/Antiviruses/
|
2012_EPP_CAR_Consumer_Exploit_Evasion_Defenses_0.pdf
|
275.5 KB
|
34591.pdf
|
1.1 MB
|
An Automated Online Packing Service for Optimal Antivirus Evasion.pdf
|
175.6 KB
|
Antivirus , Firewall evasion techiniques.pdf
|
633.7 KB
|
AV_Evasion.pdf
|
443.4 KB
|
avevasion-techniques.pdf
|
771.2 KB
|
AV-Sandbox-Presentation_v2.0.pdf
|
257.8 KB
|
BypassAVDynamics.pdf
|
1.0 MB
|
bypassing-av.pdf
|
1.1 MB
|
Evading Antivirus Metasploit Webcast.pdf
|
628.9 KB
|
evasive_threats.pdf
|
1.3 MB
|
Fighting_Advanced_Threats.pdf
|
2.1 MB
|
IJOPCM(vol.1.2.3.S.08).pdf
|
86.5 KB
|
MalWareBytes_sSecurity_IO#113914_Eguide_031714_LI#839558.pdf
|
775.3 KB
|
Practical Anti-virus Evasion - avevasion_pentestmag.pdf
|
362.2 KB
|
rp-nss-labs-corporate-exploit-evasion-defenses.pdf
|
189.6 KB
|
Ryan Linn - Getting Shells When Metasploit Fails - Sector 2012.pdf
|
673.5 KB
|
security-guide-how-to-evade-anti-virus-detection.pdf
|
172.0 KB
|
Testing antivirus engines to determine theireffectiveness as a security layer.pdf
|
570.7 KB
|
The Deathof AV DefenseinDepth _- revisiting Anti-Virus Software.pdf
|
2.4 MB
|
The State of the Veil Framework - Will Schroeder and Chris Truncer.pdf
|
744.6 KB
|
us-14-Mesbahi-One-Packer-To-Rule-Them-All-WP.pdf
|
2.5 MB
|
us-15-Xenakis-ROPInjector-Using-Return-Oriented-Programming-For-Polymorphism-And-Antivirus-Evasion.pdf
|
383.5 KB
|
us-15-Xenakis-ROPInjector-Using-Return-Oriented-Programming-For-Polymorphism-And-Antivirus-Evasion-wp.pdf
|
724.3 KB
|
Why_Antivirus_Fails_-_Daniel_Sauder.pdf
|
1.3 MB
|
why_malware_works_in_face_of_antivirus_software.pdf
|
793.8 KB
|
woot09-polypack-pres.pdf
|
1.9 MB
|
WP_SerialVariantEvasionTactics.pdf
|
1.2 MB
|
Writing Zero Days for Security - APT Penetration Testing Framework v1.0.pdf
|
3.7 MB
|
/APT/
|
2014-apt-study.pdf
|
169.5 KB
|
Advanced Penetration Testing for Highly Secured Environments.pdf
|
16.6 MB
|
Advanced Persistent Threat Hacking The Art and Science of Hacking Any Organization.azw3
|
8.8 MB
|
Advanced Persistent Threat Hacking The Art and Science of Hacking Any Organization.epub
|
6.0 MB
|
Advanced Persistent Threat Hacking The Art and Science of Hacking Any Organization.mobi
|
9.7 MB
|
Advanced Persistent Threat Hacking, The Art & Science...pdf
|
11.1 MB
|
Advanced Persistent Threat Hacking.azw3
|
8.8 MB
|
Advanced Persistent Threat Hacking.epub
|
6.0 MB
|
Advanced Persistent Threat Hacking.mobi
|
9.7 MB
|
advanced-persistent-threat-id52631.pdf
|
83.8 KB
|
advance-penetration-testing-kali-linux-training.pdf
|
36.1 KB
|
b-advanced_persistent_threats_WP_21215957.en-us.pdf
|
3.1 MB
|
CybraryAdvancedPenSlides.pdf
|
2.4 MB
|
Data Structures and Algorithms in C++, 4th Edition.rar
|
41.8 MB
|
esg-apts-deep-discovery-whitepaper-en.pdf
|
494.0 KB
|
HTML5 & CSS3 The Complete Manual 2014.pdf
|
19.3 MB
|
Syngress.Advanced.Persistent.Threat.Nov.2012.ISBN.1597499498.pdf
|
7.5 MB
|
Tyler Wrightson-Advanced Persistent Threat Hacking_ The Art and Science of Hacking Any Organization-McGraw-Hill (2015).pdf
|
11.1 MB
|
Will Gragido, John Pirc-Cybercrime and Espionage_ An Analysis of Subversive Multi-Vector Threats-Syngress (2011).pdf
|
15.0 MB
|
/Assorted books/
|
(Chapman & Hall_CRC Texts in Statistical Science) Andrew Gelman, John B. Carlin, Hal S. Stern, David B. Dunson, Aki Vehtari, Donald B. Rubin-Bayesian Data Analysis-Chapman and Hall_CRC (2014).pdf
|
14.5 MB
|
(Information science and statistics) Christopher M. Bishop-Pattern Recognition and Machine Learning-Springer (2006).pdf
|
8.5 MB
|
(Pocket Reference) Tony Stubblebine-Regular Expression Pocket Reference_ Regular Expressions for Perl, Ruby, PHP, Python, C, Java and .NET-O'Reilly Media (2007).pdf
|
1.0 MB
|
a.txt
|
8.6 KB
|
Aamir Lakhani, Joseph Muniz-Penetration Testing with Raspberry Pi-Packt Publishing (2015).pdf
|
10.2 MB
|
Aaron Johns-Mastering Wireless Penetration Testing for Highly-Secured Environments-Packt Publishing (2015).pdf
|
12.9 MB
|
Advanced Persistent Threat Hacking The Art and Science of Hacking Any Organization by Tyler Wrightson - Not Enough Apt For Me .pdf
|
23.7 KB
|
Al Sweigart-Hacking Secret Ciphers with Python_ A beginner's guide to cryptography and computer programming with Python-CreateSpace Independent Publishing Platform (2013).pdf
|
6.9 MB
|
Allen Downey B.-Think Bayes-O'Reilly Media (2013).pdf
|
12.3 MB
|
analisi_tecnica_rsi_relative_strentgh_index_significato_formula_intepretazione_tempi_ed_esempi.pdf
|
408.5 KB
|
Bachaalany, Elias_ Koret, Joxean-The Antivirus Hacker's Handbook-Wiley (2015).pdf
|
5.9 MB
|
Bastian Ballmann-Understanding Network Hacks_ Attack and Defense with Python-Springer (2015).pdf
|
11.4 MB
|
Ben Clark-Rtfm_ Red Team Field Manual-CreateSpace Independent Publishing Platform (2014).pdf
|
10.7 MB
|
Chris Sanders and Jason Smith (Auth.)-Applied Network Security Monitoring. Collection, Detection, and Analysis (2014).pdf
|
39.2 MB
|
David Nathans-Designing and Building Security Operations Center-Syngress (2014).pdf
|
3.6 MB
|
Douglas Berdeaux-Penetration Testing with Perl-Packt Publishing - ebooks Account (2015).pdf
|
4.6 MB
|
Drew Conway, John Myles White-Machine Learning for Hackers-O'Reilly Media (2012).pdf
|
24.2 MB
|
Enrico Perla B.Sc. Computer Science University of Torino M.Sc. Computer Science Trinity College Dublin, Massimiliano Oldani-A Guide to Kernel Exploitation_ Attacking the Core-Syngress (2010).pdf
|
5.5 MB
|
FirstStrike_Plus.pdf
|
175.3 KB
|
Ivan Ristic-Bulletproof SSL and TLS_ Understanding and Deploying SSL_TLS and PKI to Secure Servers and Web Applications-Feisty Duck (2014).pdf
|
7.1 MB
|
J.J. MURPHY-ANALISI TECNICA DEI MERCATI FINANZIARI.pdf
|
16.2 MB
|
Jacob Perkins-Python 3 Text Processing with NLTK 3 Cookbook-Packt Publishing - ebooks Account (2014).pdf
