FileMood

Download Cybersec

Cybersec

Name

Cybersec

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

4.7 GB

Total Files

807

Hash

467E9D52E444C226A61410FF6087BFEFBE909370

/Violent Python/Companion Files/CH2/

pass.txt

0.0 KB

userpass.txt

0.1 KB

3-pxsshCommand.py

0.4 KB

4-anonLogin.py

0.5 KB

4-injectPage.py

0.6 KB

4-defaultPages.py

0.6 KB

4-bruteLogin.py

0.8 KB

2-nmapScan.py

0.9 KB

3-sshCommand.py

1.1 KB

3-botNet.py

1.1 KB

1-portScan.py

1.7 KB

3-sshBrute.py

1.9 KB

3-bruteKey.py

2.4 KB

6-freeFloat.py

3.1 KB

5-conficker.py

3.2 KB

4-massCompromise.py

3.5 KB

/.../comment-iframe_data/

blank.gif

0.0 KB

close.gif

0.3 KB

4079081201-cmtfp.css

16.6 KB

/Violent Python/Companion Files/CH6/.svn/prop-base/

web_common.pyc.svn-base

0.1 KB

violent_person.pyc.svn-base

0.1 KB

twitter.pyc.svn-base

0.1 KB

violent_browser.pyc.svn-base

0.1 KB

violent_email.pyc.svn-base

0.1 KB

/Violent Python/Companion Files/CH1/

dictionary.txt

0.1 KB

passwords.txt

0.1 KB

vuln-banners.txt

0.4 KB

2-passwdCrack.py

0.8 KB

3-zipCrack.py

1.0 KB

1-vulnScanner.py

1.3 KB

evil.zip

35.8 KB

/.../An7i Security_files/

authorization.css

0.1 KB

arrow_dropdown.gif

0.1 KB

icon18_edit_allbkg.gif

0.2 KB

css.css

0.3 KB

icon18_wrench_allbkg.png

0.5 KB

icon_feed12.png

0.5 KB

postmessageRelay.html

0.6 KB

subscribe-yahoo.png

0.6 KB

b36-rounded.png

0.8 KB

openid36-rounded.png

1.3 KB

422439_10150655860234757_828564756_8927229_56595808_n.jpg

1.4 KB

subscribe-netvibes.png

1.4 KB

photo_003.jpg

1.5 KB

photo_004.jpg

1.6 KB

a.jpeg

1.6 KB

anon36.png

1.7 KB

Avatar.jpeg

1.8 KB

photo_002.jpg

1.8 KB

photo.jpg

1.8 KB

shThemeDefault.css

2.9 KB

shCore.css

6.2 KB

cbgapi.loaded_2

7.9 KB

comment-iframe.html

8.2 KB

cbgapi.loaded_1

37.1 KB

fastbutton.html

39.0 KB

4205868711-css_bundle_v2.css

43.0 KB

cbgapi.loaded_0

171.2 KB

/.../Invent with Python/Comp Files/

hello.py

0.2 KB

hello2.py

0.2 KB

buggy.py

0.3 KB

jokes.py

0.4 KB

cherry.png

0.4 KB

baddie.png

0.4 KB

guess.py

0.9 KB

player.png

0.9 KB

dragon.py

1.2 KB

cipher.py

1.4 KB

pygameHelloWorld.py

1.9 KB

bagels.py

2.3 KB

animation.py

2.7 KB

pygameInput.py

3.6 KB

collisionDetection.py

4.0 KB

hangman.py

4.1 KB

spritesAndSounds.py

4.3 KB

tictactoe.py

6.3 KB

dodger.py

7.1 KB

background.mid

7.2 KB

sonar.py

7.3 KB

pickup.wav

8.5 KB

AISim1.py

9.1 KB

AISim2.py

9.4 KB

reversi.py

10.1 KB

AISim3.py

11.6 KB

gameover.wav

258.9 KB

/Violent Python/Companion Files/CH6/

1-viewPage.py

0.2 KB

mlb-cities.txt

0.3 KB

4-printCookies.py

0.3 KB

.pydevproject

0.3 KB

5-kittenTest.py

0.3 KB

8-googleJumbled.py

0.3 KB

2-proxyTest.py

0.3 KB

.project

0.4 KB

8-googleJson.py

0.4 KB

3-userAgentTest.py

0.4 KB

10-sendMail.py

0.8 KB

6-linkParser.py

1.1 KB

anonBrowser.py

1.2 KB

8-anonGoogle.py

1.3 KB

9-twitterRecon.py

1.3 KB

7-imageMirror.py

1.3 KB

9-twitterGeo.py

2.1 KB

anonBrowser.pyc

2.4 KB

9-twitterInterests.py

2.4 KB

9-twitterClass.py

2.6 KB

twitterClass.py

2.6 KB

10-sendSpam.py

2.7 KB

/Violent Python/Companion Files/CH6/.svn/text-base/

test.py.svn-base

0.2 KB

.pydevproject.svn-base

0.3 KB

basic_usage.py.svn-base

0.3 KB

parse_webpage.py.svn-base

0.4 KB

.project.svn-base

0.4 KB

violent_email.py.svn-base

0.7 KB

twitter_locate.py.svn-base

0.7 KB

create_browser.py.svn-base

0.8 KB

google.py.svn-base

0.9 KB

twitter.pyc.svn-base

1.0 KB

twitter.py.svn-base

1.0 KB

violent_email.pyc.svn-base

1.2 KB

twitter_interests.py.svn-base

1.2 KB

web_common.pyc.svn-base

1.3 KB

web_common.py.svn-base

1.3 KB

violent_browser.py.svn-base

1.6 KB

quarkbase.py.svn-base

1.8 KB

facebook.py.svn-base

1.8 KB

phishing.py.svn-base

2.3 KB

violent_browser.pyc.svn-base

2.4 KB

simple_scrape.py.svn-base

2.9 KB

violent_person.pyc.svn-base

3.9 KB

violent_person.py.svn-base

3.9 KB

anon_scrape.py.svn-base

4.4 KB

temp.html.svn-base

19.7 KB

/Violent Python/Companion Files/CH5/

13-ninjaPrint.py

0.3 KB

12-sdpScan.py

0.4 KB

6-sniffProbe.py

0.4 KB

14-blueBug.py

0.4 KB

9-btScan.py

0.4 KB

11-rfcommScan.py

0.4 KB

1-testSniff.py

0.4 KB

9-btFind.py

0.5 KB

6-sniffHidden.py

0.8 KB

10-iphoneFinder.py

0.9 KB

3-hotelSniff.py

0.9 KB

5-ftpSniff.py

1.0 KB

2-creditSniff.py

1.1 KB

4-googleSniff.py

1.1 KB

8-fireCatcher.py

1.1 KB

7-dup.py

1.4 KB

dup.py

1.4 KB

7-uavSniff.py

1.9 KB

/Violent Python/Companion Files/CH4/

hivemind.pcap

0.5 KB

2-printDirection.py

0.5 KB

1-geoIP.py

0.5 KB

8-testDomainFlux.py

0.6 KB

geotest.pcap

0.7 KB

7-testFastFlux.py

0.7 KB

download.pcap

1.0 KB

3-geoPrint.py

1.3 KB

6-spoofDetect.py

1.4 KB

4-googleEarthPcap.py

1.6 KB

9-mitnickAttack.py

2.0 KB

geotest.kml

2.1 KB

10-idsFoil.py

2.3 KB

5-findDDoS.py

2.9 KB

domainFlux.pcap

4.3 KB

fastFlux.pcap

8.7 KB

attack.pcap

10.0 MB

/.../Windows Server 2012 Inside Out V413HAV/

Read Me.txt

0.7 KB

Windows Server 2012 Inside Out V413HAV.epub

21.4 MB

Windows Server 2012 Inside Out V413HAV.pdf

34.8 MB

/.../Vulnerability analysis, Security Papers, Exploit Tutorials - Part 32480_files/

