FileMood

Download Hacking Books

Hacking Books

Name

Hacking Books

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

5.4 GB

Total Files

736

Hash

240C492E41ABD4FEDD055DC4D99ADD5E3AC4F9AF

/Antiviruses/

2012_EPP_CAR_Consumer_Exploit_Evasion_Defenses_0.pdf

275.5 KB

34591.pdf

1.1 MB

An Automated Online Packing Service for Optimal Antivirus Evasion.pdf

175.6 KB

Antivirus , Firewall evasion techiniques.pdf

633.7 KB

AV_Evasion.pdf

443.4 KB

avevasion-techniques.pdf

771.2 KB

AV-Sandbox-Presentation_v2.0.pdf

257.8 KB

BypassAVDynamics.pdf

1.0 MB

bypassing-av.pdf

1.1 MB

Evading Antivirus Metasploit Webcast.pdf

628.9 KB

evasive_threats.pdf

1.3 MB

Fighting_Advanced_Threats.pdf

2.1 MB

IJOPCM(vol.1.2.3.S.08).pdf

86.5 KB

MalWareBytes_sSecurity_IO#113914_Eguide_031714_LI#839558.pdf

775.3 KB

Practical Anti-virus Evasion - avevasion_pentestmag.pdf

362.2 KB

rp-nss-labs-corporate-exploit-evasion-defenses.pdf

189.6 KB

Ryan Linn - Getting Shells When Metasploit Fails - Sector 2012.pdf

673.5 KB

security-guide-how-to-evade-anti-virus-detection.pdf

172.0 KB

Testing antivirus engines to determine theireffectiveness as a security layer.pdf

570.7 KB

The Deathof AV DefenseinDepth _- revisiting Anti-Virus Software.pdf

2.4 MB

The State of the Veil Framework - Will Schroeder and Chris Truncer.pdf

744.6 KB

us-14-Mesbahi-One-Packer-To-Rule-Them-All-WP.pdf

2.5 MB

us-15-Xenakis-ROPInjector-Using-Return-Oriented-Programming-For-Polymorphism-And-Antivirus-Evasion.pdf

383.5 KB

us-15-Xenakis-ROPInjector-Using-Return-Oriented-Programming-For-Polymorphism-And-Antivirus-Evasion-wp.pdf

724.3 KB

Why_Antivirus_Fails_-_Daniel_Sauder.pdf

1.3 MB

why_malware_works_in_face_of_antivirus_software.pdf

793.8 KB

woot09-polypack-pres.pdf

1.9 MB

WP_SerialVariantEvasionTactics.pdf

1.2 MB

Writing Zero Days for Security - APT Penetration Testing Framework v1.0.pdf

3.7 MB

/APT/

2014-apt-study.pdf

169.5 KB

Advanced Penetration Testing for Highly Secured Environments.pdf

16.6 MB

Advanced Persistent Threat Hacking The Art and Science of Hacking Any Organization.azw3

8.8 MB

Advanced Persistent Threat Hacking The Art and Science of Hacking Any Organization.epub

6.0 MB

Advanced Persistent Threat Hacking The Art and Science of Hacking Any Organization.mobi

9.7 MB

Advanced Persistent Threat Hacking, The Art & Science...pdf

11.1 MB

Advanced Persistent Threat Hacking.azw3

8.8 MB

Advanced Persistent Threat Hacking.epub

6.0 MB

Advanced Persistent Threat Hacking.mobi

9.7 MB

advanced-persistent-threat-id52631.pdf

83.8 KB

advance-penetration-testing-kali-linux-training.pdf

36.1 KB

b-advanced_persistent_threats_WP_21215957.en-us.pdf

3.1 MB

CybraryAdvancedPenSlides.pdf

2.4 MB

Data Structures and Algorithms in C++, 4th Edition.rar

41.8 MB

esg-apts-deep-discovery-whitepaper-en.pdf

494.0 KB

HTML5 & CSS3 The Complete Manual 2014.pdf

19.3 MB

Syngress.Advanced.Persistent.Threat.Nov.2012.ISBN.1597499498.pdf

7.5 MB

Tyler Wrightson-Advanced Persistent Threat Hacking_ The Art and Science of Hacking Any Organization-McGraw-Hill (2015).pdf

11.1 MB

Will Gragido, John Pirc-Cybercrime and Espionage_ An Analysis of Subversive Multi-Vector Threats-Syngress (2011).pdf