|
1.7 MB
|
Jason Andress, Ryan Linn-Coding for Penetration Testers_ Building Better Tools -Syngress (2011).pdf
|
10.4 MB
|
Jay Jacobs, Bob Rudis-Data-Driven Security_ Analysis, Visualization and Dashboards-Wiley (2014).pdf
|
8.6 MB
|
Jennifer Golbeck-Introduction to Social Media Investigation_ A Hands-on Approach-Syngress (2015).pdf
|
62.2 MB
|
Jeremy Faircloth-Penetration Tester's Open Source Toolkit, Third Edition -Elsevier Science (2011).pdf
|
17.8 MB
|
Johnny Long, Bill Gardner, Justin Brown-Google Hacking for Penetration Testers-Syngress (2015).pdf
|
38.5 MB
|
Loraine Blaxter, Christina Hughes, Malcolm Tight-How to Research, 4th Edition -Open University Press (2010).pdf
|
1.3 MB
|
Luis Pedro Coelho, Willi Richert-Building Machine Learning Systems with Python-Packt Publishing (2015).pdf
|
6.8 MB
|
Lutz M.-Python pocket reference-O'Reilly (2014).pdf
|
2.5 MB
|
Matthew A. Russell-Mining the social web_ data mining Facebook, Twitter, LinkedIn, Google+, GitHub, and more-O'Reilly Media (2013).pdf
|
22.1 MB
|
Micha Gorelick, Ian Ozsvald-High Performance Python_ Practical Performant Programming for Humans-O'Reilly Media (2014).pdf
|
8.0 MB
|
Michael Collins-Network Security Through Data Analysis_ Building Situational Awareness-O'Reilly Media (2014).pdf
|
14.1 MB
|
Nicholas Marsh-Nmap 6 Cookbook_ The Fat Free Guide to Network Security Scanning-CreateSpace Independent Publishing Platform (2015).epub
|
964.8 KB
|
Paulino Calderon Pale-Mastering Nmap Scripting Engine-Packt Publishing (2015).pdf
|
2.0 MB
|
Qing Li, Gregory Clark-Security Intelligence_ A Practitioner's Guide to Solving Enterprise Security Challenges-Wiley (2015).pdf
|
22.6 MB
|
Richard Lawson-Web Scraping with Python-Packt Publishing (2015).pdf
|
5.5 MB
|
Ryan Mitchell-Web Scraping with Python_ Collecting Data from the Modern Web-O'Reilly Media (2015).pdf
|
6.4 MB
|
Sam Newman-Building Microservices-O'Reilly Media (2015).pdf
|
5.0 MB
|
Steven Bird, Ewan Klein, Edward Loper-Natural Language Processing with Python-O'Reilly Media (2009).pdf
|
5.4 MB
|
Sudhanshu Chauhan, Nutan Kumar Panda-Hacking Web Intelligence_ Open Source Intelligence and Web Reconnaissance Concepts and Techniques-Syngress (2015).pdf
|
38.2 MB
|
Toby Segaran-Programming Collective Intelligence_ Building Smart Web 2.0 Applications-O'Reilly Media (2007).pdf
|
3.5 MB
|
Wes McKinney-Python for Data Analysis-O'Reilly Media (2012).pdf
|
14.8 MB
|
wireless_hacking_presentation.pdf
|
2.3 MB
|
Yuxing Yan-Python for Finance-Packt Publishing - ebooks Account (2014).pdf
|
5.1 MB
|
Yves Hilpisch-Python for Finance_ Analyze Big Financial Data-O'Reilly Media (2014).pdf
|
11.0 MB
|
/Big Data/
|
Apress.Big.Data.Imperatives.Jun.2013.ISBN.1430248726.pdf
|
10.5 MB
|
Morgan.Kaufmann.Data.Warehousing.In.The.Age.Of.Big.Data.Jun.2013.ISBN.0124058914.pdf
|
17.2 MB
|
OReilly.Data.Science.For.Business.Aug.2013.ISBN.1449361323.pdf
|
15.2 MB
|
OReilly.Ethics.Of.Big.Data.Sep.2012.ISBN.1449311792.pdf
|
6.2 MB
|
Packt.Big.Data.Analytics.With.R.And.Hadoop.Nov.2013.ISBN.178216328X.pdf
|
3.2 MB
|
Wiley.Big.Data.Oct.2013.ISBN.1118739574(1).pdf
|
21.6 MB
|
Wiley.Big.Feb.2015.ISBN.1118965833.pdf
|
4.8 MB
|
Wiley.Data.May.2013.ISBN.111844714X.pdf
|
33.6 MB
|
Wiley.Data.Mining.May.2014.ISBN.1119977134.pdf
|
16.5 MB
|
Wiley.Making.2nd.Edition.Aug.2014.ISBN.1118407415.pdf
|
8.4 MB
|
/C++/
|
1133608426_Algorith.pdf
|
22.4 MB
|
Data Structures and Algorithms in C++ 4th Edition.pdf
|
22.4 MB
|
Data Structures and Algorithms in C++, 4th Edition.pdf
|
22.4 MB
|
/.../CEH Course(Books and videos)/
|
CEHV7 - Legal_Disclaimer.htm
|
24.3 KB
|
CEHV7 - Module 01 - Introduction to Ethical Hacking.pdf
|
5.2 MB
|
CEHV7 - Module 02 - Footprinting and Reconnaissance.pdf
|
8.9 MB
|
CEHV7 - Module 03 - Scanning Networks.pdf
|
16.7 MB
|
CEHV7 - Module 04 - Enumeration.pdf
|
7.0 MB
|
CEHV7 - Module 05 - System Hacking.pdf
|
23.9 MB
|
CEHV7 - Module 06 - Trojans and Backdoors.pdf
|
15.2 MB
|
CEHV7 - Module 07 - Viruses and Worms.pdf
|
12.0 MB
|
CEHV7 - Module 08 - Sniffers.pdf
|
13.8 MB
|
CEHV7 - Module 09 - Social Engineering.pdf
|
11.1 MB
|
CEHV7 - Module 10 - Denial of Service.pdf
|
10.0 MB
|
CEHV7 - Module 11 - Session Hijacking.pdf
|
7.9 MB
|
CEHV7 - Module 12 - Hacking Webservers.pdf
|
12.3 MB
|
CEHV7 - Module 13 - Hacking Web Applications.pdf
|
24.7 MB
|
CEHV7 - Module 14 - SQL Injection.pdf
|
15.4 MB
|
CEHV7 - Module 15 - Hacking Wireless Networks.pdf
|
25.0 MB
|
CEHV7 - Module 16 - Evading IDS, Firewalls, and Honeypots.pdf
|
17.2 MB
|
CEHV7 - Module 17 - Buffer Overflow.pdf
|
8.7 MB
|
CEHV7 - Module 18 - Cryptography.pdf
|
7.4 MB
|
CEHV7 - Module 19 - Penetration Testing.pdf
|
10.9 MB
|
CEHV7- 01 -Certified Ethical Hacker Series Introduction.flv
|
9.4 MB
|
CEHV7- 02 -Introduction to Certified Ethical Hacking.flv
|
45.4 MB
|
CEHV7- 03 - VMWare and Linux .flv
|
93.5 MB
|
CEHV7- 04 - Footprinting and Reconnaissance Part 1.flv
|
75.7 MB
|
CEHV7- 05 - Footprinting and Reconnaissance Part 2.flv
|
35.1 MB
|
CEHV7- 06 - Scanning Part 1.flv
|
38.3 MB
|
CEHV7- 07 - Scanning Part 2.flv
|
54.8 MB
|
CEHV7- 08 - Enumeration.flv
|
46.2 MB
|
CEHV7- 09 - Passwords Part 1 Windows.flv
|
35.4 MB
|
CEHV7- 10 - Passwords Part 2 Linux.flv
|
32.2 MB
|
CEHV7- 11 - System Hacking.flv
|
56.2 MB
|
CEHV7- 12 - Malware.flv
|
47.2 MB
|
CEHV7- 13 - Hack-O_Rama.flv
|
41.7 MB
|
CEHV7- 14 - Sniffing.flv
|
75.2 MB
|
CEHV7- 15 - Social Engineering.flv
|
46.2 MB
|
CEHV7- 16 - Denial of Service.flv
|
29.0 MB
|
CEHV7- 17 - Session Hijacking.flv
|
51.2 MB
|
CEHV7- 18 - Web and SQL Hacking.flv
|
55.5 MB
|
CEHV7- 19 - Cryptography.flv
|
47.0 MB
|
CEHV7- 20 - Intrusion Detection Systems.flv
|
23.3 MB
|
CEHV7- 21 - Hacking Wireless Networks.flv