css_002.css

0.7 KB

css.css

1.5 KB

motioncss-responsive.css

2.1 KB

exploit.css

5.0 KB

magnific-popup.css

9.2 KB

responsive.css

10.9 KB

codecolorer.css

11.4 KB

fotorama.css

15.1 KB

edb-2015-theme-logo641.png

19.9 KB

Defaults.css

22.4 KB

font-awesome.css

30.5 KB

us_impreza_custom_styles.css

34.8 KB

motioncss.css

43.3 KB

settings.css

55.2 KB

wbt.css

181.5 KB

style.css

184.6 KB

ultimate.css

471.3 KB

/Violent Python/Companion Files/CH3/

3-pdfRead.py

0.8 KB

2-dumpRecycleBin.py

1.0 KB

7-iphoneMessages.py

1.6 KB

4-exifFetch.py

1.8 KB

1-discoverNetworks.py

2.4 KB

5-skypeParse.py

3.1 KB

6-firefoxParse.py

3.7 KB

skype_profile.zip

10.7 KB

firefox_profile.zip

32.4 KB

/.../An7i Security_files/fastbutton_data/

photo.jpg

0.8 KB

/.../1. Instant Metasploit Starter/

Instant Metasploit Starter - Ranganath, Karthik.opf

1.2 KB

Instant Metasploit Starter - Ranganath, Karthik.jpg

34.1 KB

Instant Metasploit Starter - Ranganath, Karthik.epub

8.4 MB

/.../The Basics of Web Hacking- Syngress 2013 [Epub]/

Basics of Web Hacking, The - Pauli, Josh.opf

1.3 KB

Basics of Web Hacking, The - Pauli, Josh.jpg

122.9 KB

Basics of Web Hacking, The - Pauli, Josh.epub

3.7 MB

/.../2. Learning Metasploit Exploitation and Development/

Learning Metasploit Exploitation and Development - Balapure, Aditya.opf

1.3 KB

Learning Metasploit Exploitation and Development - Balapure, Aditya.jpg

39.8 KB

Learning Metasploit Exploitation and Development - Balapure, Aditya.epub

26.0 MB

/Violent Python/Companion Files/CH7/

1-bindshell.py

1.6 KB

2-virusCheck.py

2.5 KB

/Violent Python/Companion Files/CH6/.svn/

entries

3.9 KB

/Malwares/vectors/

Vulnerability analysis, Security Papers, Exploit Tutorials - Part 32480.html

21.8 KB

An7i Security.html

870.7 KB

/Pentesting Books/PenTest/

Linux Penetration Testing Laptop Setup v2.pdf

35.9 KB

Linux Penetration Testing Laptop Setup v4.pdf

88.3 KB

Wargames.pdf

302.1 KB

Penetration Testing Philipp Lachberger.pdf

317.1 KB

Penetration_Testing_Guidance_March_2015.pdf

1.1 MB

33859.pdf

1.5 MB

Packt.Penetration.Testing.With.The.Bash.Shell.May.2014.ISBN.1849695105.pdf

3.6 MB

The Basics of Hacking and Penetration.pdf

3.9 MB

Syngress.Basics.2nd.Edition.Aug.2013.ISBN.0124116442.pdf

4.7 MB

Packt.Penetration.Testing.With.BackBox.Feb.2014.ISBN.1783282975.pdf

6.6 MB

Syngress.Hacking.And.Penetration.Testing.With.Low.Power.Devices.Sep.2014.ISBN.0128007516.pdf

8.7 MB

Syngress.Ninja.Hacking.Unconventional.Penetration.Testing.Tactics.And.Techniques.Sep.2010.ISBN.1597495883.pdf

10.3 MB

No.Starch.Penetration.Testing.Jun.2014.ISBN.1593275641.pdf

12.8 MB

Cisco.Press.Penetration.Testing.And.Network.Defense.Nov.2005.ISBN.1587052083.chm

15.3 MB

CRC.Press.Ethical.Hacking.And.Penetration.Testing.Guide.Aug.2014.ISBN.1482231611.pdf

23.5 MB

CreateSpace.Publishing.The.Hacker.Playbook.Mar.2014.ISBN.1494932636.pdf

27.4 MB

/APT/

advance-penetration-testing-kali-linux-training.pdf

36.1 KB

2014-apt-study.pdf

169.5 KB

esg-apts-deep-discovery-whitepaper-en.pdf

494.0 KB

CybraryAdvancedPenSlides.pdf

2.4 MB

b-advanced_persistent_threats_WP_21215957.en-us.pdf

3.1 MB

Syngress.Advanced.Persistent.Threat.Nov.2012.ISBN.1597499498.pdf

7.5 MB

Advanced Persistent Threat Hacking, The Art & Science...pdf

11.1 MB

Will Gragido, John Pirc-Cybercrime and Espionage_ An Analysis of Subversive Multi-Vector Threats-Syngress (2011).pdf

15.0 MB

Advanced Penetration Testing for Highly Secured Environments.pdf

16.6 MB

/AAA_smistare/

15344.pdf

53.3 KB

advanced-persistent-threat-id52631.pdf

83.8 KB

2014-apt-study.pdf

169.5 KB

FirstStrike_Plus.pdf

175.3 KB

analisi_tecnica_rsi_relative_strentgh_index_significato_formula_intepretazione_tempi_ed_esempi.pdf

408.5 KB

Loraine Blaxter, Christina Hughes, Malcolm Tight-How to Research, 4th Edition -Open University Press (2010).pdf

1.3 MB

Jacob Perkins-Python 3 Text Processing with NLTK 3 Cookbook-Packt Publishing - ebooks Account (2014).pdf

1.7 MB

Drew Conway, John Myles White-Machine Learning for Hackers-O'Reilly Media (2012).pdf

1.8 MB

Paulino Calderon Pale-Mastering Nmap Scripting Engine-Packt Publishing (2015).pdf

2.0 MB

wireless_hacking_presentation.pdf

2.3 MB

Lutz M.-Python pocket reference-O'Reilly (2014).pdf

2.5 MB

Toby Segaran-Programming Collective Intelligence_ Building Smart Web 2.0 Applications-O'Reilly Media (2007).pdf

3.5 MB

David Nathans-Designing and Building Security Operations Center-Syngress (2014).pdf

3.6 MB

Douglas Berdeaux-Penetration Testing with Perl-Packt Publishing - ebooks Account (2015).pdf

4.6 MB

Sam Newman-Building Microservices-O'Reilly Media (2015).pdf

5.0 MB

Yuxing Yan-Python for Finance-Packt Publishing - ebooks Account (2014).pdf

5.1 MB

Steven Bird, Ewan Klein, Edward Loper-Natural Language Processing with Python-O'Reilly Media (2009).pdf

5.4 MB

Richard Lawson-Web Scraping with Python-Packt Publishing (2015).pdf

5.5 MB

Bachaalany, Elias_ Koret, Joxean-The Antivirus Hacker's Handbook-Wiley (2015).pdf

5.9 MB

Ryan Mitchell-Web Scraping with Python_ Collecting Data from the Modern Web-O'Reilly Media (2015).pdf

6.4 MB

The_Art_of_Human_Hacking.pdf

6.4 MB

Luis Pedro Coelho, Willi Richert-Building Machine Learning Systems with Python-Packt Publishing (2015).pdf

6.8 MB

Ivan Ristic-Bulletproof SSL and TLS_ Understanding and Deploying SSL_TLS and PKI to Secure Servers and Web Applications-Feisty Duck (2014).pdf

7.1 MB

Micha Gorelick, Ian Ozsvald-High Performance Python_ Practical Performant Programming for Humans-O'Reilly Media (2014).pdf

8.0 MB

(Information science and statistics) Christopher M. Bishop-Pattern Recognition and Machine Learning-Springer (2006).pdf

8.5 MB

Jay Jacobs, Bob Rudis-Data-Driven Security_ Analysis, Visualization and Dashboards-Wiley (2014).pdf

8.6 MB

Aamir Lakhani, Joseph Muniz-Penetration Testing with Raspberry Pi-Packt Publishing (2015).pdf

10.2 MB

Jason Andress, Ryan Linn-Coding for Penetration Testers_ Building Better Tools -Syngress (2011).pdf

10.4 MB

Ben Clark-Rtfm_ Red Team Field Manual-CreateSpace Independent Publishing Platform (2014).pdf

10.7 MB

Yves Hilpisch-Python for Finance_ Analyze Big Financial Data-O'Reilly Media (2014).pdf

11.0 MB

Tyler Wrightson-Advanced Persistent Threat Hacking_ The Art and Science of Hacking Any Organization-McGraw-Hill (2015).pdf

11.1 MB

Bastian Ballmann-Understanding Network Hacks_ Attack and Defense with Python-Springer (2015).pdf

11.4 MB

Allen Downey B.-Think Bayes-O'Reilly Media (2013).pdf

12.3 MB

Aaron Johns-Mastering Wireless Penetration Testing for Highly-Secured Environments-Packt Publishing (2015).pdf

12.9 MB

Michael Collins-Network Security Through Data Analysis_ Building Situational Awareness-O'Reilly Media (2014).pdf

14.1 MB

Wes McKinney-Python for Data Analysis-O'Reilly Media (2012).pdf

14.8 MB

J.J. MURPHY-ANALISI TECNICA DEI MERCATI FINANZIARI.pdf

16.2 MB

Jeremy Faircloth-Penetration Tester's Open Source Toolkit, Third Edition -Elsevier Science (2011).pdf