15.0 MB

/Assorted books/

(Chapman & Hall_CRC Texts in Statistical Science) Andrew Gelman, John B. Carlin, Hal S. Stern, David B. Dunson, Aki Vehtari, Donald B. Rubin-Bayesian Data Analysis-Chapman and Hall_CRC (2014).pdf

14.5 MB

(Information science and statistics) Christopher M. Bishop-Pattern Recognition and Machine Learning-Springer (2006).pdf

8.5 MB

(Pocket Reference) Tony Stubblebine-Regular Expression Pocket Reference_ Regular Expressions for Perl, Ruby, PHP, Python, C, Java and .NET-O'Reilly Media (2007).pdf

1.0 MB

a.txt

8.6 KB

Aamir Lakhani, Joseph Muniz-Penetration Testing with Raspberry Pi-Packt Publishing (2015).pdf

10.2 MB

Aaron Johns-Mastering Wireless Penetration Testing for Highly-Secured Environments-Packt Publishing (2015).pdf

12.9 MB

Advanced Persistent Threat Hacking The Art and Science of Hacking Any Organization by Tyler Wrightson - Not Enough Apt For Me .pdf

23.7 KB

Al Sweigart-Hacking Secret Ciphers with Python_ A beginner's guide to cryptography and computer programming with Python-CreateSpace Independent Publishing Platform (2013).pdf

6.9 MB

Allen Downey B.-Think Bayes-O'Reilly Media (2013).pdf

12.3 MB

analisi_tecnica_rsi_relative_strentgh_index_significato_formula_intepretazione_tempi_ed_esempi.pdf

408.5 KB

Bachaalany, Elias_ Koret, Joxean-The Antivirus Hacker's Handbook-Wiley (2015).pdf

5.9 MB

Bastian Ballmann-Understanding Network Hacks_ Attack and Defense with Python-Springer (2015).pdf

11.4 MB

Ben Clark-Rtfm_ Red Team Field Manual-CreateSpace Independent Publishing Platform (2014).pdf

10.7 MB

Chris Sanders and Jason Smith (Auth.)-Applied Network Security Monitoring. Collection, Detection, and Analysis (2014).pdf

39.2 MB

David Nathans-Designing and Building Security Operations Center-Syngress (2014).pdf

3.6 MB

Douglas Berdeaux-Penetration Testing with Perl-Packt Publishing - ebooks Account (2015).pdf

4.6 MB

Drew Conway, John Myles White-Machine Learning for Hackers-O'Reilly Media (2012).pdf

24.2 MB

Enrico Perla B.Sc. Computer Science University of Torino M.Sc. Computer Science Trinity College Dublin, Massimiliano Oldani-A Guide to Kernel Exploitation_ Attacking the Core-Syngress (2010).pdf

5.5 MB

FirstStrike_Plus.pdf

175.3 KB

Ivan Ristic-Bulletproof SSL and TLS_ Understanding and Deploying SSL_TLS and PKI to Secure Servers and Web Applications-Feisty Duck (2014).pdf

7.1 MB

J.J. MURPHY-ANALISI TECNICA DEI MERCATI FINANZIARI.pdf

16.2 MB

Jacob Perkins-Python 3 Text Processing with NLTK 3 Cookbook-Packt Publishing - ebooks Account (2014).pdf

1.7 MB

Jason Andress, Ryan Linn-Coding for Penetration Testers_ Building Better Tools -Syngress (2011).pdf

10.4 MB

Jay Jacobs, Bob Rudis-Data-Driven Security_ Analysis, Visualization and Dashboards-Wiley (2014).pdf

8.6 MB

Jennifer Golbeck-Introduction to Social Media Investigation_ A Hands-on Approach-Syngress (2015).pdf

62.2 MB

Jeremy Faircloth-Penetration Tester's Open Source Toolkit, Third Edition -Elsevier Science (2011).pdf

17.8 MB

Johnny Long, Bill Gardner, Justin Brown-Google Hacking for Penetration Testers-Syngress (2015).pdf

38.5 MB

Loraine Blaxter, Christina Hughes, Malcolm Tight-How to Research, 4th Edition -Open University Press (2010).pdf

1.3 MB

Luis Pedro Coelho, Willi Richert-Building Machine Learning Systems with Python-Packt Publishing (2015).pdf

6.8 MB

Lutz M.-Python pocket reference-O'Reilly (2014).pdf

2.5 MB

Matthew A. Russell-Mining the social web_ data mining Facebook, Twitter, LinkedIn, Google+, GitHub, and more-O'Reilly Media (2013).pdf