|
50.2 MB
|
CEHV7- Certified Ethical Hacker Study Guide.pdf
|
7.0 MB
|
CEHV8 - Hacker Halted.pdf
|
1.2 MB
|
CEHV8 - Module 00 - Labs Countermeasures.pdf
|
101.5 KB
|
CEHV8 - Module 01 - Introduction to Ethical Hacking.pdf
|
4.1 MB
|
CEHV8 - Module 02 - Footprinting and Reconnaissance.pdf
|
8.2 MB
|
CEHV8 - Module 02 - Labs Footprinting and Reconnaissance.pdf
|
3.6 MB
|
CEHV8 - Module 03 - Labs Scanning Networks.pdf
|
6.8 MB
|
CEHV8 - Module 03 - Scanning Networks.pdf
|
8.7 MB
|
CEHV8 - Module 04 - Enumeration.pdf
|
4.0 MB
|
CEHV8 - Module 04 - Labs Enumeration.pdf
|
1.5 MB
|
CEHV8 - Module 05 - Labs System Hacking.pdf
|
4.8 MB
|
CEHV8 - Module 05 - System Hacking .pdf
|
14.7 MB
|
CEHV8 - Module 06 - Labs Trojans and Backdoors.pdf
|
4.4 MB
|
CEHV8 - Module 06 - Trojans and Backdoors.pdf
|
9.1 MB
|
CEHV8 - Module 07 - Labs Viruses and Worms.pdf
|
2.5 MB
|
CEHV8 - Module 07 - Viruses and Worms.pdf
|
5.1 MB
|
CEHV8 - Module 08 - Labs Sniffers.pdf
|
4.4 MB
|
CEHV8 - Module 08 - Sniffing.pdf
|
8.4 MB
|
CEHV8 - Module 09 - Labs Social Engineering.pdf
|
1.2 MB
|
CEHV8 - Module 09 - Social Engineering.pdf
|
5.4 MB
|
CEHV8 - Module 10 - Denial of Service.pdf
|
5.1 MB
|
CEHV8 - Module 10 - Labs Denial of Service.pdf
|
523.9 KB
|
CEHV8 - Module 11 - Labs Session Hijacking.pdf
|
684.0 KB
|
CEHV8 - Module 11 - Session Hijacking.pdf
|
4.5 MB
|
CEHV8 - Module 12 - Hacking Webservers.pdf
|
6.0 MB
|
CEHV8 - Module 12 - Labs Hacking Webservers.pdf
|
1.3 MB
|
CEHV8 - Module 13 - Hacking Web Applications .pdf
|
12.5 MB
|
CEHV8 - Module 13 - Labs Hacking Web Applications.pdf
|
907.4 KB
|
CEHV8 - Module 14 - Labs SQL Injection.pdf
|
1.6 MB
|
CEHV8 - Module 14 - SQL Injection.pdf
|
7.2 MB
|
CEHV8 - Module 15 - Hacking Wireless Networks.pdf
|
12.7 MB
|
CEHV8 - Module 15 - Labs Hacking Wireless Networks.pdf
|
1.3 MB
|
CEHV8 - Module 16 - Hacking Mobile Platforms.pdf
|
7.3 MB
|
CEHV8 - Module 17 - Evading IDS, Firewalls, and Honeypots.pdf
|
6.8 MB
|
CEHV8 - Module 17 - Labs Evading IDS, Firewalls and Honeypots.pdf
|
2.4 MB
|
CEHV8 - Module 18 - Buffer Overflow.pdf
|
4.2 MB
|
CEHV8 - Module 18 - Labs Buffer Overflow.pdf
|
466.7 KB
|
CEHV8 - Module 19 - Cryptography.pdf
|
4.2 MB
|
CEHV8 - Module 19 - Labs Cryptography.pdf
|
1.9 MB
|
CEHV8 - Module 20 - Penetration Testing.pdf
|
4.6 MB
|
CEHV8 - References.pdf
|
2.9 MB
|
Cybercriminalité, Enquète sur les mafias qui envahissent le web.pdf
|
3.4 MB
|
Formation WMware Virtualisation VCP vSphere 5.torrent
|
47.5 KB
|
Frankenstein Slides.pdf
|
2.0 MB
|
Les virus informatiques théorie, pratique et applications [584 pages].pdf
|
20.5 MB
|
Techniques virales avancées [292 pages].pdf
|
14.7 MB
|
/CEHV-7 CERTIFIED-ETHICAL-HACKING/
|
Advanced Python Programming.pdf
|
199.0 KB
|
Attacking The DNS Protocol.pdf
|
330.2 KB
|
CEH-Handbook-v2.0.pdf
|
56.6 MB
|
Certified Ethical Hacker 3.0 Official Course.pdf
|
27.1 MB
|
Cours Newbie.pdf
|
31.6 MB
|
Hacking - CEH Cheat Sheet Exercises.pdf
|
336.2 KB
|
HII_Remote_and_Local_File_Inclusion_Vulnerabilities.pdf
|
1.9 MB
|
Injection HTML Hackin9.pdf
|
1.1 MB
|
Pen_Testing_and_Ethical_Hacking_Study_Guide.pdf
|
1.7 MB
|
/Computer Security/
|
Addison.Wesley.Crimeware.Understanding.New.Attacks.And.Defenses.Apr.2008.ISBN.0321501950.chm
|
10.8 MB
|
Addison.Wesley.The.Technical.And.Social.History.Of.Software.Engineering.Dec.2013.ISBN.0321903420.pdf
|
1.6 MB
|
Apress.Healthcare.Jun.2014.ISBN.1430266767.pdf
|
2.5 MB
|
McGraw.Hill.Principles.Of.Computer.Security.CompTIA.Security.Plus.And.Beyond.Lab.Manual.2nd.Edition.Dec.2010.ISBN.0071748563.pdf
|
5.8 MB
|
Syngress.The.Basics.Of.Digital.Privacy.May.2013.ISBN.0128000112.pdf
|
8.6 MB
|
/Cryptovirology/
|
Malicious Cryptography Techniques for Unreversable.pdf
|
1.3 MB
|
Malicious Cryptology and Mathematics 29700.pdf
|
293.1 KB
|
PublicandPrivateKeyCryptographyWhitePaper-Dec2014.pdf
|
1.7 MB
|
Wiley.Malicious.Cryptography.Exposing.Cryptovirology.Feb.2004.ISBN.0764549758.pdf
|
30.5 MB
|
/Ethical Hacking/
|
McGraw.Hill.Gray.Hat.Hacking.4th.Edition.Jan.2015.ISBN.0071832386.pdf
|
33.9 MB
|
McGraw.Hill.Hacking.Exposed.Linux.3rd.Edition.Jul.2008.ISBN.0072262575.pdf
|
11.0 MB
|
McGraw.Hill.Hacking.Exposed.Network.Security.Secrets.And.Solutions.2nd.Edition.Oct.2000.ISBN.0072127481.pdf
|
8.4 MB
|
McGraw.Hill.Hacking.Exposed.Network.Security.Secrets.And.Solutions.3rd.Edition.Sep.2001.ISBN.0072193816.pdf
|
6.1 MB
|
McGraw.Hill.Hacking.Exposed.Network.Security.Secrets.And.Solutions.5th.Edition.Apr.2005.ISBN.0072260815.chm
|
19.4 MB
|
/Ethical Hacking Modules/
|
Exploit Writing Using Metasploit Framework.pdf
|
656.2 KB
|
Module 03 Footprinting.pdf
|
10.5 MB
|
Module 04 Google Hacking.pdf
|
4.4 MB
|
Module 05 Scanning.pdf
|
17.5 MB
|
Module 06 Enumeration.pdf
|
4.2 MB
|
Module 07 System Hacking.pdf
|
15.8 MB
|
Module 08 Trojans and Backdoors.pdf
|
9.5 MB
|
Module 09 Viruses and Worms.pdf
|
5.8 MB
|
Module 10 Sniffers.pdf
|
10.5 MB
|
Module 11 Social Engineering.pdf
|
5.3 MB
|
Module 12 Phishing.pdf
|
2.7 MB
|
Module 13 Hacking Email Accounts.pdf
|
1.9 MB
|
Module 14 Denial of Service.pdf
|
3.7 MB
|
Module 15 Session Hijacking.pdf
|
2.0 MB
|
Module 16 Hacking Webservers.pdf
|
5.1 MB
|
Module 17 Web Application Vulnerabilities.pdf
|
4.8 MB
|
Module 18 Web based Password Cracking Techniques.pdf
|
5.7 MB
|
Module 19 SQL Injection.pdf
|
3.4 MB
|
Module 20 Hacking Wireless Networks.pdf
|
13.6 MB
|
Module 21 Physical Security.pdf
|
3.2 MB
|
Module 22 Linux Hacking.pdf
|
6.4 MB
|
Module 23 Evading IDS Firewall and Honeypot.pdf
|
5.0 MB
|
Module 24 Buffer Overflows.pdf
|
1.4 MB
|
Module 25 Cryptography.pdf
|
4.3 MB
|
Module 26 Penetration Testing.pdf
|
5.9 MB
|
Module 28 Writing Virus Codes.pdf
|
613.4 KB
|