17.8 MB

Matthew A. Russell-Mining the social web_ data mining Facebook, Twitter, LinkedIn, Google+, GitHub, and more-O'Reilly Media (2013).pdf

22.1 MB

Qing Li, Gregory Clark-Security Intelligence_ A Practitioner's Guide to Solving Enterprise Security Challenges-Wiley (2015).pdf

22.6 MB

Johnny Long, Bill Gardner, Justin Brown-Google Hacking for Penetration Testers-Syngress (2015).pdf

38.5 MB

Chris Sanders and Jason Smith (Auth.)-Applied Network Security Monitoring. Collection, Detection, and Analysis (2014).pdf

39.2 MB

Jennifer Golbeck-Introduction to Social Media Investigation_ A Hands-on Approach-Syngress (2015).pdf

62.2 MB

/Antiviruses/

IJOPCM(vol.1.2.3.S.08).pdf

86.5 KB

security-guide-how-to-evade-anti-virus-detection.pdf

172.0 KB

An Automated Online Packing Service for Optimal Antivirus Evasion.pdf

175.6 KB

rp-nss-labs-corporate-exploit-evasion-defenses.pdf

189.6 KB

AV-Sandbox-Presentation_v2.0.pdf

257.8 KB

2012_EPP_CAR_Consumer_Exploit_Evasion_Defenses_0.pdf

275.5 KB

Practical Anti-virus Evasion - avevasion_pentestmag.pdf

362.2 KB

us-15-Xenakis-ROPInjector-Using-Return-Oriented-Programming-For-Polymorphism-And-Antivirus-Evasion.pdf

383.5 KB

AV_Evasion.pdf

443.4 KB

Testing antivirus engines to determine theireffectiveness as a security layer.pdf

570.7 KB

Evading Antivirus Metasploit Webcast.pdf

628.9 KB

Antivirus , Firewall evasion techiniques.pdf

633.7 KB

Ryan Linn - Getting Shells When Metasploit Fails - Sector 2012.pdf

673.5 KB

us-15-Xenakis-ROPInjector-Using-Return-Oriented-Programming-For-Polymorphism-And-Antivirus-Evasion-wp.pdf