22.1 MB

Micha Gorelick, Ian Ozsvald-High Performance Python_ Practical Performant Programming for Humans-O'Reilly Media (2014).pdf

8.0 MB

Michael Collins-Network Security Through Data Analysis_ Building Situational Awareness-O'Reilly Media (2014).pdf

14.1 MB

Nicholas Marsh-Nmap 6 Cookbook_ The Fat Free Guide to Network Security Scanning-CreateSpace Independent Publishing Platform (2015).epub

964.8 KB

Paulino Calderon Pale-Mastering Nmap Scripting Engine-Packt Publishing (2015).pdf

2.0 MB

Qing Li, Gregory Clark-Security Intelligence_ A Practitioner's Guide to Solving Enterprise Security Challenges-Wiley (2015).pdf

22.6 MB

Richard Lawson-Web Scraping with Python-Packt Publishing (2015).pdf

5.5 MB

Ryan Mitchell-Web Scraping with Python_ Collecting Data from the Modern Web-O'Reilly Media (2015).pdf

6.4 MB

Sam Newman-Building Microservices-O'Reilly Media (2015).pdf

5.0 MB

Steven Bird, Ewan Klein, Edward Loper-Natural Language Processing with Python-O'Reilly Media (2009).pdf

5.4 MB

Sudhanshu Chauhan, Nutan Kumar Panda-Hacking Web Intelligence_ Open Source Intelligence and Web Reconnaissance Concepts and Techniques-Syngress (2015).pdf

38.2 MB

Toby Segaran-Programming Collective Intelligence_ Building Smart Web 2.0 Applications-O'Reilly Media (2007).pdf

3.5 MB

Wes McKinney-Python for Data Analysis-O'Reilly Media (2012).pdf

14.8 MB

wireless_hacking_presentation.pdf

2.3 MB

Yuxing Yan-Python for Finance-Packt Publishing - ebooks Account (2014).pdf

5.1 MB

Yves Hilpisch-Python for Finance_ Analyze Big Financial Data-O'Reilly Media (2014).pdf

11.0 MB

/Big Data/

Apress.Big.Data.Imperatives.Jun.2013.ISBN.1430248726.pdf

10.5 MB

Morgan.Kaufmann.Data.Warehousing.In.The.Age.Of.Big.Data.Jun.2013.ISBN.0124058914.pdf

