The_Art_of_Human_Hacking.pdf

6.4 MB

Wiley.Social.Engineering.And.Nonverbal.Behavior.Set.Feb.2014.ISBN.1118906713.pdf

145.9 MB

Wiley.Social.Engineering.The.Art.Of.Human.Hacking.Dec.2010.ISBN.0470639539.pdf

6.4 MB

/Stealing The Network/

Stealing The Network - How To Own The Box.pdf

3.2 MB

Stealing the Network How to Own a Continent.pdf

2.5 MB

/Syngress/

-Mobile Malware Attacks And Defense-Syngress (2011).pdf

11.2 MB

Aditya Sood and Richard Enbody (Auth.)-Targeted Cyber Attacks. Multi-staged Attacks Driven by Exploits and Malware-Syngress (2014).pdf

5.8 MB

David Nathans-Designing and Building Security Operations Center-Syngress (2014).pdf

3.6 MB

Jason Andress, Ryan Linn-Coding for Penetration Testers_ Building Better Tools -Syngress (2011).pdf

10.4 MB

Jennifer Golbeck-Introduction to Social Media Investigation_ A Hands-on Approach-Syngress (2015).pdf

62.2 MB

Johnny Long, Bill Gardner, Justin Brown-Google Hacking for Penetration Testers-Syngress (2015).pdf

38.5 MB

Syngress Publishing - Phishing Exposed.pdf

8.7 MB

Syngress.Advanced.Persistent.Threat.Nov.2012.ISBN.1597499498.pdf

7.5 MB

Syngress.Basics.2nd.Edition.Aug.2013.ISBN.0124116442.pdf

4.7 MB

Syngress.Black.Oct.2004.ISBN.193226681X.pdf

74.8 MB

Syngress.Hacking.And.Penetration.Testing.With.Low.Power.Devices.Sep.2014.ISBN.0128007516.pdf

8.7 MB

Syngress.Hacking.Web.Apps.Sep.2012.ISBN.159749951X.pdf

23.0 MB

Syngress.Malware.Forensics.Field.Guide.For.Linux.Systems.Jan.2014.ISBN.1597494704.pdf

41.4 MB

Syngress.Malware.Forensics.Investigating.And.Analyzing.Malicious.Code.Jun.2008.ISBN.159749268X.pdf

26.2 MB

Syngress.Ninja.Hacking.Unconventional.Penetration.Testing.Tactics.And.Techniques.Sep.2010.ISBN.1597495883.pdf

10.3 MB

Syngress.SQL.Injection.Attacks.And.Defense.2nd.Edition.Jul.2012.ISBN.1597499633.pdf

6.7 MB

Syngress.The.Basics.Of.Digital.Forensics.Mar.2012.ISBN.1597496618.pdf

7.0 MB

Syngress.The.Basics.Of.Digital.Privacy.May.2013.ISBN.0128000112.pdf

8.6 MB

Syngress.The.Basics.of.Web.Hacking.Tools.and.Techniques.to.Attack.the.Web.0124166008.pdf

4.9 MB

Syngress.Violent.Python.a.Cookbook.for.Hackers.2013.pdf

8.2 MB

Syngress.Web.Application.Vulnerabilities.Detect.Exploit.Prevent.Dec.2007.ISBN.1597492094.pdf

21.9 MB

Syngress.XSS.May.2007.ISBN.1597491543.pdf

60.3 MB

Syngress.Zero.Day.Exploit.Countdown.To.Darkness.Aug.2004.ISBN.1931836094.pdf

3.9 MB

Will Gragido, John Pirc-Cybercrime and Espionage_ An Analysis of Subversive Multi-Vector Threats-Syngress (2011).pdf

15.0 MB

/The Art Of Exploitation/

Hacking - The Art of Exploitation_2nd Ed.pdf

4.6 MB

Hacking_ The Art of Exploitation - 0x3 (Exploitation).pdf

209.4 KB

/Web/

32373.pdf

1.8 MB

33253.pdf

453.0 KB

33931.pdf

847.2 KB

Botnets The Killer Web App.pdf

7.3 MB

how-to-instrument-for-advanced-web-application-penetration-testing.pdf

981.4 KB

JavascriptMalwareEncoding.pdf

60.3 KB

Kali Linux Cookbook.pdf

10.9 MB

Learning PHP, MySQL, JavaScript, CSS & HTML5, 3rd Edition.pdf

21.6 MB

McGrawHill.Web.Application.Security.A.Beginners.Guide.pdf

63.9 MB

Nmap Cookbook The Fat-free Guide to Network Scanning.pdf

6.6 MB

No.Starch.The.Tangled.Web.Nov.2011.ISBN.1593273886.pdf

4.2 MB

Packt.Dreamweaver.CS6.Mobile.And.Web.Development.With.HTML5.CSS3.And.JQuery.Mobile.May.2013.ISBN.1849694745.pdf