724.3 KB

The State of the Veil Framework - Will Schroeder and Chris Truncer.pdf

744.6 KB

avevasion-techniques.pdf

771.2 KB

MalWareBytes_sSecurity_IO#113914_Eguide_031714_LI#839558.pdf

775.3 KB

why_malware_works_in_face_of_antivirus_software.pdf

793.8 KB

BypassAVDynamics.pdf

1.0 MB

34591.pdf

1.1 MB

bypassing-av.pdf

1.1 MB

WP_SerialVariantEvasionTactics.pdf

1.2 MB

Why_Antivirus_Fails_-_Daniel_Sauder.pdf

1.3 MB

evasive_threats.pdf

1.3 MB

woot09-polypack-pres.pdf

1.9 MB

Fighting_Advanced_Threats.pdf

2.1 MB

The Deathof AV DefenseinDepth _- revisiting Anti-Virus Software.pdf

2.4 MB

us-14-Mesbahi-One-Packer-To-Rule-Them-All-WP.pdf

2.5 MB

Writing Zero Days for Security - APT Penetration Testing Framework v1.0.pdf

3.7 MB

/CEH/CEH 7&8/

CEHV8 - Module 00 - Labs Countermeasures.pdf

101.5 KB

CEHV8 - Module 18 - Labs Buffer Overflow.pdf

466.7 KB

CEHV8 - Module 10 - Labs Denial of Service.pdf

523.9 KB

CEHV8 - Module 11 - Labs Session Hijacking.pdf

684.0 KB

CEHV8 - Module 13 - Labs Hacking Web Applications.pdf

907.4 KB

CEHV8 - Module 09 - Labs Social Engineering.pdf

1.2 MB

CEHV8 - Hacker Halted.pdf

1.2 MB

CEHV8 - Module 15 - Labs Hacking Wireless Networks.pdf

1.3 MB

CEHV8 - Module 12 - Labs Hacking Webservers.pdf

1.3 MB

CEHV8 - Module 04 - Labs Enumeration.pdf

1.5 MB

CEHV8 - Module 14 - Labs SQL Injection.pdf

1.6 MB

CEHV8 - Module 19 - Labs Cryptography.pdf

1.9 MB

Frankenstein Slides.pdf

2.0 MB

CEHV8 - Module 17 - Labs Evading IDS, Firewalls and Honeypots.pdf

2.4 MB

CEHV8 - Module 07 - Labs Viruses and Worms.pdf

2.5 MB

CEHV8 - References.pdf

2.9 MB

Cybercriminalité, Enquète sur les mafias qui envahissent le web.pdf

3.4 MB

CEHV8 - Module 02 - Labs Footprinting and Reconnaissance.pdf

3.6 MB

CEHV8 - Module 04 - Enumeration.pdf

4.0 MB

CEHV8 - Module 01 - Introduction to Ethical Hacking.pdf

4.1 MB

CEHV8 - Module 18 - Buffer Overflow.pdf

4.2 MB

CEHV8 - Module 19 - Cryptography.pdf

4.2 MB

CEHV8 - Module 08 - Labs Sniffers.pdf

4.4 MB

CEHV8 - Module 06 - Labs Trojans and Backdoors.pdf

4.4 MB

CEHV8 - Module 11 - Session Hijacking.pdf

4.5 MB

CEHV8 - Module 20 - Penetration Testing.pdf

4.6 MB

CEHV8 - Module 05 - Labs System Hacking.pdf

4.8 MB

CEHV8 - Module 10 - Denial of Service.pdf

5.1 MB

CEHV8 - Module 07 - Viruses and Worms.pdf

5.1 MB

CEHV7 - Module 01 - Introduction to Ethical Hacking.pdf

5.2 MB

CEHV8 - Module 09 - Social Engineering.pdf

5.4 MB

CEHV8 - Module 12 - Hacking Webservers.pdf

6.0 MB

CEHV8 - Module 03 - Labs Scanning Networks.pdf

6.8 MB

CEHV8 - Module 17 - Evading IDS, Firewalls, and Honeypots.pdf

6.8 MB

CEHV7- Certified Ethical Hacker Study Guide.pdf

7.0 MB

CEHV7 - Module 04 - Enumeration.pdf

7.0 MB

CEHV8 - Module 14 - SQL Injection.pdf

7.2 MB

CEHV8 - Module 16 - Hacking Mobile Platforms.pdf

7.3 MB

CEHV7 - Module 18 - Cryptography.pdf

7.4 MB

CEHV7 - Module 11 - Session Hijacking.pdf

7.9 MB

CEHV8 - Module 02 - Footprinting and Reconnaissance.pdf

8.2 MB

CEHV8 - Module 08 - Sniffing.pdf

8.4 MB

CEHV7 - Module 17 - Buffer Overflow.pdf

8.7 MB

CEHV8 - Module 03 - Scanning Networks.pdf

8.7 MB

CEHV7 - Module 02 - Footprinting and Reconnaissance.pdf

8.9 MB

CEHV8 - Module 06 - Trojans and Backdoors.pdf

9.1 MB

CEHV7 - Module 10 - Denial of Service.pdf

10.0 MB

CEHV7 - Module 19 - Penetration Testing.pdf

10.9 MB

CEHV7 - Module 09 - Social Engineering.pdf

11.1 MB

CEHV7 - Module 07 - Viruses and Worms.pdf

12.0 MB

CEHV7 - Module 12 - Hacking Webservers.pdf

12.3 MB

CEHV8 - Module 13 - Hacking Web Applications .pdf

12.5 MB

CEHV8 - Module 15 - Hacking Wireless Networks.pdf

12.7 MB

CEHV7 - Module 08 - Sniffers.pdf

13.8 MB

Techniques virales avancées [292 pages].pdf

14.7 MB

CEHV8 - Module 05 - System Hacking .pdf

14.7 MB

CEHV7 - Module 06 - Trojans and Backdoors.pdf

15.2 MB

CEHV7 - Module 14 - SQL Injection.pdf

15.4 MB

CEHV7 - Module 03 - Scanning Networks.pdf

16.7 MB

CEHV7 - Module 16 - Evading IDS, Firewalls, and Honeypots.pdf

17.2 MB

Les virus informatiques théorie, pratique et applications [584 pages].pdf

20.5 MB

CEHV7 - Module 05 - System Hacking.pdf

23.9 MB

CEHV7 - Module 13 - Hacking Web Applications.pdf

24.7 MB

CEHV7 - Module 15 - Hacking Wireless Networks.pdf

25.0 MB

/Malwares/mem injection/

fatkit_dll_rc3.pdf

101.9 KB

HS-P005_ReflectiveDllInjection.pdf

165.9 KB

lumension_reflective-memory-injection.pdf

404.5 KB

DEFCON-20-King-Reflective-Injection-Detection.pdf

447.7 KB

/Cryptography/

Syndrome Decoding in the Non-Standard Cases.pdf

109.7 KB

A cryptographic file system for unix.pdf

112.3 KB

Attacking NTLM with Precomputed_Hashtables.pdf

122.2 KB

On The Limits of Steganography.pdf

159.5 KB

Improved Collision Attack on MD5.pdf

163.9 KB

DETECTING HIDDEN MESSAGES USING HIGHER-ORDER STATISTICAL MODELS.pdf

171.3 KB

How to Break MD5 and Other Hash Functions.pdf

188.9 KB

Serpent_ A Proposal for the_Advanced Encryption Standard.pdf

194.8 KB

Attacking Unbalanced RSA-CRT Using SPA.pdf

239.1 KB

Weakness in the key scheduling algorithm of RC4.pdf

289.6 KB

Malicious Cryptology and Mathematics 29700.pdf

293.1 KB

Improved Collision Attack on Hash Function MD5.pdf

321.9 KB

MD5.pdf

421.8 KB

DES.pdf

443.4 KB

Defeating_Encryption.pdf

502.8 KB

Detecting Hidden Messages Using Higher-Order_Statistics and Support Vector Machines.pdf

506.5 KB

MONOALPHABETIC UNILATERAL SUBSTITUTION.pdf

536.5 KB

Detecting and Defeating Government_Interception Attacks Against SSL.pdf

607.2 KB

Detecting Steganographic Content on the Internet.pdf

840.9 KB

Cryptanalysis_of Hash Functions_of the MD4-Family.pdf

933.8 KB

westfeld-pfitzmann-ihw99.pdf

988.0 KB

Malicious Cryptography Techniques for Unreversable.pdf

1.3 MB

ADVANCED ENCRYPTION STANDARD.pdf

1.4 MB

Pen_Testing_and_Ethical_Hacking_Study_Guide.pdf

1.7 MB

Cryptography.pdf

1.7 MB

PublicandPrivateKeyCryptographyWhitePaper-Dec2014.pdf

1.7 MB

Securing_Enterprise_Web_Applications_at_the_Source.pdf

2.1 MB

steganography seeing the unseen by neil f. johnson.pdf

2.4 MB

FUNDAMENTALS OF_CRYPTOLOGY.pdf

3.0 MB

Information Hiding—A Survey.pdf

3.5 MB

D1T2 - Skyper - Cracking the GSM A5_1 Encryption in Seconds.pdf

3.6 MB

IntroToCrypto.pdf

3.7 MB

Wiley.Malicious.Cryptography.Exposing.Cryptovirology.Feb.2004.ISBN.0764549758.pdf

30.5 MB

/Malwares/

1507.06955v1.pdf

159.2 KB

34516.pdf

207.6 KB

Patterns of a Cooperative Malware Analysis Workflow.pdf

621.8 KB

Financial Malware Analysis - Secrets of ZeuS.pdf

642.5 KB

Advanced Polymorphic Techniques.pdf

731.0 KB

FireEye_AdvMalwareExposed.pdf

795.5 KB

0x90.se_-_Malware_Analysis_-_Part_I.pdf

927.3 KB

34591.pdf

1.1 MB

darkhotelappendixindicators_kl.pdf

1.4 MB

WGM12349USEN.PDF

2.5 MB

Detect_Malware_w_Memory_Forensics.pdf

2.5 MB

darkhotel_kl_07.11.pdf

2.7 MB

Springer.Computer.Viruses.From.Theory.To.Applications.Sep.2005.ISBN.2287239391.pdf

2.8 MB

Springer.Android.Malware.Jun.2013.ISBN.1461473934.pdf

3.6 MB

Spyware_Adware.pdf

3.7 MB

botnets-detection-measurement-disinfection-defence.pdf

4.1 MB

03_La complessità del malware.pdf

4.2 MB

Aditya Sood and Richard Enbody (Auth.)-Targeted Cyber Attacks. Multi-staged Attacks Driven by Exploits and Malware-Syngress (2014).pdf

5.8 MB

fighter-pos-whitepaper-en.pdf

5.8 MB

Addison.Wesley.The.Art.Of.Computer.Virus.Research.And.Defense.Feb.2005.ISBN.0321304543.chm

7.0 MB

Packt.Cuckoo.Malware.Analysis.Oct.2013.ISBN.1782169237.pdf

7.5 MB

Malware Analyst's Cookbook and DVD.pdf

9.4 MB

Data Mining Tools for Malware Detection Mehedy Masud, Latifur Khan, Bhavani Thuraisingham--Auerbach Publications,CRC Press (2011).pdf

9.4 MB

No.Starch.Practical.Malware.Analisys.Mar.2012.ISBN.1593272901.pdf

9.9 MB

Pattern-Oriented-Diagnostics-Debugging-Malware-Analysis-Reversing.pdf

10.2 MB

-Mobile Malware Attacks And Defense-Syngress (2011).pdf

11.2 MB

Springer.Computer.Viruses.And.Malware.Advances.In.Information.Security.Jul.2006.ISBN.0387302360.pdf

11.3 MB

Mohssen Mohammed_ Al-Sakib Khan Pathan-Automatic defense against zero-day polymorphic worms in communication networks-Auerbach (2013).pdf

17.1 MB

Syngress.Malware.Forensics.Investigating.And.Analyzing.Malicious.Code.Jun.2008.ISBN.159749268X.pdf

26.2 MB

Springer.Malware.Forensics.Field.Guide.For.Windows.Systems.Jun.2012.ISBN.1597494720.pdf

29.7 MB

Syngress.Malware.Forensics.Field.Guide.For.Linux.Systems.Jan.2014.ISBN.1597494704.pdf

41.4 MB

The.Rootkit.Arsenal.Escape.and.Evasion.in.the.Dark.Corners.of.the.System,Second.Edition.pdf

98.7 MB

/.../Professional Penetration Testing 2E- Syngress 2013 [Epub]/

Professional Penetration Testing Cover.jpg

191.9 KB

Professional Penetration Testing - Wilhelm, Thomas.epub

26.3 MB

/CEH/

Advanced Python Programming.pdf

199.0 KB

Attacking The DNS Protocol.pdf

330.2 KB

Hacking - CEH Cheat Sheet Exercises.pdf

336.2 KB

Pen_Testing_and_Ethical_Hacking_Study_Guide.pdf

1.7 MB

HII_Remote_and_Local_File_Inclusion_Vulnerabilities.pdf

1.9 MB

Certified Ethical Hacker 3.0 Official Course.pdf

27.1 MB

CEH-Handbook-v2.0.pdf

56.6 MB

/Hadoop/

John Russell-Getting Started with Impala_ Interactive SQL for Apache Hadoop-O'Reilly Media (2014).epub

208.1 KB

Getting Started with Impala2.pdf

798.4 KB

Getting Started with Impala.pdf

808.1 KB

Hadoop.pdf

923.8 KB

Dayong Du-Apache Hive Essentials-Packt Publishing - ebooks Account (2015).epub

1.4 MB

Packt.Learning.Cloudera.Impala.Dec.2013.ISBN.1783281278.pdf

2.9 MB

Packt.Hadoop.Cluster.Deployment.Nov.2013.ISBN.1783281715.pdf

4.5 MB

orielly-cloudera-impala-ebook.pdf

6.5 MB

OReilly.Hadoop.Operations.Oct.2012.ISBN.1449327052.pdf

7.7 MB

OReilly.Apache.Sqoop.Cookbook.Jul.2013.ISBN.1449364624.pdf

9.0 MB

hadoop-illuminated.pdf

9.5 MB

Packt.Hadoop.Beginners.Guide.Feb.2013.ISBN.1849517304.pdf

12.0 MB

OReilly.Hadoop.The.Definitive.Guide.3rd.Edition.May.2012.ISBN.1449311520.pdf

14.5 MB

Manning.Hadoop.In.Practice.Oct.2012.ISBN.1617290238.pdf

15.5 MB

/Malwares/crypters/

Hyperion_ Implementation of a PE-Crypter.pdf

238.7 KB

vb201407-VB6.pdf

348.5 KB

Malware Obfuscation with Threat Emulation.pdf

381.0 KB

ScyllaHide.pdf

429.4 KB

Utilisation de Stub En VB.NET.pdf

556.7 KB

18242.pdf

1.0 MB

UNPROTECTING THE CRYPTER.pdf

1.0 MB

419evolution [DataScrambler ].pdf

1.9 MB

Malware1.pdf

2.6 MB

Malware_Magazine_1.pdf

5.7 MB

MITM ATTACK WITH PATCHING BINARIES ON THE FLY BY ADDING SHELLCODES.pdf

10.9 MB

NocONName_2012-Evadiendo_Antivirus-Uso_de_Crypters.pdf

32.2 MB

/Python Programming Books/

byteofpython_120.pdf

240.4 KB

thinkpython.pdf

835.2 KB

No_Starch_Press_-_Gray_Hat_Python_-_Python_Programming_for_Hackers_and_Reverse_Engineers_[]_(2009)_en.pdf