Module 29 Assembly Language Tutorial.pdf
|
1.0 MB
|
Module 30 Exploit Writing.pdf
|
2.1 MB
|
Module 31 Windows Based Buffer Overflow Exploit Writing.pdf
|
244.7 KB
|
Module 33 Reverse Engineering Techniques.pdf
|
2.9 MB
|
Module 34 MAC OS X Hacking.pdf
|
1.3 MB
|
Module 35 Hacking Routers, Cable Modems and Firewalls.pdf
|
3.4 MB
|
Module 36 Hacking Mobile Phones, PDA and Handheld Devices.pdf
|
4.2 MB
|
Module 37 Bluetooth Hacking.pdf
|
2.6 MB
|
Module 38 VoIP Hacking.pdf
|
4.1 MB
|
Module 39 RFID Hacking.pdf
|
2.3 MB
|
Module 40 Spamming.pdf
|
2.8 MB
|
Module 41 Hacking USB Devices.pdf
|
1.9 MB
|
Module 42 Hacking Database Servers.pdf
|
1.7 MB
|
Module 43 Cyber Warfare- Hacking Al-Qaida and Terrorism.pdf
|
2.8 MB
|
Module 44 Internet Content Filtering Techniques.pdf
|
2.0 MB
|
Module 45 Privacy on the Internet.pdf
|
5.7 MB
|
Module 46 Securing Laptop Computers.pdf
|
2.0 MB
|
Module 47 Spying Technologies.pdf
|
4.5 MB
|
Module 48 Corporate Espionage by Insiders.pdf
|
2.3 MB
|
Module 49 Creating Security Policies.pdf
|
2.2 MB
|
Module 50 Software Piracy and Warez.pdf
|
2.2 MB
|
Module 51 Hacking and Cheating Online Games.pdf
|
2.1 MB
|
Module 52 Hacking RSS and Atom.pdf
|
1.7 MB
|
Module 53 Hacking Web Browsers.pdf
|
2.0 MB
|
Module 54 Proxy Server Technologies.pdf
|
2.4 MB
|
Module 55 Preventing Data Loss.pdf
|
3.9 MB
|
Module 56 Hacking Global Positioning System.pdf
|
2.2 MB
|
Module 57 Computer Forensics and Incident Handling.pdf
|
2.6 MB
|
Module 58 Credit Card Frauds.pdf
|
2.2 MB
|
Module 59 How to Steal Passwords.pdf
|
1.6 MB
|
Module 60 Firewall Technologies.pdf
|
3.0 MB
|
Module 61 Threats and Countermeasures.pdf
|
26.1 MB
|
Module 62 Case Studies.pdf
|
731.0 KB
|
Module 63 Botnets.pdf
|
1.2 MB
|
Module 64 Economic Espionage.pdf
|
668.9 KB
|
Module 65 Patch Management.pdf
|
7.4 MB
|
Module 66 Security Convergence.pdf
|
645.7 KB
|
Module 67 Identifying the Terrorists.pdf
|
1.8 MB
|
/Exploit/WEB game/
|
Addison.Wesley.Learning.Android.Game.Programming.Dec.2011.ISBN.0321769627.pdf
|
11.5 MB
|
Addison.Wesley.Learning.HTML5.Game.Programming.A.Handson.Guide.To.Building.Online.Games.Using.Canvas.SVG.And.WebGL.Oct.2011.ISBN.0321767365.pdf
|
5.2 MB
|
Apress.Beginning.Android.Web.Apps.Development.May.2012.ISBN.1430239573.pdf
|
36.2 MB
|
Apress.Beginning.Facebook.Game.Apps.Development.Mar.2012.ISBN.1430241705.pdf
|
40.6 MB
|
Apress.Beginning.HTML5.Games.With.CreateJS.Mar.2014.ISBN.1430263407.pdf
|
8.9 MB
|
Apress.Beginning.PhoneGap.Mobile.Web.Framework.For.JavaScript.And.HTML5.Feb.2012.ISBN.1430239034.pdf
|
28.3 MB
|
Apress.Building.JavaScript.Games.Sep.2014.ISBN.1430265388.pdf
|
7.2 MB
|
Apress.Enchant.JS.May.2013.ISBN.1430247436.pdf
|
7.2 MB
|
Apress.HTML5.Games.Most.Wanted.Build.The.Best.HTML5.Games.Apr.2012.ISBN.1430239786.pdf
|
26.1 MB
|
Apress.Metro.Revealed.Building.Windows.8.Apps.With.HTML5.And.JavaScript.Jun.2012.ISBN.1430244887.pdf
|
1.5 MB
|
Apress.Pro.Android.Web.Apps.Develop.For.Android.Using.HTML5.CSS3.And.JavaScript.Feb.2011.ISBN.1430232765.pdf
|
14.1 MB
|
Apress.Pro.Windows.8.Development.With.HTML5.And.JavaScript.Nov.2012.ISBN.1430244011.pdf
|
52.9 MB
|
OReilly.Introducing.HTML5.Game.Development.Feb.2012.ISBN.1449315178.pdf
|
6.9 MB
|
Packt.Game.Development.With.Three.JS.Oct.2013.ISBN.1782168532.pdf
|
1.8 MB
|
Packt.HTML5.Game.Development.With.GameMaker.Apr.2013.ISBN.1849694109(1).pdf
|
9.0 MB
|
Packt.HTML5.Game.Development.With.ImpactJS.Mar.2013.ISBN.1849694567.pdf
|
5.4 MB
|
Packt.HTML5.Games.Development.By.Example.Beginners.Guide.Create.Six.Fun.Games.Using.The.Latest.HTML5.Canvas.CSS.And.JavaScript.Techniques.Aug.2011.ISBN.1849691266.pdf
|
9.8 MB
|
Wiley.HTML5.Games.Creating.Fun.With.HTML5.CSS3.And.WebGL.Dec.2011.ISBN.1119975085.pdf
|
11.5 MB
|
/Exploit/
|
Addison.Wesley.Exploiting.Software.How.To.Break.Code.Feb.2004.ISBN.0201786958.pdf
|
8.0 MB
|
Injector.rar
|
13.3 KB
|
Syngress.Zero.Day.Exploit.Countdown.To.Darkness.Aug.2004.ISBN.1931836094.pdf
|
3.9 MB
|
Wiley.The.Shellcoders.Handbook.2nd.Edition.Aug.2007.ISBN.047008023X.pdf
|
3.7 MB
|
/Forensics/
|
Prentice.Hall.Network.Forensics.Jun.2012.ISBN.0132564718.pdf
|
20.8 MB
|
Sybex.Mastering.Windows.Network.Forensics.And.Investigation.2nd.Edition.Jun.2012.ISBN.1118163826.pdf
|
42.1 MB
|
Syngress.The.Basics.Of.Digital.Forensics.Mar.2012.ISBN.1597496618.pdf
|
7.0 MB
|
Wiley.Memory.Jul.2014.ISBN.1118825098.pdf
|
7.5 MB
|
/Hadoop/
|
Dayong Du-Apache Hive Essentials-Packt Publishing - ebooks Account (2015).epub
|
1.4 MB
|
Getting Started with Impala.pdf
|
808.1 KB
|
Getting Started with Impala2.pdf
|
798.4 KB
|
Hadoop.pdf
|
923.8 KB
|
hadoop-illuminated.pdf
|
9.5 MB
|
John Russell-Getting Started with Impala_ Interactive SQL for Apache Hadoop-O'Reilly Media (2014).epub
|
208.1 KB
|
Manning.Hadoop.In.Practice.Oct.2012.ISBN.1617290238.pdf
|
15.5 MB
|
OReilly.Apache.Sqoop.Cookbook.Jul.2013.ISBN.1449364624.pdf
|
9.0 MB
|
OReilly.Hadoop.Operations.Oct.2012.ISBN.1449327052.pdf
|
7.7 MB
|
OReilly.Hadoop.The.Definitive.Guide.3rd.Edition.May.2012.ISBN.1449311520.pdf
|
14.5 MB
|
orielly-cloudera-impala-ebook.pdf
|
6.5 MB
|
Packt.Hadoop.Beginners.Guide.Feb.2013.ISBN.1849517304.pdf
|
12.0 MB
|
Packt.Hadoop.Cluster.Deployment.Nov.2013.ISBN.1783281715.pdf
|
4.5 MB
|
Packt.Learning.Cloudera.Impala.Dec.2013.ISBN.1783281278.pdf
|
2.9 MB
|
/Javascript/nodejs/
|
Alex R. Young, Marc Harter-Node.js in Practice-Manning (2015).pdf
|
7.6 MB
|
Basarat Ali Syed (auth.)-Beginning Node.js-Apress (2014).pdf
|
7.3 MB
|
Fernando Doglio (auth.)-Pro REST API Development with Node.js-Apress (2015).pdf
|
7.5 MB
|
Krasimir Tsonev-Node.js By Example-Packt Publishing - ebooks Account (2015).epub
|
2.0 MB
|
Mario Casciaro-Node.js Design Patterns-Packt Publishing (2014).pdf
|