17.2 MB

OReilly.Data.Science.For.Business.Aug.2013.ISBN.1449361323.pdf

15.2 MB

OReilly.Ethics.Of.Big.Data.Sep.2012.ISBN.1449311792.pdf

6.2 MB

Packt.Big.Data.Analytics.With.R.And.Hadoop.Nov.2013.ISBN.178216328X.pdf

3.2 MB

Wiley.Big.Data.Oct.2013.ISBN.1118739574(1).pdf

21.6 MB

Wiley.Big.Feb.2015.ISBN.1118965833.pdf

4.8 MB

Wiley.Data.May.2013.ISBN.111844714X.pdf

33.6 MB

Wiley.Data.Mining.May.2014.ISBN.1119977134.pdf

16.5 MB

Wiley.Making.2nd.Edition.Aug.2014.ISBN.1118407415.pdf

8.4 MB

/C++/

1133608426_Algorith.pdf

22.4 MB

Data Structures and Algorithms in C++ 4th Edition.pdf

22.4 MB

Data Structures and Algorithms in C++, 4th Edition.pdf

22.4 MB

/.../CEH Course(Books and videos)/

CEHV7 - Legal_Disclaimer.htm

24.3 KB

CEHV7 - Module 01 - Introduction to Ethical Hacking.pdf

5.2 MB

CEHV7 - Module 02 - Footprinting and Reconnaissance.pdf

8.9 MB

CEHV7 - Module 03 - Scanning Networks.pdf

16.7 MB

CEHV7 - Module 04 - Enumeration.pdf

7.0 MB

CEHV7 - Module 05 - System Hacking.pdf

23.9 MB

CEHV7 - Module 06 - Trojans and Backdoors.pdf

15.2 MB

CEHV7 - Module 07 - Viruses and Worms.pdf

12.0 MB

CEHV7 - Module 08 - Sniffers.pdf

13.8 MB

CEHV7 - Module 09 - Social Engineering.pdf

11.1 MB

CEHV7 - Module 10 - Denial of Service.pdf

10.0 MB

CEHV7 - Module 11 - Session Hijacking.pdf

7.9 MB

CEHV7 - Module 12 - Hacking Webservers.pdf

12.3 MB

CEHV7 - Module 13 - Hacking Web Applications.pdf

24.7 MB

CEHV7 - Module 14 - SQL Injection.pdf

15.4 MB

CEHV7 - Module 15 - Hacking Wireless Networks.pdf

25.0 MB

CEHV7 - Module 16 - Evading IDS, Firewalls, and Honeypots.pdf

17.2 MB

CEHV7 - Module 17 - Buffer Overflow.pdf

8.7 MB

CEHV7 - Module 18 - Cryptography.pdf

7.4 MB

CEHV7 - Module 19 - Penetration Testing.pdf

10.9 MB

CEHV7- 01 -Certified Ethical Hacker Series Introduction.flv

9.4 MB

CEHV7- 02 -Introduction to Certified Ethical Hacking.flv

45.4 MB

CEHV7- 03 - VMWare and Linux .flv

93.5 MB

CEHV7- 04 - Footprinting and Reconnaissance Part 1.flv

75.7 MB

CEHV7- 05 - Footprinting and Reconnaissance Part 2.flv

35.1 MB

CEHV7- 06 - Scanning Part 1.flv

38.3 MB

CEHV7- 07 - Scanning Part 2.flv

54.8 MB

CEHV7- 08 - Enumeration.flv

46.2 MB

CEHV7- 09 - Passwords Part 1 Windows.flv

35.4 MB

CEHV7- 10 - Passwords Part 2 Linux.flv

32.2 MB

CEHV7- 11 - System Hacking.flv

56.2 MB

CEHV7- 12 - Malware.flv

47.2 MB

CEHV7- 13 - Hack-O_Rama.flv

41.7 MB

CEHV7- 14 - Sniffing.flv

75.2 MB

CEHV7- 15 - Social Engineering.flv

46.2 MB

CEHV7- 16 - Denial of Service.flv

29.0 MB

CEHV7- 17 - Session Hijacking.flv

51.2 MB

CEHV7- 18 - Web and SQL Hacking.flv

55.5 MB

CEHV7- 19 - Cryptography.flv

47.0 MB

CEHV7- 20 - Intrusion Detection Systems.flv

23.3 MB

CEHV7- 21 - Hacking Wireless Networks.flv

50.2 MB

CEHV7- Certified Ethical Hacker Study Guide.pdf

7.0 MB

CEHV8 - Hacker Halted.pdf

1.2 MB

CEHV8 - Module 00 - Labs Countermeasures.pdf

101.5 KB

CEHV8 - Module 01 - Introduction to Ethical Hacking.pdf

4.1 MB

CEHV8 - Module 02 - Footprinting and Reconnaissance.pdf

8.2 MB

CEHV8 - Module 02 - Labs Footprinting and Reconnaissance.pdf

3.6 MB

CEHV8 - Module 03 - Labs Scanning Networks.pdf

6.8 MB

CEHV8 - Module 03 - Scanning Networks.pdf

8.7 MB

CEHV8 - Module 04 - Enumeration.pdf

4.0 MB

CEHV8 - Module 04 - Labs Enumeration.pdf

1.5 MB

CEHV8 - Module 05 - Labs System Hacking.pdf

4.8 MB

CEHV8 - Module 05 - System Hacking .pdf

14.7 MB

CEHV8 - Module 06 - Labs Trojans and Backdoors.pdf

4.4 MB

CEHV8 - Module 06 - Trojans and Backdoors.pdf

9.1 MB