3.2 MB

Packt.Python.Penetration.Testing.Essentials.Feb.2015.ISBN.1784398586.pdf

3.3 MB

Packt.Python.Data.Visualization.Cookbook.Nov.2013.ISBN.1782163360.pdf

5.5 MB

Python Cookbook 3rd Edition 2013.pdf

10.3 MB

Python Programming for the Absolute Beginner, 3rd Edition -nelly-.pdf

13.2 MB

Head First Python.pdf

29.6 MB

/CEH/CEHv6/

Module 31 Windows Based Buffer Overflow Exploit Writing.pdf

244.7 KB

Module 28 Writing Virus Codes.pdf

613.4 KB

Module 66 Security Convergence.pdf

645.7 KB

Exploit Writing Using Metasploit Framework.pdf

656.2 KB

Module 64 Economic Espionage.pdf

668.9 KB

Module 62 Case Studies.pdf

731.0 KB

Module 29 Assembly Language Tutorial.pdf

1.0 MB

Module 63 Botnets.pdf

1.2 MB

Module 34 MAC OS X Hacking.pdf

1.3 MB

Module 24 Buffer Overflows.pdf

1.4 MB

Module 59 How to Steal Passwords.pdf

1.6 MB

Module 42 Hacking Database Servers.pdf

1.7 MB

Module 52 Hacking RSS and Atom.pdf

1.7 MB

Module 67 Identifying the Terrorists.pdf

1.8 MB

Module 13 Hacking Email Accounts.pdf

1.9 MB

Module 41 Hacking USB Devices.pdf

1.9 MB

Module 53 Hacking Web Browsers.pdf

2.0 MB

Module 15 Session Hijacking.pdf

2.0 MB

Module 46 Securing Laptop Computers.pdf

2.0 MB

Module 44 Internet Content Filtering Techniques.pdf

2.0 MB

Module 51 Hacking and Cheating Online Games.pdf

2.1 MB

Module 30 Exploit Writing.pdf

2.1 MB

Module 49 Creating Security Policies.pdf

2.2 MB

Module 50 Software Piracy and Warez.pdf

2.2 MB

Module 58 Credit Card Frauds.pdf

2.2 MB

Module 56 Hacking Global Positioning System.pdf

2.2 MB

Module 39 RFID Hacking.pdf

2.3 MB

Module 48 Corporate Espionage by Insiders.pdf

2.3 MB

Module 54 Proxy Server Technologies.pdf

2.4 MB

Module 57 Computer Forensics and Incident Handling.pdf

2.6 MB

Module 37 Bluetooth Hacking.pdf

2.6 MB

Module 12 Phishing.pdf

2.7 MB

Module 40 Spamming.pdf

2.8 MB

Module 43 Cyber Warfare- Hacking Al-Qaida and Terrorism.pdf

2.8 MB

Module 33 Reverse Engineering Techniques.pdf

2.9 MB

Module 60 Firewall Technologies.pdf

3.0 MB

Module 21 Physical Security.pdf

3.2 MB

Module 35 Hacking Routers, Cable Modems and Firewalls.pdf

3.4 MB

Module 19 SQL Injection.pdf

3.4 MB

Module 14 Denial of Service.pdf

3.7 MB

Module 55 Preventing Data Loss.pdf

3.9 MB

Module 38 VoIP Hacking.pdf

4.1 MB

Module 36 Hacking Mobile Phones, PDA and Handheld Devices.pdf

4.2 MB

Module 06 Enumeration.pdf

4.2 MB

Module 25 Cryptography.pdf

4.3 MB

Module 04 Google Hacking.pdf

4.4 MB

Module 47 Spying Technologies.pdf

4.5 MB

Module 17 Web Application Vulnerabilities.pdf

4.8 MB

Module 23 Evading IDS Firewall and Honeypot.pdf

5.0 MB

Module 16 Hacking Webservers.pdf

5.1 MB

Module 11 Social Engineering.pdf

5.3 MB

Module 18 Web based Password Cracking Techniques.pdf

5.7 MB

Module 45 Privacy on the Internet.pdf

5.7 MB

Module 09 Viruses and Worms.pdf

5.8 MB

Module 26 Penetration Testing.pdf

5.9 MB

Module 22 Linux Hacking.pdf

6.4 MB

Module 65 Patch Management.pdf

7.4 MB

Module 08 Trojans and Backdoors.pdf

9.5 MB

Module 10 Sniffers.pdf

10.5 MB

Module 03 Footprinting.pdf

10.5 MB

Module 20 Hacking Wireless Networks.pdf

13.6 MB

Module 07 System Hacking.pdf

15.8 MB

Module 05 Scanning.pdf

17.5 MB

Module 61 Threats and Countermeasures.pdf

26.1 MB

/CEH/CEH 2009/

CEHv6 Module 31 Exploit Writing.pdf

244.7 KB

CEHv6 Module 00 Student Introduction.pdf

604.9 KB

CEHv6 Module 28 Writing Virus Codes.pdf

613.4 KB

CEHv6 Module 66 Security Convergence.pdf

645.7 KB

CEHv6 Module 32 Exploit Writing.pdf

656.2 KB

CEHv6 Module 64 Economic Espionage.pdf

668.9 KB

CEHv6 Module 62 Case Studies.pdf

731.0 KB

CEHv6 Module 61 Threats and Countermeasures.pdf

1.0 MB

CEHv6 Module 29 Assembly Language Tutorial.pdf

1.0 MB

CEHv6 Module 63 Botnets.pdf

1.2 MB

CEHv6 Module 34 MAC OS X Hacking.pdf

1.3 MB

CEHv6 Module 24 Buffer Overflows.pdf

1.4 MB

CEH-Classroom-Lab-Setup-v6.pdf

1.6 MB

CEHv6 Module 59 How to Steal Passwords.pdf

1.6 MB

CEHv6 Module 42 Hacking Database Servers.pdf

1.7 MB

CEHv6 Module 52 Hacking RSS and Atom.pdf

1.7 MB

CEHv6 Module 67 Identifying the Terrorists.pdf

1.8 MB

CEHv6 Module 13 Hacking Email Accounts.pdf

1.9 MB

CEHv6 Module 41 Hacking USB Devices.pdf

1.9 MB

CEHv6 Module 53 Hacking Web Browsers.pdf

2.0 MB

CEHv6 Module 15 Session Hijacking.pdf

2.0 MB

CEHv6 Module 46 Securing Laptop Computers.pdf

2.0 MB

CEHv6 Module 44 Internet Content Filtering Techniques.pdf

2.0 MB

CEHv6 Module 51 Hacking and Cheating Online Games.pdf

2.1 MB

CEHv6 Module 30 Exploit Writing.pdf

2.1 MB

CEHv6 Module 49 Creating Security Policies.pdf

2.2 MB

CEHv6 Module 50 Software Piracy and W.pdf

2.2 MB

CEHv6 Module 58 Credit Card Frauds.pdf

2.2 MB

CEHv6 Module 56 Hacking Global Positioning System.pdf

2.2 MB

CEHv6 Module 39 RFID Hacking.pdf

2.3 MB

CEHv6 Module 48 Corporate Espionage by Insiders.pdf

2.3 MB

CEHv6 Module 54 Proxy Server Technologies.pdf

2.4 MB

CEHv6 Module 57 Computer Forensics and Incident Handling.pdf

2.6 MB

CEHv6 Module 37 Bluetooth Hacking.pdf

2.6 MB

CEHv6 Module 12 Phishing.pdf

2.7 MB

CEHv6 Module 40 Spamming.pdf

2.8 MB

CEHv6 Module 43 Cyber Warfare- Hacking Al-Qaida and Terrorism.pdf

2.8 MB

CEHv6 Module 33 Reverse Engineering Techniques.pdf

2.9 MB

prova 312-50.pdf

2.9 MB

CEHv6 Module 60 Firewall Technologies.pdf

3.0 MB

CEHv6 Module 01 Introduction to Ethical Hacking.pdf

3.2 MB

CEHv6 Module 21 Physical Security.pdf