15.4 MB
|
/Javascript/
|
Apress.Pro.Data.Visualization.Using.R.And.JavaScript.Jun.2013.ISBN.1430258063.pdf
|
9.2 MB
|
Apress.Pro.PHP.And.JQuery.Add.Quick.Smooth.And.Easy.Interactivity.To.Your.PHP.Sites.With.JQuery.Jun.2010.ISBN.1430228474.pdf
|
11.4 MB
|
Manning.Secrets.Of.The.JavaScript.Ninja.Dec.2012.ISBN.193398869X.pdf
|
15.6 MB
|
Morgan.Kaufmann.Object.Oriented.Construction.Handbook.Oct.2004.ISBN.1558606874.pdf
|
6.3 MB
|
No.Starch.The.Principles.Of.Object.Oriented.JavaScript.Feb.2014.ISBN.1593275404.pdf
|
2.7 MB
|
OReilly.JavaScript.Testing.With.Jasmine.Apr.2013.ISBN.1449356370.pdf
|
1.5 MB
|
OReilly.JQuery.Cookbook.Solutions.And.Examples.For.JQuery.Developers.Dec.2009.ISBN.0596159773.pdf
|
6.0 MB
|
OReilly.Programming.JavaScript.Applications.Jul.2014.ISBN.1491950293.pdf
|
8.5 MB
|
Packt.CoffeeScript.Programming.With.JQuery.Rails.And.Node.JS.Dec.2012.ISBN.1849519587.pdf
|
4.2 MB
|
Packt.Creating.2nd.Edition.Feb.2015.ISBN.1783555114.pdf
|
4.5 MB
|
Packt.Creating.Mobile.Apps.With.JQuery.Mobile.Apr.2013.ISBN.178216006X.pdf
|
4.1 MB
|
Packt.JQuery.Mobile.Cookbook.Nov.2012.ISBN.1849517223.pdf
|
4.7 MB
|
Packt.JQuery.UI.1.8.The.User.Interface.Library.For.JQuery.Aug.2011.ISBN.1849516529.pdf
|
7.5 MB
|
Packt.Object.Oriented.JavaScript.2nd.Edition.Jul.2013.ISBN.1849693129.pdf
|
2.2 MB
|
Packt.Object.Oriented.JavaScript.Create.Scalable.Reusable.High.Quality.JavaScript.Applications.And.Libraries.Jul.2008.ISBN.1847194141.pdf
|
7.5 MB
|
Packt.PHP.AJAX.Cookbook.Dec.2011.ISBN.1849513082.pdf
|
5.8 MB
|
Packt.PHP.JQuery.Cookbook.Over.60.Simple.But.Highly.Effective.Recipes.To.Create.Interactive.Web.Applications.Using.PHP.With.JQuery.Dec.2010.ISBN.1849512744.pdf
|
8.5 MB
|
Sitepoint.Javascript.Jan.2015.ISBN.0992461251.pdf
|
5.1 MB
|
SitePoint.JQuery.Novice.To.Ninja.2nd.Edition.Feb.2012.ISBN.0987153013.pdf
|
16.9 MB
|
/kali/
|
CreateSpace.Publishing.Basic.Security.Testing.With.Kali.Linux.Jan.2014.ISBN.1494861275.pdf
|
14.4 MB
|
Packt.Kali.Linux.Apr.2014.ISBN.184951948X.pdf
|
8.2 MB
|
Packt.Kali.Linux.Cookbook.Oct.2013.ISBN.1783289597.pdf
|
11.2 MB
|
Packt.Kali.Linux.CTF.Blueprints.Jul.2014.ISBN.1783985984.pdf
|
3.7 MB
|
Packt.Kali.Linux.Network.Scanning.Cookbook.Aug.2014.ISBN.1783982144.pdf
|
4.8 MB
|
Packt.Kali.Linux.Social.Engineering.Dec.2013.ISBN.1783283270.pdf
|
4.0 MB
|
Packt.Mastering.Kali.Linux.For.Advanced.Penetration.Testing.Jun.2014.ISBN.1782163123.pdf
|
9.4 MB
|
Packt.Web.Penetration.Testing.With.Kali.Linux.Sep.2013.ISBN.1782163166.pdf
|
20.2 MB
|
/Malwares/crypters/
|
419evolution [DataScrambler ].pdf
|
1.9 MB
|
18242.pdf
|
1.0 MB
|
Hyperion_ Implementation of a PE-Crypter.pdf
|
238.7 KB
|
Malware Obfuscation with Threat Emulation.pdf
|
381.0 KB
|
Malware_Magazine_1.pdf
|
5.7 MB
|
Malware1.pdf
|
2.6 MB
|
MITM ATTACK WITH PATCHING BINARIES ON THE FLY BY ADDING SHELLCODES.pdf
|
10.9 MB
|
NocONName_2012-Evadiendo_Antivirus-Uso_de_Crypters.pdf
|
32.2 MB
|
ScyllaHide.pdf
|
429.4 KB
|
UNPROTECTING THE CRYPTER.pdf
|
1.0 MB
|
Utilisation de Stub En VB.NET.pdf
|
556.7 KB
|
vb201407-VB6.pdf
|
348.5 KB
|
/Malwares/mem injection/
|
DEFCON-20-King-Reflective-Injection-Detection.pdf
|
447.7 KB
|
fatkit_dll_rc3.pdf
|
101.9 KB
|
HS-P005_ReflectiveDllInjection.pdf
|
165.9 KB
|
lumension_reflective-memory-injection.pdf
|
404.5 KB
|
/.../comment-iframe_data/
|
4079081201-cmtfp.css
|
16.6 KB
|
4129472539-cmt.js
|
80.4 KB
|
blank.gif
|
0.0 KB
|
close.gif
|
0.3 KB
|
kufF76WnOWhAaPP3-o86SqnOUvjxwo3mm8qz-n8yLf0.js
|
9.4 KB
|
/.../An7i Security_files/fastbutton_data/
|
photo.jpg
|
0.8 KB
|
/.../An7i Security_files/postmessageRelay_data/
|
162488195-postmessagerelay.js
|
8.6 KB
|
api.js
|
13.0 KB
|
corerpcshindig.js
|
68.2 KB
|
/.../An7i Security_files/
|
422439_10150655860234757_828564756_8927229_56595808_n.jpg
|
1.4 KB
|
329677814-widgets.js
|
93.1 KB
|
3846568130-comment_from_post_iframe.js
|
13.7 KB
|
4205868711-css_bundle_v2.css
|
43.0 KB
|
a.jpeg
|
1.6 KB
|
anon36.png
|
1.7 KB
|
arrow_dropdown.gif
|
0.1 KB
|
authorization.css
|
0.1 KB
|
Avatar.jpeg
|
1.8 KB
|
b36-rounded.png
|
0.8 KB
|
cbgapi.loaded_0
|
171.2 KB
|
cbgapi.loaded_1
|
37.1 KB
|
cbgapi.loaded_2
|
7.9 KB
|
comment-iframe.html
|
8.2 KB
|
comments.js
|
399.2 KB
|
cookiechoices.js
|
6.3 KB
|
css.css
|
0.3 KB
|
fastbutton.html
|
39.0 KB
|
ga.js
|
41.0 KB
|
icon_feed12.png
|
0.5 KB
|
icon18_edit_allbkg.gif
|
0.2 KB
|
icon18_wrench_allbkg.png
|
0.5 KB
|
openid36-rounded.png
|
1.3 KB
|
photo.jpg
|
1.8 KB
|
photo_002.jpg
|
1.8 KB
|
photo_003.jpg
|
1.5 KB
|
photo_004.jpg
|
1.6 KB
|
plusone.js
|
37.3 KB
|
postmessageRelay.html
|
0.6 KB
|
shAutoloader.js
|
1.5 KB
|
shCore.css
|
6.2 KB
|
shCore.js
|
16.2 KB
|
shThemeDefault.css
|
2.9 KB
|
subscribe-netvibes.png
|
1.4 KB
|
subscribe-yahoo.png
|
0.6 KB
|
webfont.js
|
16.6 KB
|
/.../Vulnerability analysis, Security Papers, Exploit Tutorials - Part 32480_files/
|
analytics.js
|
25.3 KB
|
bootstrap.js
|
35.6 KB
|
codecolorer.css
|
11.4 KB
|
comment-reply.js
|
0.8 KB
|
css.css
|
1.5 KB
|
css_002.css
|
0.7 KB
|
Defaults.css
|
22.4 KB
|
edb-2015-theme-logo641.png
|
19.9 KB
|
exploit.css
|
5.0 KB
|
font-awesome.css
|
30.5 KB
|
fotorama.css
|
15.1 KB
|
imagesloaded.js
|
6.9 KB
|
jquery.js
|
1.5 KB
|
jquery_002.js
|
100.5 KB
|
jquery_003.js
|
21.8 KB
|
jquery_004.js
|
7.1 KB
|
jquery_005.js
|
96.0 KB
|
jquery_006.js
|
110.0 KB
|
jquery-migrate.js
|
7.2 KB
|
magnific-popup.css
|
9.2 KB
|
motioncss.css
|
43.3 KB
|
motioncss-responsive.css
|
2.1 KB
|
responsive.css
|
10.9 KB
|
scripts.js
|
3.7 KB
|
settings.css
|
55.2 KB
|
style.css
|
184.6 KB
|
ultimate.css
|
471.3 KB
|
ultimate-params.js
|
1.2 KB
|
us.js
|
45.3 KB
|
us_002.js
|
13.4 KB
|
us_impreza_custom_styles.css
|
34.8 KB
|
waypoints.js
|
8.8 KB
|
wbt.css
|
181.5 KB
|