CEHV8 - Module 07 - Labs Viruses and Worms.pdf

2.5 MB

CEHV8 - Module 07 - Viruses and Worms.pdf

5.1 MB

CEHV8 - Module 08 - Labs Sniffers.pdf

4.4 MB

CEHV8 - Module 08 - Sniffing.pdf

8.4 MB

CEHV8 - Module 09 - Labs Social Engineering.pdf

1.2 MB

CEHV8 - Module 09 - Social Engineering.pdf

5.4 MB

CEHV8 - Module 10 - Denial of Service.pdf

5.1 MB

CEHV8 - Module 10 - Labs Denial of Service.pdf

523.9 KB

CEHV8 - Module 11 - Labs Session Hijacking.pdf

684.0 KB

CEHV8 - Module 11 - Session Hijacking.pdf

4.5 MB

CEHV8 - Module 12 - Hacking Webservers.pdf

6.0 MB

CEHV8 - Module 12 - Labs Hacking Webservers.pdf

1.3 MB

CEHV8 - Module 13 - Hacking Web Applications .pdf

12.5 MB

CEHV8 - Module 13 - Labs Hacking Web Applications.pdf

907.4 KB

CEHV8 - Module 14 - Labs SQL Injection.pdf

1.6 MB

CEHV8 - Module 14 - SQL Injection.pdf

7.2 MB

CEHV8 - Module 15 - Hacking Wireless Networks.pdf

12.7 MB

CEHV8 - Module 15 - Labs Hacking Wireless Networks.pdf

1.3 MB

CEHV8 - Module 16 - Hacking Mobile Platforms.pdf

7.3 MB

CEHV8 - Module 17 - Evading IDS, Firewalls, and Honeypots.pdf

6.8 MB

CEHV8 - Module 17 - Labs Evading IDS, Firewalls and Honeypots.pdf

2.4 MB

CEHV8 - Module 18 - Buffer Overflow.pdf

4.2 MB

CEHV8 - Module 18 - Labs Buffer Overflow.pdf

466.7 KB

CEHV8 - Module 19 - Cryptography.pdf

4.2 MB

CEHV8 - Module 19 - Labs Cryptography.pdf

1.9 MB

CEHV8 - Module 20 - Penetration Testing.pdf

4.6 MB

CEHV8 - References.pdf

2.9 MB

Cybercriminalité, Enquète sur les mafias qui envahissent le web.pdf

3.4 MB

Formation WMware Virtualisation VCP vSphere 5.torrent

47.5 KB

Frankenstein Slides.pdf

2.0 MB

Les virus informatiques théorie, pratique et applications [584 pages].pdf

20.5 MB

Techniques virales avancées [292 pages].pdf

14.7 MB

/CEHV-7 CERTIFIED-ETHICAL-HACKING/

Advanced Python Programming.pdf

199.0 KB

Attacking The DNS Protocol.pdf

330.2 KB

CEH-Handbook-v2.0.pdf

56.6 MB

Certified Ethical Hacker 3.0 Official Course.pdf

27.1 MB

Cours Newbie.pdf

31.6 MB

Hacking - CEH Cheat Sheet Exercises.pdf

336.2 KB

HII_Remote_and_Local_File_Inclusion_Vulnerabilities.pdf

1.9 MB

Injection HTML Hackin9.pdf

1.1 MB

Pen_Testing_and_Ethical_Hacking_Study_Guide.pdf

1.7 MB

/Computer Security/

Addison.Wesley.Crimeware.Understanding.New.Attacks.And.Defenses.Apr.2008.ISBN.0321501950.chm

10.8 MB

Addison.Wesley.The.Technical.And.Social.History.Of.Software.Engineering.Dec.2013.ISBN.0321903420.pdf

1.6 MB

Apress.Healthcare.Jun.2014.ISBN.1430266767.pdf

2.5 MB

McGraw.Hill.Principles.Of.Computer.Security.CompTIA.Security.Plus.And.Beyond.Lab.Manual.2nd.Edition.Dec.2010.ISBN.0071748563.pdf

5.8 MB

Syngress.The.Basics.Of.Digital.Privacy.May.2013.ISBN.0128000112.pdf

8.6 MB

/Cryptovirology/

Malicious Cryptography Techniques for Unreversable.pdf

1.3 MB

Malicious Cryptology and Mathematics 29700.pdf

293.1 KB

PublicandPrivateKeyCryptographyWhitePaper-Dec2014.pdf

1.7 MB

Wiley.Malicious.Cryptography.Exposing.Cryptovirology.Feb.2004.ISBN.0764549758.pdf

30.5 MB

/Ethical Hacking/

McGraw.Hill.Gray.Hat.Hacking.4th.Edition.Jan.2015.ISBN.0071832386.pdf

33.9 MB

McGraw.Hill.Hacking.Exposed.Linux.3rd.Edition.Jul.2008.ISBN.0072262575.pdf

11.0 MB

McGraw.Hill.Hacking.Exposed.Network.Security.Secrets.And.Solutions.2nd.Edition.Oct.2000.ISBN.0072127481.pdf

8.4 MB

McGraw.Hill.Hacking.Exposed.Network.Security.Secrets.And.Solutions.3rd.Edition.Sep.2001.ISBN.0072193816.pdf

6.1 MB

McGraw.Hill.Hacking.Exposed.Network.Security.Secrets.And.Solutions.5th.Edition.Apr.2005.ISBN.0072260815.chm