3.2 MB

CEHv6 Module 35 Hacking Routers, Cable Modems and Firewalls.pdf

3.4 MB

CEHv6 Module 19 SQL Injection.pdf

3.4 MB

CEHv6 Module 14 Denial of Service.pdf

3.7 MB

CEHv6 Module 02 Hacking Laws.pdf

3.8 MB

CEHv6 Module 55 Preventing Data Loss.pdf

3.9 MB

CEHv6 Module 38 VoIP Hacking.pdf

4.1 MB

CEHv6 Module 36 Hacking Mobile Phones, PDA and Handheld Devices.pdf

4.2 MB

CEHv6 Module 06 Enumeration.pdf

4.2 MB

CEHv6 Module 25 Cryptography.pdf

4.3 MB

CEHv6 Module 04 Google Hacking.pdf

4.4 MB

CEHv6 Module 47 Spying Technologies.pdf

4.5 MB

CEHv6 Module 17 Web Application Vulnerabilities.pdf

4.8 MB

CEHv6 Module 23 Evading IDS Firewall and Honeypot.pdf

5.0 MB

CEHv6 Module 16 Hacking Webservers.pdf

5.1 MB

CEHv6 Module 11 Social Engineering.pdf

5.3 MB

CEHv6 Module 18 Web based Password Cracking Techniques.pdf

5.7 MB

CEHv6 Module 45 Privacy on the Internet.pdf

5.7 MB

CEHv6 Module 09 Viruses and Worms.pdf

5.8 MB

CEHv6 Module 26 Penetration Testing.pdf

5.9 MB

CEHv6 Module 22 Linux Hacking.pdf

6.4 MB

CEHv6 Module 65 Patch Management.pdf

7.4 MB

CEHv6 Module 08 Trojans and Backdoors.pdf

9.5 MB

CEHv6 Module 10 Sniffers.pdf

10.5 MB

CEHv6 Module 03 Footprinting.pdf

10.5 MB

CEHv6 Module 20 Hacking Wireless Networks.pdf

13.6 MB

CEHv6 Module 07 System Hacking.pdf

15.8 MB

CEHv6 Module 05 Scanning.pdf

17.5 MB

/MISC/

Blackhat-europe-09-Damele-SQLInjection-slides.pdf

256.6 KB

Radware_DDoS_Handbook_2015.pdf

1.0 MB

32719.pdf

1.8 MB

nsa.pdf

11.9 MB

/Malwares/worms/

jxia-JCS-wormdetection.pdf

434.0 KB

CHAPTER 9 Strategies of Computer Worms.pdf

1.7 MB

/Web Hacking Books/

33253.pdf

453.0 KB

33931.pdf

847.2 KB

how-to-instrument-for-advanced-web-application-penetration-testing.pdf

981.4 KB

32373.pdf

1.8 MB

No.Starch.The.Tangled.Web.Nov.2011.ISBN.1593273886.pdf

4.2 MB

Nmap Cookbook The Fat-free Guide to Network Scanning.pdf

6.6 MB

Syngress.SQL.Injection.Attacks.And.Defense.2nd.Edition.Jul.2012.ISBN.1597499633.pdf

6.7 MB

XSS Attacks - Exploits and Defense.pdf

7.7 MB

SQL Injection Attacks and Defense - Justin Clarke.2ed.pdf

9.0 MB

Packt.Dreamweaver.CS6.Mobile.And.Web.Development.With.HTML5.CSS3.And.JQuery.Mobile.May.2013.ISBN.1849694745.pdf

9.7 MB

Kali Linux Cookbook.pdf

10.9 MB

pfSense 2 Cookbook (2011).pdf

12.3 MB

Syngress.Web.Application.Vulnerabilities.Detect.Exploit.Prevent.Dec.2007.ISBN.1597492094.pdf

21.9 MB

Syngress.Hacking.Web.Apps.Sep.2012.ISBN.159749951X.pdf

23.0 MB

Syngress.XSS.May.2007.ISBN.1597491543.pdf

60.3 MB

/Modern Web/

Packt.Getting.Started.With.Memcached.Nov.2013.ISBN.1782163220.pdf

870.8 KB

Packt.Social.Data.Visualization.With.HTML5.And.JavaScript.Sep.2013.ISBN.1782166548.pdf

1.3 MB

Packt.Building.Impressive.Presentations.With.Impress.Dot.JS.Mar.2013.ISBN.1849696489.pdf

2.2 MB

OReilly.Restful.Web.Services.Cookbook.Mar.2010.ISBN.0596801688.pdf

2.3 MB

Packt.Developing.Windows.Store.Apps.With.HTML5.And.JavaScript.Aug.2013.ISBN.1849687102.pdf

2.5 MB

Packt.HTML5.Web.Application.Development.By.Example.Jun.2013.ISBN.1849695946.pdf

3.0 MB

Packt.Data.Visualization.With.D3.JS.Cookbook.Oct.2013.ISBN.178216216X.pdf

3.2 MB

OReilly.Restful.Web.Services.May.2007.ISBN.0596529260.pdf

3.2 MB

Packt.Data.Visualization.With.D3.JS.Oct.2013.ISBN.1782160000.pdf

3.6 MB

Packt.Tableau.Data.Visualization.Cookbook.Aug.2013.ISBN.1849689784.pdf

3.7 MB

Packt.HTML5.Graphing.And.Data.Visualization.Cookbook.Nov.2012.ISBN.1849693706.pdf

3.8 MB

Packt.Ember.Feb.2013.ISBN.1782163387.pdf

3.8 MB

Wrox.Developing.Jul.2009.ISBN.0470414642.pdf

6.5 MB

OReilly.Full.Stack.Web.Development.With.Backbone.JS.Jun.2014.ISBN.1449370985.pdf

6.7 MB

OReilly.Getting.Started.With.GEO.CouchDB.And.Node.JS.Aug.2011.ISBN.1449307523.pdf

7.2 MB

OReilly.Building.Hypermedia.APIs.With.HTML5.And.Node.Dec.2011.ISBN.1449306578.pdf

7.2 MB

OReilly.Programming.HTML5.Applications.Nov.2011.ISBN.1449399088.pdf

8.4 MB

OReilly.Web.Development.With.Node.And.Express.Jul.2014.ISBN.1491949309.pdf

8.5 MB

No.Starch.The.Modern.Web.Apr.2013.ISBN.1593274874.pdf

8.6 MB

Packt.HTML5.IPhone.Web.Application.Development.May.2013.ISBN.1849691029.pdf

9.2 MB

Packt.Oracle.Application.Express.4.0.With.Ext.JS.Mar.2011.ISBN.1849681066.pdf

10.0 MB

OReilly.Building.Web.Apps.With.Ember.JS.Aug.20214.ISBN.1449370926.pdf

12.1 MB

OReilly.Enterprise.Web.Development.Building.HTML5.Jul.2014.ISBN.1449356818.pdf

46.2 MB

OReilly.Programming.3D.Applications.With.HTML5.And.WebGL.Mar.2014.ISBN.1449362966.pdf

67.1 MB

/wifi 802.11/

OReilly.802.Dot.11.Security.Dec.2002.ISBN.0596002904.pdf

933.9 KB

Addison.Wesley.Real.802.Dot.11.Security.WiFi.Protected.Access.And.802.Dot.11.I.Jul.2003.ISBN.0321136209.chm

3.1 MB

Newnes.Bulletproof.Wireless.Security.Jun.2005.ISBN.0750677465.pdf

3.5 MB

Addison.Wesley.WiFoo.The.Secrets.Of.Wireless.Hacking.Jul.2004.ISBN.0321202171.chm

7.1 MB

Cisco.Press.WiFi.Hotspots.Setting.Up.Public.Wireless.Internet.Access.Oct.2006.ISBN.1587052660.chm

9.1 MB

McGraw.Hill.Hacking.Exposed.Wireless.2nd.Edition.Aug.2010.ISBN.0071666613.pdf

11.6 MB

/Web-Game Dev/

Apress.Metro.Revealed.Building.Windows.8.Apps.With.HTML5.And.JavaScript.Jun.2012.ISBN.1430244887.pdf

1.5 MB

Packt.Game.Development.With.Three.JS.Oct.2013.ISBN.1782168532.pdf

1.8 MB

Addison.Wesley.Learning.HTML5.Game.Programming.A.Handson.Guide.To.Building.Online.Games.Using.Canvas.SVG.And.WebGL.Oct.2011.ISBN.0321767365.pdf