wp-emoji-release.js
|
14.6 KB
|
/Malwares/vectors/
|
An7i Security.html
|
870.7 KB
|
Vulnerability analysis, Security Papers, Exploit Tutorials - Part 32480.html
|
21.8 KB
|
/Malwares/worms/
|
CHAPTER 9 Strategies of Computer Worms.pdf
|
1.7 MB
|
jxia-JCS-wormdetection.pdf
|
434.0 KB
|
/Malwares/
|
(Synthesis Lectures on Information Security, Privacy, and Tru) Christian Krieg, Adrian Dabrowski, Heidelinde Hobel, Katharina Krombholz, Edgar Weippl-Hardware Malware-Morgan & Claypool Publishers (201.pdf
|
1.2 MB
|
0x90.se_-_Malware_Analysis_-_Part_I.pdf
|
927.3 KB
|
03_La complessità del malware.pdf
|
4.2 MB
|
1507.06955v1.pdf
|
159.2 KB
|
34516.pdf
|
207.6 KB
|
34591.pdf
|
1.1 MB
|
Addison.Wesley.The.Art.Of.Computer.Virus.Research.And.Defense.Feb.2005.ISBN.0321304543.chm
|
7.0 MB
|
Aditya Sood and Richard Enbody (Auth.)-Targeted Cyber Attacks. Multi-staged Attacks Driven by Exploits and Malware-Syngress (2014).pdf
|
5.8 MB
|
Advanced Polymorphic Techniques.pdf
|
731.0 KB
|
botnets-detection-measurement-disinfection-defence.pdf
|
4.1 MB
|
darkhotel_kl_07.11.pdf
|
2.7 MB
|
darkhotelappendixindicators_kl.pdf
|
1.4 MB
|
Data Mining Tools for Malware Detection Mehedy Masud, Latifur Khan, Bhavani Thuraisingham--Auerbach Publications,CRC Press (2011).pdf
|
9.4 MB
|
Detect_Malware_w_Memory_Forensics.pdf
|
2.5 MB
|
fighter-pos-whitepaper-en.pdf
|
5.8 MB
|
Financial Malware Analysis - Secrets of ZeuS.pdf
|
642.5 KB
|
FireEye_AdvMalwareExposed.pdf
|
795.5 KB
|
Malware Analyst's Cookbook and DVD.pdf
|
9.4 MB
|
-Mobile Malware Attacks And Defense-Syngress (2011).pdf
|
11.2 MB
|
Mohssen Mohammed_ Al-Sakib Khan Pathan-Automatic defense against zero-day polymorphic worms in communication networks-Auerbach (2013).pdf
|
17.1 MB
|
No.Starch.Practical.Malware.Analisys.Mar.2012.ISBN.1593272901.pdf
|
9.9 MB
|
Packt.Cuckoo.Malware.Analysis.Oct.2013.ISBN.1782169237.pdf
|
7.5 MB
|
Pattern-Oriented-Diagnostics-Debugging-Malware-Analysis-Reversing.pdf
|
10.2 MB
|
Patterns of a Cooperative Malware Analysis Workflow.pdf
|
621.8 KB
|
Springer.Android.Malware.Jun.2013.ISBN.1461473934.pdf
|
3.6 MB
|
Springer.Computer.Viruses.And.Malware.Advances.In.Information.Security.Jul.2006.ISBN.0387302360.pdf
|
11.3 MB
|
Springer.Computer.Viruses.From.Theory.To.Applications.Sep.2005.ISBN.2287239391.pdf
|
2.8 MB
|
Springer.Malware.Forensics.Field.Guide.For.Windows.Systems.Jun.2012.ISBN.1597494720.pdf
|
29.7 MB
|
Spyware_Adware.pdf
|
3.7 MB
|
Syngress.Malware.Forensics.Field.Guide.For.Linux.Systems.Jan.2014.ISBN.1597494704.pdf
|
41.4 MB
|
Syngress.Malware.Forensics.Investigating.And.Analyzing.Malicious.Code.Jun.2008.ISBN.159749268X.pdf
|
26.2 MB
|
The.Rootkit.Arsenal.Escape.and.Evasion.in.the.Dark.Corners.of.the.System,Second.Edition.pdf
|
98.7 MB
|
WGM12349USEN.PDF
|
2.5 MB
|
/.../1. Instant Metasploit Starter/
|
Instant Metasploit Starter - Ranganath, Karthik.epub
|
8.4 MB
|
Instant Metasploit Starter - Ranganath, Karthik.jpg
|
34.1 KB
|
Instant Metasploit Starter - Ranganath, Karthik.opf
|
1.2 KB
|
/.../2. Learning Metasploit Exploitation and Development/
|
Learning Metasploit Exploitation and Development - Balapure, Aditya.epub
|
26.0 MB
|
Learning Metasploit Exploitation and Development - Balapure, Aditya.jpg
|
39.8 KB
|
Learning Metasploit Exploitation and Development - Balapure, Aditya.opf
|
1.3 KB
|
Thumbs.db
|
16.9 KB
|
/Metasploit Books/
|
Aditya Balapure-Learning Metasploit Exploitation and Development-Packt Publishing (2013).pdf
|
9.5 MB
|
Monika Agarwal, Abhinav Singh-Metasploit Penetration Testing Cookbook, Second Edition-Packt Publishing (2013).pdf
|
7.2 MB
|
No.Starch.Meta.Jun.2011.ISBN.159327288X.pdf
|
7.2 MB
|
Packt.Mastering.Metasploit.May.2014.ISBN.1782162224.pdf
|
14.8 MB
|
Packt.Metasploit.Jun.2012.ISBN.1849517428.pdf
|
5.2 MB
|
/MISC/
|
(Lecture Notes in Computer Science 8550 Security and Cryptology) Sven Dietrich (eds.)-Detection of Intrusions and Malware, and Vulnerability Assessment_ 11th International Conference, DIMVA 2014, Egha.pdf
|
9.8 MB
|
(Lecture Notes in Computer Science 9148) Magnus Almgren, Vincenzo Gulisano, Federico Maggi (eds.)-Detection of Intrusions and Malware, and Vulnerability Assessment_ 12th International Conference, DIMV.pdf
|
18.3 MB
|
32719.pdf
|
1.8 MB
|
nsa.pdf
|
11.9 MB
|
/Mobile/
|
OReilly.20.Recipes.For.Programming.PhoneGap.Apr.2012.ISBN.1449319548.pdf
|
6.7 MB
|
Packt.PhoneGap.3.X.Mobile.Application.Development.Hotshot.May.2014.ISBN.1783287926.pdf
|
6.1 MB
|
/Modern Web/
|
No.Starch.The.Modern.Web.Apr.2013.ISBN.1593274874.pdf
|
8.6 MB
|
OReilly.Building.Hypermedia.APIs.With.HTML5.And.Node.Dec.2011.ISBN.1449306578.pdf
|
7.2 MB
|
OReilly.Building.Web.Apps.With.Ember.JS.Aug.20214.ISBN.1449370926.pdf
|
12.1 MB
|
OReilly.Enterprise.Web.Development.Building.HTML5.Jul.2014.ISBN.1449356818.pdf
|
46.2 MB
|
OReilly.Full.Stack.Web.Development.With.Backbone.JS.Jun.2014.ISBN.1449370985.pdf
|
6.7 MB
|
OReilly.Getting.Started.With.GEO.CouchDB.And.Node.JS.Aug.2011.ISBN.1449307523.pdf
|
7.2 MB
|
OReilly.Programming.3D.Applications.With.HTML5.And.WebGL.Mar.2014.ISBN.1449362966.pdf
|
67.1 MB
|
OReilly.Programming.HTML5.Applications.Nov.2011.ISBN.1449399088.pdf
|
8.4 MB
|
OReilly.Restful.Web.Services.Cookbook.Mar.2010.ISBN.0596801688.pdf
|
2.3 MB
|
OReilly.Restful.Web.Services.May.2007.ISBN.0596529260.pdf
|
3.2 MB
|
OReilly.Web.Development.With.Node.And.Express.Jul.2014.ISBN.1491949309.pdf
|
8.5 MB
|
Packt.Building.Impressive.Presentations.With.Impress.Dot.JS.Mar.2013.ISBN.1849696489.pdf
|
2.2 MB
|
Packt.Data.Visualization.With.D3.JS.Cookbook.Oct.2013.ISBN.178216216X.pdf
|
3.2 MB
|
Packt.Data.Visualization.With.D3.JS.Oct.2013.ISBN.1782160000.pdf
|
3.6 MB
|
Packt.Developing.Windows.Store.Apps.With.HTML5.And.JavaScript.Aug.2013.ISBN.1849687102.pdf