19.4 MB

/Ethical Hacking Modules/

Exploit Writing Using Metasploit Framework.pdf

656.2 KB

Module 03 Footprinting.pdf

10.5 MB

Module 04 Google Hacking.pdf

4.4 MB

Module 05 Scanning.pdf

17.5 MB

Module 06 Enumeration.pdf

4.2 MB

Module 07 System Hacking.pdf

15.8 MB

Module 08 Trojans and Backdoors.pdf

9.5 MB

Module 09 Viruses and Worms.pdf

5.8 MB

Module 10 Sniffers.pdf

10.5 MB

Module 11 Social Engineering.pdf

5.3 MB

Module 12 Phishing.pdf

2.7 MB

Module 13 Hacking Email Accounts.pdf

1.9 MB

Module 14 Denial of Service.pdf

3.7 MB

Module 15 Session Hijacking.pdf

2.0 MB

Module 16 Hacking Webservers.pdf

5.1 MB

Module 17 Web Application Vulnerabilities.pdf

4.8 MB

Module 18 Web based Password Cracking Techniques.pdf

5.7 MB

Module 19 SQL Injection.pdf

3.4 MB

Module 20 Hacking Wireless Networks.pdf

13.6 MB

Module 21 Physical Security.pdf

3.2 MB

Module 22 Linux Hacking.pdf

6.4 MB

Module 23 Evading IDS Firewall and Honeypot.pdf

5.0 MB

Module 24 Buffer Overflows.pdf

1.4 MB

Module 25 Cryptography.pdf

4.3 MB

Module 26 Penetration Testing.pdf

5.9 MB

Module 28 Writing Virus Codes.pdf

613.4 KB

Module 29 Assembly Language Tutorial.pdf

1.0 MB

Module 30 Exploit Writing.pdf

2.1 MB

Module 31 Windows Based Buffer Overflow Exploit Writing.pdf

244.7 KB

Module 33 Reverse Engineering Techniques.pdf

2.9 MB

Module 34 MAC OS X Hacking.pdf

1.3 MB

Module 35 Hacking Routers, Cable Modems and Firewalls.pdf

3.4 MB

Module 36 Hacking Mobile Phones, PDA and Handheld Devices.pdf

4.2 MB

Module 37 Bluetooth Hacking.pdf

2.6 MB

Module 38 VoIP Hacking.pdf

4.1 MB

Module 39 RFID Hacking.pdf

2.3 MB

Module 40 Spamming.pdf

2.8 MB

Module 41 Hacking USB Devices.pdf

1.9 MB

Module 42 Hacking Database Servers.pdf

1.7 MB

Module 43 Cyber Warfare- Hacking Al-Qaida and Terrorism.pdf

2.8 MB

Module 44 Internet Content Filtering Techniques.pdf

2.0 MB

Module 45 Privacy on the Internet.pdf

5.7 MB

Module 46 Securing Laptop Computers.pdf

2.0 MB

Module 47 Spying Technologies.pdf

4.5 MB

Module 48 Corporate Espionage by Insiders.pdf

2.3 MB

Module 49 Creating Security Policies.pdf

2.2 MB

Module 50 Software Piracy and Warez.pdf

2.2 MB

Module 51 Hacking and Cheating Online Games.pdf

2.1 MB

Module 52 Hacking RSS and Atom.pdf

1.7 MB

Module 53 Hacking Web Browsers.pdf

2.0 MB

Module 54 Proxy Server Technologies.pdf

2.4 MB

Module 55 Preventing Data Loss.pdf

3.9 MB

Module 56 Hacking Global Positioning System.pdf

2.2 MB

Module 57 Computer Forensics and Incident Handling.pdf

2.6 MB

Module 58 Credit Card Frauds.pdf

2.2 MB

Module 59 How to Steal Passwords.pdf

1.6 MB

Module 60 Firewall Technologies.pdf

3.0 MB

Module 61 Threats and Countermeasures.pdf

26.1 MB

Module 62 Case Studies.pdf

731.0 KB

Module 63 Botnets.pdf

1.2 MB

Module 64 Economic Espionage.pdf

668.9 KB

Module 65 Patch Management.pdf

7.4 MB

Module 66 Security Convergence.pdf

645.7 KB

Module 67 Identifying the Terrorists.pdf

1.8 MB

/Exploit/WEB game/

Addison.Wesley.Learning.Android.Game.Programming.Dec.2011.ISBN.0321769627.pdf

11.5 MB

Addison.Wesley.Learning.HTML5.Game.Programming.A.Handson.Guide.To.Building.Online.Games.Using.Canvas.SVG.And.WebGL.Oct.2011.ISBN.0321767365.pdf