5.2 MB

Packt.HTML5.Game.Development.With.ImpactJS.Mar.2013.ISBN.1849694567.pdf

5.4 MB

OReilly.Introducing.HTML5.Game.Development.Feb.2012.ISBN.1449315178.pdf

6.9 MB

Apress.Enchant.JS.May.2013.ISBN.1430247436.pdf

7.2 MB

Apress.Building.JavaScript.Games.Sep.2014.ISBN.1430265388.pdf

7.2 MB

Apress.Beginning.HTML5.Games.With.CreateJS.Mar.2014.ISBN.1430263407.pdf

8.9 MB

Packt.HTML5.Game.Development.With.GameMaker.Apr.2013.ISBN.1849694109(1).pdf

9.0 MB

Wiley.HTML5.Games.Creating.Fun.With.HTML5.CSS3.And.WebGL.Dec.2011.ISBN.1119975085.pdf

11.5 MB

Addison.Wesley.Learning.Android.Game.Programming.Dec.2011.ISBN.0321769627.pdf

11.5 MB

Apress.Pro.Android.Web.Apps.Develop.For.Android.Using.HTML5.CSS3.And.JavaScript.Feb.2011.ISBN.1430232765.pdf

14.1 MB

Apress.HTML5.Games.Most.Wanted.Build.The.Best.HTML5.Games.Apr.2012.ISBN.1430239786.pdf

26.1 MB

Apress.Beginning.PhoneGap.Mobile.Web.Framework.For.JavaScript.And.HTML5.Feb.2012.ISBN.1430239034.pdf

28.3 MB

beginning Visual C#.pdf

32.2 MB

Apress.Beginning.Android.Web.Apps.Development.May.2012.ISBN.1430239573.pdf

36.2 MB

Apress.Beginning.Facebook.Game.Apps.Development.Mar.2012.ISBN.1430241705.pdf

40.6 MB

Apress.Pro.Windows.8.Development.With.HTML5.And.JavaScript.Nov.2012.ISBN.1430244011.pdf

52.9 MB

/Javascript/

OReilly.JavaScript.Testing.With.Jasmine.Apr.2013.ISBN.1449356370.pdf

1.5 MB

Packt.Object.Oriented.JavaScript.2nd.Edition.Jul.2013.ISBN.1849693129.pdf

2.2 MB

No.Starch.The.Principles.Of.Object.Oriented.JavaScript.Feb.2014.ISBN.1593275404.pdf

2.7 MB

Packt.Creating.Mobile.Apps.With.JQuery.Mobile.Apr.2013.ISBN.178216006X.pdf

4.1 MB

Packt.CoffeeScript.Programming.With.JQuery.Rails.And.Node.JS.Dec.2012.ISBN.1849519587.pdf

4.2 MB

Packt.Creating.2nd.Edition.Feb.2015.ISBN.1783555114.pdf

4.5 MB

Packt.JQuery.Mobile.Cookbook.Nov.2012.ISBN.1849517223.pdf

4.7 MB

Sitepoint.Javascript.Jan.2015.ISBN.0992461251.pdf

5.1 MB

Packt.PHP.AJAX.Cookbook.Dec.2011.ISBN.1849513082.pdf

5.8 MB

OReilly.JQuery.Cookbook.Solutions.And.Examples.For.JQuery.Developers.Dec.2009.ISBN.0596159773.pdf

6.0 MB

Morgan.Kaufmann.Object.Oriented.Construction.Handbook.Oct.2004.ISBN.1558606874.pdf

6.3 MB

Packt.JQuery.UI.1.8.The.User.Interface.Library.For.JQuery.Aug.2011.ISBN.1849516529.pdf

7.5 MB

Packt.Object.Oriented.JavaScript.Create.Scalable.Reusable.High.Quality.JavaScript.Applications.And.Libraries.Jul.2008.ISBN.1847194141.pdf

7.5 MB

OReilly.Programming.JavaScript.Applications.Jul.2014.ISBN.1491950293.pdf

8.5 MB

Apress.Pro.Data.Visualization.Using.R.And.JavaScript.Jun.2013.ISBN.1430258063.pdf

9.2 MB

Apress.Pro.PHP.And.JQuery.Add.Quick.Smooth.And.Easy.Interactivity.To.Your.PHP.Sites.With.JQuery.Jun.2010.ISBN.1430228474.pdf

11.4 MB

Manning.Secrets.Of.The.JavaScript.Ninja.Dec.2012.ISBN.193398869X.pdf

15.6 MB

SitePoint.JQuery.Novice.To.Ninja.2nd.Edition.Feb.2012.ISBN.0987153013.pdf

16.9 MB

/Computer Security/

Addison.Wesley.The.Technical.And.Social.History.Of.Software.Engineering.Dec.2013.ISBN.0321903420.pdf

1.6 MB

Apress.Healthcare.Jun.2014.ISBN.1430266767.pdf

2.5 MB

McGraw.Hill.Principles.Of.Computer.Security.CompTIA.Security.Plus.And.Beyond.Lab.Manual.2nd.Edition.Dec.2010.ISBN.0071748563.pdf

5.8 MB

Syngress.The.Basics.Of.Digital.Privacy.May.2013.ISBN.0128000112.pdf

8.6 MB

Addison.Wesley.Crimeware.Understanding.New.Attacks.And.Defenses.Apr.2008.ISBN.0321501950.chm

10.8 MB

/Semantic web/

IOS.Press.Ontology.And.The.Semantic.Web.Volume.156.Frontiers.In.Artificial.Intelligence.And.Applications.Apr.2007.ISBN.1586037293.pdf

2.0 MB

MIT.Press.A.Semantic.Web.Primer.2nd.Edition.Mar.2008.ISBN.0262012421.pdf

2.5 MB

Springer.Agent.Based.Semantic.Web.Service.Composition.Aug.2012.ISBN.1461446627.pdf

3.3 MB

Springer.Ontology.Management.Semantic.Web.Semantic.Web.Services.And.Business.Applications.Dec.2007.ISBN.038769899X.pdf

3.9 MB

Springer.Semantic.Web.Concepts.Technologies.And.Applications.Jan.2007.ISBN.184628581X.pdf

4.6 MB

Springer.Modeling.Semantic.Web.Services.The.Web.Service.Modeling.Language.Jul.2008.ISBN.3540681698.pdf

4.6 MB

OReilly.Programming.The.Semantic.Web.Jul.2009.ISBN.0596153813.pdf

6.5 MB

Wiley.Semantic.Web.And.Model.Driven.Engineering.Jun.2012.ISBN.1118004175.pdf

6.8 MB

Academic.Press.Introduction.To.The.Semantic.Web.And.Semantic.Web.Services.Jun.2007.ISBN.1584889330.pdf

9.2 MB

IGI.Global.Semantic.Web.Services.Theory.Tools.And.Applications.Mar.2007.ISBN.159904045X.pdf

10.2 MB

Springer.Sem.Apr.2013.ISBN.3642364020.pdf

13.0 MB

/Javascript/nodejs/

Krasimir Tsonev-Node.js By Example-Packt Publishing - ebooks Account (2015).epub

2.0 MB

Basarat Ali Syed (auth.)-Beginning Node.js-Apress (2014).pdf

7.3 MB

Fernando Doglio (auth.)-Pro REST API Development with Node.js-Apress (2015).pdf

7.5 MB

Alex R. Young, Marc Harter-Node.js in Practice-Manning (2015).pdf

7.6 MB

Mario Casciaro-Node.js Design Patterns-Packt Publishing (2014).pdf

15.4 MB

/Pentesting Books/

No.Starch.Black.Hat.Python.Dec.2014.ISBN.1593275900.pdf

2.8 MB

No.Starch.Gray.Hat.Python.Aug.2009.ISBN.1593271921.pdf

3.7 MB

/Big Data/

Packt.Big.Data.Analytics.With.R.And.Hadoop.Nov.2013.ISBN.178216328X.pdf

3.2 MB

Wiley.Big.Feb.2015.ISBN.1118965833.pdf

4.8 MB

OReilly.Ethics.Of.Big.Data.Sep.2012.ISBN.1449311792.pdf

6.2 MB

Wiley.Making.2nd.Edition.Aug.2014.ISBN.1118407415.pdf

8.4 MB

Apress.Big.Data.Imperatives.Jun.2013.ISBN.1430248726.pdf

10.5 MB

OReilly.Data.Science.For.Business.Aug.2013.ISBN.1449361323.pdf

15.2 MB

Wiley.Data.Mining.May.2014.ISBN.1119977134.pdf

16.5 MB

Morgan.Kaufmann.Data.Warehousing.In.The.Age.Of.Big.Data.Jun.2013.ISBN.0124058914.pdf