|
2.5 MB
|
Packt.Ember.Feb.2013.ISBN.1782163387.pdf
|
3.8 MB
|
Packt.Getting.Started.With.Memcached.Nov.2013.ISBN.1782163220.pdf
|
870.8 KB
|
Packt.HTML5.Graphing.And.Data.Visualization.Cookbook.Nov.2012.ISBN.1849693706.pdf
|
3.8 MB
|
Packt.HTML5.IPhone.Web.Application.Development.May.2013.ISBN.1849691029.pdf
|
9.2 MB
|
Packt.HTML5.Web.Application.Development.By.Example.Jun.2013.ISBN.1849695946.pdf
|
3.0 MB
|
Packt.Oracle.Application.Express.4.0.With.Ext.JS.Mar.2011.ISBN.1849681066.pdf
|
10.0 MB
|
Packt.Social.Data.Visualization.With.HTML5.And.JavaScript.Sep.2013.ISBN.1782166548.pdf
|
1.3 MB
|
Packt.Tableau.Data.Visualization.Cookbook.Aug.2013.ISBN.1849689784.pdf
|
3.7 MB
|
Wrox.Developing.Jul.2009.ISBN.0470414642.pdf
|
6.5 MB
|
/Pentesting Books/PenTest/
|
33859.pdf
|
1.5 MB
|
Cisco.Press.Penetration.Testing.And.Network.Defense.Nov.2005.ISBN.1587052083.chm
|
15.3 MB
|
CRC.Press.Ethical.Hacking.And.Penetration.Testing.Guide.Aug.2014.ISBN.1482231611.pdf
|
23.5 MB
|
CreateSpace.Publishing.The.Hacker.Playbook.Mar.2014.ISBN.1494932636.pdf
|
27.4 MB
|
Linux Penetration Testing Laptop Setup v2.pdf
|
35.9 KB
|
Linux Penetration Testing Laptop Setup v4.pdf
|
88.3 KB
|
No.Starch.Penetration.Testing.Jun.2014.ISBN.1593275641.pdf
|
12.8 MB
|
Packt.Penetration.Testing.With.BackBox.Feb.2014.ISBN.1783282975.pdf
|
6.6 MB
|
Packt.Penetration.Testing.With.The.Bash.Shell.May.2014.ISBN.1849695105.pdf
|
3.6 MB
|
Penetration Testing Philipp Lachberger.pdf
|
317.1 KB
|
Penetration_Testing_Guidance_March_2015.pdf
|
1.1 MB
|
Syngress.Basics.2nd.Edition.Aug.2013.ISBN.0124116442.pdf
|
4.7 MB
|
Syngress.Hacking.And.Penetration.Testing.With.Low.Power.Devices.Sep.2014.ISBN.0128007516.pdf
|
8.7 MB
|
Syngress.Ninja.Hacking.Unconventional.Penetration.Testing.Tactics.And.Techniques.Sep.2010.ISBN.1597495883.pdf
|
10.3 MB
|
The Basics of Hacking and Penetration.pdf
|
3.9 MB
|
Wargames.pdf
|
302.1 KB
|
/.../Professional Penetration Testing 2E- Syngress 2013 [Epub]/
|
Professional Penetration Testing - Wilhelm, Thomas.epub
|
26.3 MB
|
Professional Penetration Testing Cover.jpg
|
191.9 KB
|
Thumbs.db
|
10.8 KB
|
/Pentesting Books/
|
Juned Ahmed Ansari-Web Penetration Testing with Kali Linux-Packt Publishing (2015).epub
|
23.3 MB
|
Learning Penetration Testing wi - Christopher Duffy.azw3
|
10.9 MB
|
Learning Penetration Testing wi - Christopher Duffy.epub
|
9.5 MB
|
Learning Penetration Testing wi - Christopher Duffy.pdf
|
9.6 MB
|
Learning Penetration Testing with Python.azw3
|
10.9 MB
|
Learning Penetration Testing with Python.epub
|
9.5 MB
|
Learning Penetration Testing with Python.pdf
|
9.6 MB
|
No.Starch.Black.Hat.Python.Dec.2014.ISBN.1593275900.pdf
|
2.8 MB
|
No.Starch.Gray.Hat.Python.Aug.2009.ISBN.1593271921.pdf
|
3.7 MB
|
/PHP/
|
Apress.PHP.Dec.2010.ISBN.1430233184.pdf
|
5.0 MB
|
OReilly.PHP.Cookbook.3rd.Edition.Jul.2014.ISBN.144936375X.pdf
|
12.6 MB
|
OReilly.PHP.Web.Services.May.2013.ISBN.1449356567.pdf
|
10.7 MB
|
Packt.PHP.Oracle.Web.Development.Data.Processing.Security.Caching.XML.Web.Services.And.AJAX.Jul.2007.ISBN.1847193633.pdf
|
7.4 MB
|
Packt.Restfull.Oct.2008.ISBN.1847195520.pdf
|
13.3 MB
|
Packt.Smarty.PHP.Template.Programming.And.Applications.A.Step.By.Step.Guide.To.Building.PHP.Websites.And.Applications.Using.The.Smarty.Templating.Engine.Apr.2006.ISBN.190481140X.pdf
|
6.9 MB
|
/Physical devices/
|
Syngress.Black.Oct.2004.ISBN.193226681X.pdf
|
74.8 MB
|
/.../Invent with Python/Comp Files/
|
AISim1.py
|
9.1 KB
|
AISim2.py
|
9.4 KB
|
AISim3.py
|
11.6 KB
|
animation.py
|
2.7 KB
|
background.mid
|
7.2 KB
|
baddie.png
|
0.4 KB
|
bagels.py
|
2.3 KB
|
buggy.py
|
0.3 KB
|
cherry.png
|
0.4 KB
|
cipher.py
|
1.4 KB
|
collisionDetection.py
|
4.0 KB
|
dodger.py
|
7.1 KB
|
dragon.py
|
1.2 KB
|
gameover.wav
|
258.9 KB
|
guess.py
|
0.9 KB
|
hangman.py
|
4.1 KB
|
hello.py
|
0.2 KB
|
hello2.py
|
0.2 KB
|
jokes.py
|
0.4 KB
|
pickup.wav
|
8.5 KB
|
player.png
|
0.9 KB
|
pygameHelloWorld.py
|
1.9 KB
|
pygameInput.py
|
3.6 KB
|
reversi.py
|
10.1 KB
|
sonar.py
|
7.3 KB
|
spritesAndSounds.py
|
4.3 KB
|
tictactoe.py
|
6.3 KB
|
/.../Invent with Python/
|
Invent with Python.pdf
|
4.8 MB
|
Thumbs.db
|
11.3 KB
|
/Violent Python/Companion Files/CH1/
|
1-vulnScanner.py
|
1.3 KB
|
2-passwdCrack.py
|
0.8 KB
|
3-zipCrack.py
|
1.0 KB
|
dictionary.txt
|
0.1 KB
|
evil.zip
|
35.8 KB
|
passwords.txt
|
0.1 KB
|
vuln-banners.txt
|
0.4 KB
|
/Violent Python/Companion Files/CH2/
|
1-portScan.py
|
1.7 KB
|
2-nmapScan.py
|
0.9 KB
|
3-botNet.py
|
1.1 KB
|
3-bruteKey.py
|
2.4 KB
|
3-pxsshCommand.py
|
0.4 KB
|
3-sshBrute.py
|
1.9 KB
|
3-sshCommand.py
|
1.1 KB
|
4-anonLogin.py
|
0.5 KB
|
4-bruteLogin.py
|
0.8 KB
|
4-defaultPages.py
|
0.6 KB
|
4-injectPage.py
|
0.6 KB
|
4-massCompromise.py
|
3.5 KB
|
5-conficker.py
|
3.2 KB
|
6-freeFloat.py
|
3.1 KB
|
pass.txt
|
0.0 KB
|
userpass.txt
|
0.1 KB
|
/Violent Python/Companion Files/CH3/
|
1-discoverNetworks.py
|
2.4 KB
|
2-dumpRecycleBin.py
|
1.0 KB
|
3-pdfRead.py
|
0.8 KB
|
4-exifFetch.py
|
1.8 KB
|
5-skypeParse.py
|
3.1 KB
|
6-firefoxParse.py
|
3.7 KB
|
7-iphoneMessages.py
|
1.6 KB
|
firefox_profile.zip
|
32.4 KB
|
skype_profile.zip
|
10.7 KB
|
/Violent Python/Companion Files/CH4/
|
1-geoIP.py
|
0.5 KB
|
2-printDirection.py
|
0.5 KB
|
3-geoPrint.py
|
1.3 KB
|
4-googleEarthPcap.py
|
1.6 KB
|
5-findDDoS.py
|
2.9 KB
|
6-spoofDetect.py
|
1.4 KB
|
7-testFastFlux.py
|
0.7 KB
|
8-testDomainFlux.py
|
0.6 KB
|
9-mitnickAttack.py
|
2.0 KB
|
10-idsFoil.py
|
2.3 KB
|
attack.pcap
|
10.0 MB
|
domainFlux.pcap
|
4.3 KB
|
download.pcap
|
1.0 KB
|
fastFlux.pcap
|
8.7 KB
|
geotest.kml
|
2.1 KB
|
geotest.pcap
|
0.7 KB
|
hivemind.pcap
|
0.5 KB
|
/Violent Python/Companion Files/CH5/
|
1-testSniff.py