9.7 MB

pfSense 2 Cookbook (2011).pdf

12.3 MB

SQL Injection Attacks and Defense - Justin Clarke.2ed.pdf

9.0 MB

Web Penetration Testing with Kali Linux.pdf

21.0 MB

XSS Attacks - Exploits and Defense.pdf

7.7 MB

XSS Attacks.pdf

7.7 MB

/Web/CMS/

HackWebApps.pdf

15.4 MB

Packtpub.WordPress.3.Ultimate.Security.Jun.2011.pdf

8.7 MB

The Web Application Hackers Handbook.pdf

14.2 MB

Wiley - Cracking Drupal, A Drop in the Bucket (2009).pdf

4.7 MB

Wiley_-_CMS_Security_Handbook_[]_(2011)_en.PDF

8.8 MB

/Web/Database/

SQL Injection Attacks and Defense.pdf

6.7 MB

The Database Hacker's Handbook.pdf

2.1 MB

/Web/Game Dev/

Addison.Wesley.Learning.Android.Game.Programming.Dec.2011.ISBN.0321769627.pdf

11.5 MB

Addison.Wesley.Learning.HTML5.Game.Programming.A.Handson.Guide.To.Building.Online.Games.Using.Canvas.SVG.And.WebGL.Oct.2011.ISBN.0321767365.pdf

5.2 MB

Apress.Beginning.Android.Web.Apps.Development.May.2012.ISBN.1430239573.pdf

36.2 MB

Apress.Beginning.Facebook.Game.Apps.Development.Mar.2012.ISBN.1430241705.pdf

40.6 MB

Apress.Beginning.HTML5.Games.With.CreateJS.Mar.2014.ISBN.1430263407.pdf

8.9 MB

Apress.Beginning.PhoneGap.Mobile.Web.Framework.For.JavaScript.And.HTML5.Feb.2012.ISBN.1430239034.pdf

28.3 MB

Apress.Building.JavaScript.Games.Sep.2014.ISBN.1430265388.pdf

7.2 MB

Apress.Enchant.JS.May.2013.ISBN.1430247436.pdf

7.2 MB

Apress.HTML5.Games.Most.Wanted.Build.The.Best.HTML5.Games.Apr.2012.ISBN.1430239786.pdf

26.1 MB

Apress.Metro.Revealed.Building.Windows.8.Apps.With.HTML5.And.JavaScript.Jun.2012.ISBN.1430244887.pdf

1.5 MB

Apress.Pro.Android.Web.Apps.Develop.For.Android.Using.HTML5.CSS3.And.JavaScript.Feb.2011.ISBN.1430232765.pdf

14.1 MB

Apress.Pro.Windows.8.Development.With.HTML5.And.JavaScript.Nov.2012.ISBN.1430244011.pdf

52.9 MB

OReilly.Introducing.HTML5.Game.Development.Feb.2012.ISBN.1449315178.pdf

6.9 MB

Packt.Game.Development.With.Three.JS.Oct.2013.ISBN.1782168532.pdf

1.8 MB

Packt.HTML5.Game.Development.With.GameMaker.Apr.2013.ISBN.1849694109(1).pdf

9.0 MB

Packt.HTML5.Game.Development.With.ImpactJS.Mar.2013.ISBN.1849694567.pdf

5.4 MB

Wiley.HTML5.Games.Creating.Fun.With.HTML5.CSS3.And.WebGL.Dec.2011.ISBN.1119975085.pdf

11.5 MB

/Web/PHP/

Apress.PHP.Dec.2010.ISBN.1430233184.pdf

5.0 MB

OReilly.PHP.Cookbook.3rd.Edition.Jul.2014.ISBN.144936375X.pdf

12.6 MB

OReilly.PHP.Web.Services.May.2013.ISBN.1449356567.pdf

10.7 MB

Packt.PHP.Oracle.Web.Development.Data.Processing.Security.Caching.XML.Web.Services.And.AJAX.Jul.2007.ISBN.1847193633.pdf

7.4 MB

Packt.Restfull.Oct.2008.ISBN.1847195520.pdf

13.3 MB

/.../The Web Application Hacker's Handbook -Finding and Exploiting Security Flaws V413HAV/

The Web Application Hacker's Handbook -Finding and Exploiting Security Flaws V413HAV.pdf

14.2 MB

/.../Windows Server 2012 Inside Out V413HAV/

Read Me.txt

0.7 KB

Windows Server 2012 Inside Out V413HAV.epub

21.4 MB

Windows Server 2012 Inside Out V413HAV.pdf

34.8 MB

/Windows/

Advanced Windows Exploitation.pdf

348.6 KB

Advanced_Windows_Debugging.pdf

9.9 MB

Attacking the Windows Kernel.pdf

300.7 KB

Generic Anti Exploitation Technology for Windows.pdf

1.5 MB

Mark Russinovich - Zero Day.pdf

736.5 KB

Practical Windows XP-2003 Heap Exploitation BH09.pdf

826.3 KB

/Windows/Windows Internals/

WindowsInternals_5ED.pdf

19.7 MB

WindowsInternals_6thED_part1.pdf

26.2 MB

WindowsInternals_6thED_part2.pdf

22.7 MB

/Wireless/

Addison.Wesley.Real.802.Dot.11.Security.WiFi.Protected.Access.And.802.Dot.11.I.Jul.2003.ISBN.0321136209.chm

3.1 MB

Addison.Wesley.WiFoo.The.Secrets.Of.Wireless.Hacking.Jul.2004.ISBN.0321202171.chm

7.1 MB

Cisco.Press.WiFi.Hotspots.Setting.Up.Public.Wireless.Internet.Access.Oct.2006.ISBN.1587052660.chm

9.1 MB

McGraw.Hill.Hacking.Exposed.Wireless.2nd.Edition.Aug.2010.ISBN.0071666613.pdf

11.6 MB

Newnes.Bulletproof.Wireless.Security.Jun.2005.ISBN.0750677465.pdf

3.5 MB

OReilly.802.Dot.11.Security.Dec.2002.ISBN.0596002904.pdf

933.9 KB

 

Total files 911


Copyright © 2025 FileMood.com