17.2 MB

Wiley.Big.Data.Oct.2013.ISBN.1118739574(1).pdf

21.6 MB

Wiley.Data.May.2013.ISBN.111844714X.pdf

33.6 MB

/CEH/CEH 2010/

Network 5; Network Safety Certification (2011) CT.pdf

3.3 MB

Wireless 5; Wireless Safety Certification (2010) CT.pdf

3.5 MB

CHFI v01 Computer Forensics Investigation Procedures & Response (2010) CT.pdf

4.0 MB

CHFI v05 Computer Forensics Investigating Wireless Networks & Devices (2010) CT.pdf

5.6 MB

ENSA v03 Network Defense; Perimeter Defense Mechanisms (2011) CT.pdf

6.0 MB

CEH v04 Ethical Hacking & Countermeasures Linux, Macintosh & Mobile Systems (2010) CT.pdf

6.7 MB

ECDR-ECVT v02 Virtualization Security (2011) CT.pdf

8.0 MB

CEH v05 Ethical Hacking & Countermeasures Secure Network Infrastructures (2010) CT.pdf

8.3 MB

ECSA v02 Procedures & Methodologies (2011) CT.pdf

8.3 MB

CEH Official Certified Ethical Hacker Review Guide (2010) CT.pdf

8.4 MB

ECSA v05 Network Threat Testing (2011) CT.pdf

8.8 MB

ECDR-ECVT v01 Disaster Recovery (2011) CT.pdf

9.5 MB

CHFI v02 Computer Forensics Investigating Hard Disks, File & Operating Systems (2010) CT.pdf

10.8 MB

ECSA v03 Network & Perimeter Testing (2011) CT.pdf

11.2 MB

ECSA v04 Communication Media Testing (2011) CT.pdf

13.0 MB

ENSA v05 Network Defense; Security & Vulnerability Assessment (2011) CT.pdf

13.0 MB

ENSA v02 Network Defense; Security Policy & Threats (2011) CT.pdf

13.1 MB

ENSA v04 Network Defense; Securing & Troubleshooting Network Operating Systems (2011) CT.pdf

13.8 MB

CEH v03 Ethical Hacking & Countermeasures Web Applications & Data Servers (2010) CT.pdf

14.1 MB

CEH v02 Ethical Hacking & Countermeasures Threats & Defense Mechanisms (2010) CT.pdf

16.0 MB

ENSA v01 Network Defense; Fundamentals & Protocols (2011) CT.pdf

16.6 MB

CEH v01 Ethical Hacking & Countermeasures Attack Phases (2010) CT.pdf

17.9 MB

CHFI v03 Computer Forensics Investigating Data & Image Files (2010) CT.pdf

18.2 MB

ECSA v01 Security Analysis (2011) CT.pdf

21.3 MB

CHFI v04 Computer Forensics Investigating Network Intrusions & Cyber Crimes (2010) CT.pdf

25.2 MB

/Kali tuts/

Packt.Kali.Linux.CTF.Blueprints.Jul.2014.ISBN.1783985984.pdf

3.7 MB

Packt.Kali.Linux.Social.Engineering.Dec.2013.ISBN.1783283270.pdf

4.0 MB

Packt.Kali.Linux.Network.Scanning.Cookbook.Aug.2014.ISBN.1783982144.pdf

4.8 MB

Packt.Kali.Linux.Apr.2014.ISBN.184951948X.pdf

8.2 MB

Packt.Mastering.Kali.Linux.For.Advanced.Penetration.Testing.Jun.2014.ISBN.1782163123.pdf

9.4 MB

Packt.Kali.Linux.Cookbook.Oct.2013.ISBN.1783289597.pdf

11.2 MB

CreateSpace.Publishing.Basic.Security.Testing.With.Kali.Linux.Jan.2014.ISBN.1494861275.pdf

14.4 MB

Packt.Web.Penetration.Testing.With.Kali.Linux.Sep.2013.ISBN.1782163166.pdf

20.2 MB

/.../No.Starch.Metasploit.Jul.2011/

No.Starch.Metasploit.Jul.2011.epub

3.7 MB

No.Starch.Metasploit.Jul.2011.pdf

7.3 MB

/Exploit/

Wiley.The.Shellcoders.Handbook.2nd.Edition.Aug.2007.ISBN.047008023X.pdf

3.7 MB

Syngress.Zero.Day.Exploit.Countdown.To.Darkness.Aug.2004.ISBN.1931836094.pdf

3.9 MB

Addison.Wesley.Exploiting.Software.How.To.Break.Code.Feb.2004.ISBN.0201786958.pdf

8.0 MB

/.../Invent with Python/

Invent with Python.pdf

4.8 MB

/PHP/

Apress.PHP.Dec.2010.ISBN.1430233184.pdf

5.0 MB

Packt.PHP.Oracle.Web.Development.Data.Processing.Security.Caching.XML.Web.Services.And.AJAX.Jul.2007.ISBN.1847193633.pdf

7.4 MB

OReilly.PHP.Web.Services.May.2013.ISBN.1449356567.pdf

10.7 MB

OReilly.PHP.Cookbook.3rd.Edition.Jul.2014.ISBN.144936375X.pdf

12.6 MB

Packt.Restfull.Oct.2008.ISBN.1847195520.pdf

13.3 MB

/Metasploit Books/

Packt.Metasploit.Jun.2012.ISBN.1849517428.pdf

5.2 MB

Monika Agarwal, Abhinav Singh-Metasploit Penetration Testing Cookbook, Second Edition-Packt Publishing (2013).pdf

7.2 MB

No.Starch.Meta.Jun.2011.ISBN.159327288X.pdf

7.2 MB

Aditya Balapure-Learning Metasploit Exploitation and Development-Packt Publishing (2013).pdf

9.5 MB

Packt.Mastering.Metasploit.May.2014.ISBN.1782162224.pdf

14.8 MB

/Reverse Engineering/

Practical Reverse Engineering.pdf

5.5 MB

/Ethical Hacking/

McGraw.Hill.Hacking.Exposed.Network.Security.Secrets.And.Solutions.3rd.Edition.Sep.2001.ISBN.0072193816.pdf

6.1 MB

McGraw.Hill.Hacking.Exposed.Network.Security.Secrets.And.Solutions.2nd.Edition.Oct.2000.ISBN.0072127481.pdf

8.4 MB

McGraw.Hill.Hacking.Exposed.Linux.3rd.Edition.Jul.2008.ISBN.0072262575.pdf

11.0 MB

Ethical Hacking.pdf

23.5 MB

McGraw.Hill.Gray.Hat.Hacking.4th.Edition.Jan.2015.ISBN.0071832386.pdf

33.9 MB

/Mobile/

Packt.PhoneGap.3.X.Mobile.Application.Development.Hotshot.May.2014.ISBN.1783287926.pdf

6.1 MB

OReilly.20.Recipes.For.Programming.PhoneGap.Apr.2012.ISBN.1449319548.pdf

6.7 MB

/Social Engineering/

Wiley.Social.Engineering.The.Art.Of.Human.Hacking.Dec.2010.ISBN.0470639539.pdf

6.4 MB

Wiley.Social.Engineering.And.Nonverbal.Behavior.Set.Feb.2014.ISBN.1118906713.pdf

145.9 MB

/Forensics/

Syngress.The.Basics.Of.Digital.Forensics.Mar.2012.ISBN.1597496618.pdf

7.0 MB

Wiley.Memory.Jul.2014.ISBN.1118825098.pdf

7.5 MB

Prentice.Hall.Network.Forensics.Jun.2012.ISBN.0132564718.pdf

20.8 MB

Sybex.Mastering.Windows.Network.Forensics.And.Investigation.2nd.Edition.Jun.2012.ISBN.1118163826.pdf

42.1 MB

/Violent Python/

Violent Python - A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers.pdf

8.2 MB

/.../Learning Penetration Testing with Python/

Learning Penetration Testing with Python.pdf

9.6 MB

Learning Penetration Testing wi - Christopher Duffy.pdf

9.6 MB

JavaScript by Example, 2nd Edition.pdf

28.2 MB

C# Programming From Problem Analysis to Program Design, 3rd Edition.pdf

58.3 MB

/.../The Web Application Hacker's Handbook -Finding and Exploiting Security Flaws V413HAV/

The Web Application Hacker's Handbook -Finding and Exploiting Security Flaws V413HAV.pdf

14.2 MB

/Physical devices/

Syngress.Black.Oct.2004.ISBN.193226681X.pdf

74.8 MB

 

Total files 807


Copyright © 2025 FileMood.com