5.2 MB

Apress.Beginning.Android.Web.Apps.Development.May.2012.ISBN.1430239573.pdf

36.2 MB

Apress.Beginning.Facebook.Game.Apps.Development.Mar.2012.ISBN.1430241705.pdf

40.6 MB

Apress.Beginning.HTML5.Games.With.CreateJS.Mar.2014.ISBN.1430263407.pdf

8.9 MB

Apress.Beginning.PhoneGap.Mobile.Web.Framework.For.JavaScript.And.HTML5.Feb.2012.ISBN.1430239034.pdf

28.3 MB

Apress.Building.JavaScript.Games.Sep.2014.ISBN.1430265388.pdf

7.2 MB

Apress.Enchant.JS.May.2013.ISBN.1430247436.pdf

7.2 MB

Apress.HTML5.Games.Most.Wanted.Build.The.Best.HTML5.Games.Apr.2012.ISBN.1430239786.pdf

26.1 MB

Apress.Metro.Revealed.Building.Windows.8.Apps.With.HTML5.And.JavaScript.Jun.2012.ISBN.1430244887.pdf

1.5 MB

Apress.Pro.Android.Web.Apps.Develop.For.Android.Using.HTML5.CSS3.And.JavaScript.Feb.2011.ISBN.1430232765.pdf

14.1 MB

Apress.Pro.Windows.8.Development.With.HTML5.And.JavaScript.Nov.2012.ISBN.1430244011.pdf

52.9 MB

OReilly.Introducing.HTML5.Game.Development.Feb.2012.ISBN.1449315178.pdf

6.9 MB

Packt.Game.Development.With.Three.JS.Oct.2013.ISBN.1782168532.pdf

1.8 MB

Packt.HTML5.Game.Development.With.GameMaker.Apr.2013.ISBN.1849694109(1).pdf

9.0 MB

Packt.HTML5.Game.Development.With.ImpactJS.Mar.2013.ISBN.1849694567.pdf

5.4 MB

Packt.HTML5.Games.Development.By.Example.Beginners.Guide.Create.Six.Fun.Games.Using.The.Latest.HTML5.Canvas.CSS.And.JavaScript.Techniques.Aug.2011.ISBN.1849691266.pdf

9.8 MB

Wiley.HTML5.Games.Creating.Fun.With.HTML5.CSS3.And.WebGL.Dec.2011.ISBN.1119975085.pdf

11.5 MB

/Exploit/

Addison.Wesley.Exploiting.Software.How.To.Break.Code.Feb.2004.ISBN.0201786958.pdf

8.0 MB

Injector.rar

13.3 KB

Syngress.Zero.Day.Exploit.Countdown.To.Darkness.Aug.2004.ISBN.1931836094.pdf

3.9 MB

Wiley.The.Shellcoders.Handbook.2nd.Edition.Aug.2007.ISBN.047008023X.pdf

3.7 MB

/Forensics/

Prentice.Hall.Network.Forensics.Jun.2012.ISBN.0132564718.pdf

20.8 MB

Sybex.Mastering.Windows.Network.Forensics.And.Investigation.2nd.Edition.Jun.2012.ISBN.1118163826.pdf

42.1 MB

Syngress.The.Basics.Of.Digital.Forensics.Mar.2012.ISBN.1597496618.pdf

7.0 MB

Wiley.Memory.Jul.2014.ISBN.1118825098.pdf

7.5 MB

/Hadoop/

Dayong Du-Apache Hive Essentials-Packt Publishing - ebooks Account (2015).epub

1.4 MB

Getting Started with Impala.pdf

808.1 KB

Getting Started with Impala2.pdf

798.4 KB

Hadoop.pdf

923.8 KB

hadoop-illuminated.pdf

9.5 MB

John Russell-Getting Started with Impala_ Interactive SQL for Apache Hadoop-O'Reilly Media (2014).epub