|
0.4 KB
|
2-creditSniff.py
|
1.1 KB
|
3-hotelSniff.py
|
0.9 KB
|
4-googleSniff.py
|
1.1 KB
|
5-ftpSniff.py
|
1.0 KB
|
6-sniffHidden.py
|
0.8 KB
|
6-sniffProbe.py
|
0.4 KB
|
7-dup.py
|
1.4 KB
|
7-uavSniff.py
|
1.9 KB
|
8-fireCatcher.py
|
1.1 KB
|
9-btFind.py
|
0.5 KB
|
9-btScan.py
|
0.4 KB
|
10-iphoneFinder.py
|
0.9 KB
|
11-rfcommScan.py
|
0.4 KB
|
12-sdpScan.py
|
0.4 KB
|
13-ninjaPrint.py
|
0.3 KB
|
14-blueBug.py
|
0.4 KB
|
dup.py
|
1.4 KB
|
/Violent Python/Companion Files/CH6/
|
1-viewPage.py
|
0.2 KB
|
2-proxyTest.py
|
0.3 KB
|
3-userAgentTest.py
|
0.4 KB
|
4-printCookies.py
|
0.3 KB
|
5-kittenTest.py
|
0.3 KB
|
6-linkParser.py
|
1.1 KB
|
7-imageMirror.py
|
1.3 KB
|
8-anonGoogle.py
|
1.3 KB
|
8-googleJson.py
|
0.4 KB
|
8-googleJumbled.py
|
0.3 KB
|
9-twitterClass.py
|
2.6 KB
|
9-twitterGeo.py
|
2.1 KB
|
9-twitterInterests.py
|
2.4 KB
|
9-twitterRecon.py
|
1.3 KB
|
10-sendMail.py
|
0.8 KB
|
10-sendSpam.py
|
2.7 KB
|
anonBrowser.py
|
1.2 KB
|
anonBrowser.pyc
|
2.4 KB
|
mlb-cities.txt
|
0.3 KB
|
twitterClass.py
|
2.6 KB
|
/Violent Python/Companion Files/CH7/
|
2-virusCheck.py
|
2.5 KB
|
/Violent Python/
|
Thumbs.db
|
12.3 KB
|
Violent Python - A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers.pdf
|
8.2 MB
|
/Python Programming Books/
|
byteofpython_120.pdf
|
240.4 KB
|
Head First Python.pdf
|
29.6 MB
|
No_Starch_Press_-_Gray_Hat_Python_-_Python_Programming_for_Hackers_and_Reverse_Engineers_[]_(2009)_en.pdf
|
3.2 MB
|
Packt.Python.Data.Visualization.Cookbook.Nov.2013.ISBN.1782163360.pdf
|
5.5 MB
|
Packt.Python.Penetration.Testing.Essentials.Feb.2015.ISBN.1784398586.pdf
|
3.3 MB
|
Python Cookbook 3rd Edition 2013.pdf
|
10.3 MB
|
Python Programming for the Absolute Beginner, 3rd Edition -nelly-.pdf
|
13.2 MB
|
thinkpython.pdf
|
835.2 KB
|
/Reverse Engineering/
|
Practical Reverse Engineering.pdf
|
5.5 MB
|
/Semantic web/
|
Academic.Press.Introduction.To.The.Semantic.Web.And.Semantic.Web.Services.Jun.2007.ISBN.1584889330.pdf
|
9.2 MB
|
IGI.Global.Semantic.Web.Services.Theory.Tools.And.Applications.Mar.2007.ISBN.159904045X.pdf
|
10.2 MB
|
IOS.Press.Ontology.And.The.Semantic.Web.Volume.156.Frontiers.In.Artificial.Intelligence.And.Applications.Apr.2007.ISBN.1586037293.pdf
|
2.0 MB
|
MIT.Press.A.Semantic.Web.Primer.2nd.Edition.Mar.2008.ISBN.0262012421.pdf
|
2.5 MB
|
OReilly.Programming.The.Semantic.Web.Jul.2009.ISBN.0596153813.pdf
|
6.5 MB
|
Springer.Agent.Based.Semantic.Web.Service.Composition.Aug.2012.ISBN.1461446627.pdf
|
3.3 MB
|
Springer.Modeling.Semantic.Web.Services.The.Web.Service.Modeling.Language.Jul.2008.ISBN.3540681698.pdf
|
4.6 MB
|
Springer.Ontology.Management.Semantic.Web.Semantic.Web.Services.And.Business.Applications.Dec.2007.ISBN.038769899X.pdf
|
3.9 MB
|
Springer.Sem.Apr.2013.ISBN.3642364020.pdf
|
13.0 MB
|
Springer.Semantic.Web.Concepts.Technologies.And.Applications.Jan.2007.ISBN.184628581X.pdf
|
4.6 MB
|
Wiley.Semantic.Web.And.Model.Driven.Engineering.Jun.2012.ISBN.1118004175.pdf
|
6.8 MB
|
/Social Engineering/
|
Social Engineering Pen Tests - Gavin Watson, Andrew Mason and Richard Ackroyd (Auth.)-Social Engineering Penetration Testing. Executing , Assessments and Defense-Syngress (2014).pdf
|
15.8 MB
|
The_Art_of_Human_Hacking.pdf
|
6.4 MB
|
Wiley.Social.Engineering.And.Nonverbal.Behavior.Set.Feb.2014.ISBN.1118906713.pdf
|
145.9 MB
|
Wiley.Social.Engineering.The.Art.Of.Human.Hacking.Dec.2010.ISBN.0470639539.pdf
|
6.4 MB
|
/.../No.Starch.Metasploit.Jul.2011/
|
No.Starch.Metasploit.Jul.2011.epub
|
3.7 MB
|
No.Starch.Metasploit.Jul.2011.pdf
|
7.3 MB
|
/.../The Basics of Web Hacking- Syngress 2013 [Epub]/
|
Basics of Web Hacking, The - Pauli, Josh.epub
|
3.7 MB
|
Basics of Web Hacking, The - Pauli, Josh.jpg
|
122.9 KB
|
Basics of Web Hacking, The - Pauli, Josh.opf
|
1.3 KB
|
Thumbs.db
|
13.8 KB
|
/.../The Web Application Hacker's Handbook -Finding and Exploiting Security Flaws V413HAV/
|
The Web Application Hacker's Handbook -Finding and Exploiting Security Flaws V413HAV.pdf
|
14.2 MB
|
/.../Windows Server 2012 Inside Out V413HAV/
|
Read Me.txt
|
0.7 KB
|
Windows Server 2012 Inside Out V413HAV.epub
|
21.4 MB
|
Windows Server 2012 Inside Out V413HAV.pdf
|
34.8 MB
|
/Web Hacking Books/
|
32373.pdf
|
1.8 MB
|
33253.pdf
|
453.0 KB
|
33931.pdf
|
847.2 KB
|
how-to-instrument-for-advanced-web-application-penetration-testing.pdf
|
981.4 KB
|
Kali Linux Cookbook.pdf
|
10.9 MB
|
Nmap Cookbook The Fat-free Guide to Network Scanning.pdf
|
6.6 MB
|
No.Starch.The.Tangled.Web.Nov.2011.ISBN.1593273886.pdf
|
4.2 MB
|
Packt.Dreamweaver.CS6.Mobile.And.Web.Development.With.HTML5.CSS3.And.JQuery.Mobile.May.2013.ISBN.1849694745.pdf
|
9.7 MB
|
pfSense 2 Cookbook (2011).pdf
|
12.3 MB
|
SQL Injection Attacks and Defense - Justin Clarke.2ed.pdf
|
9.0 MB
|
Syngress.Hacking.Web.Apps.Sep.2012.ISBN.159749951X.pdf
|
23.0 MB
|
Syngress.SQL.Injection.Attacks.And.Defense.2nd.Edition.Jul.2012.ISBN.1597499633.pdf
|
6.7 MB
|
Syngress.Web.Application.Vulnerabilities.Detect.Exploit.Prevent.Dec.2007.ISBN.1597492094.pdf
|
21.9 MB
|
Syngress.XSS.May.2007.ISBN.1597491543.pdf
|
60.3 MB
|
XSS Attacks - Exploits and Defense.pdf
|
7.7 MB
|
/wifi 802.11/
|
Addison.Wesley.Real.802.Dot.11.Security.WiFi.Protected.Access.And.802.Dot.11.I.Jul.2003.ISBN.0321136209.chm
|
3.1 MB
|
Addison.Wesley.WiFoo.The.Secrets.Of.Wireless.Hacking.Jul.2004.ISBN.0321202171.chm
|
7.1 MB
|
Cisco.Press.WiFi.Hotspots.Setting.Up.Public.Wireless.Internet.Access.Oct.2006.ISBN.1587052660.chm
|
9.1 MB
|
McGraw.Hill.Hacking.Exposed.Wireless.2nd.Edition.Aug.2010.ISBN.0071666613.pdf
|
11.6 MB
|
Newnes.Bulletproof.Wireless.Security.Jun.2005.ISBN.0750677465.pdf
|
3.5 MB
|
OReilly.802.Dot.11.Security.Dec.2002.ISBN.0596002904.pdf
|
933.9 KB
|
Total files 736
|