208.1 KB

Manning.Hadoop.In.Practice.Oct.2012.ISBN.1617290238.pdf

15.5 MB

OReilly.Apache.Sqoop.Cookbook.Jul.2013.ISBN.1449364624.pdf

9.0 MB

OReilly.Hadoop.Operations.Oct.2012.ISBN.1449327052.pdf

7.7 MB

OReilly.Hadoop.The.Definitive.Guide.3rd.Edition.May.2012.ISBN.1449311520.pdf

14.5 MB

orielly-cloudera-impala-ebook.pdf

6.5 MB

Packt.Hadoop.Beginners.Guide.Feb.2013.ISBN.1849517304.pdf

12.0 MB

Packt.Hadoop.Cluster.Deployment.Nov.2013.ISBN.1783281715.pdf

4.5 MB

Packt.Learning.Cloudera.Impala.Dec.2013.ISBN.1783281278.pdf

2.9 MB

/Javascript/nodejs/

Alex R. Young, Marc Harter-Node.js in Practice-Manning (2015).pdf

7.6 MB

Basarat Ali Syed (auth.)-Beginning Node.js-Apress (2014).pdf

7.3 MB

Fernando Doglio (auth.)-Pro REST API Development with Node.js-Apress (2015).pdf

7.5 MB

Krasimir Tsonev-Node.js By Example-Packt Publishing - ebooks Account (2015).epub

2.0 MB

Mario Casciaro-Node.js Design Patterns-Packt Publishing (2014).pdf

15.4 MB

/Javascript/

Apress.Pro.Data.Visualization.Using.R.And.JavaScript.Jun.2013.ISBN.1430258063.pdf

9.2 MB

Apress.Pro.PHP.And.JQuery.Add.Quick.Smooth.And.Easy.Interactivity.To.Your.PHP.Sites.With.JQuery.Jun.2010.ISBN.1430228474.pdf

11.4 MB

Manning.Secrets.Of.The.JavaScript.Ninja.Dec.2012.ISBN.193398869X.pdf

15.6 MB

Morgan.Kaufmann.Object.Oriented.Construction.Handbook.Oct.2004.ISBN.1558606874.pdf

6.3 MB

No.Starch.The.Principles.Of.Object.Oriented.JavaScript.Feb.2014.ISBN.1593275404.pdf

2.7 MB

OReilly.JavaScript.Testing.With.Jasmine.Apr.2013.ISBN.1449356370.pdf

1.5 MB

OReilly.JQuery.Cookbook.Solutions.And.Examples.For.JQuery.Developers.Dec.2009.ISBN.0596159773.pdf

6.0 MB

OReilly.Programming.JavaScript.Applications.Jul.2014.ISBN.1491950293.pdf

8.5 MB

Packt.CoffeeScript.Programming.With.JQuery.Rails.And.Node.JS.Dec.2012.ISBN.1849519587.pdf

4.2 MB

Packt.Creating.2nd.Edition.Feb.2015.ISBN.1783555114.pdf

4.5 MB

Packt.Creating.Mobile.Apps.With.JQuery.Mobile.Apr.2013.ISBN.178216006X.pdf

4.1 MB

Packt.JQuery.Mobile.Cookbook.Nov.2012.ISBN.1849517223.pdf

4.7 MB

Packt.JQuery.UI.1.8.The.User.Interface.Library.For.JQuery.Aug.2011.ISBN.1849516529.pdf

7.5 MB

Packt.Object.Oriented.JavaScript.2nd.Edition.Jul.2013.ISBN.1849693129.pdf

2.2 MB

Packt.Object.Oriented.JavaScript.Create.Scalable.Reusable.High.Quality.JavaScript.Applications.And.Libraries.Jul.2008.ISBN.1847194141.pdf

7.5 MB

Packt.PHP.AJAX.Cookbook.Dec.2011.ISBN.1849513082.pdf

5.8 MB

Packt.PHP.JQuery.Cookbook.Over.60.Simple.But.Highly.Effective.Recipes.To.Create.Interactive.Web.Applications.Using.PHP.With.JQuery.Dec.2010.ISBN.1849512744.pdf

8.5 MB

Sitepoint.Javascript.Jan.2015.ISBN.0992461251.pdf

5.1 MB

SitePoint.JQuery.Novice.To.Ninja.2nd.Edition.Feb.2012.ISBN.0987153013.pdf

16.9 MB

/kali/

CreateSpace.Publishing.Basic.Security.Testing.With.Kali.Linux.Jan.2014.ISBN.1494861275.pdf

14.4 MB

Packt.Kali.Linux.Apr.2014.ISBN.184951948X.pdf

8.2 MB

Packt.Kali.Linux.Cookbook.Oct.2013.ISBN.1783289597.pdf

11.2 MB

Packt.Kali.Linux.CTF.Blueprints.Jul.2014.ISBN.1783985984.pdf

3.7 MB

Packt.Kali.Linux.Network.Scanning.Cookbook.Aug.2014.ISBN.1783982144.pdf

4.8 MB

Packt.Kali.Linux.Social.Engineering.Dec.2013.ISBN.1783283270.pdf

4.0 MB

Packt.Mastering.Kali.Linux.For.Advanced.Penetration.Testing.Jun.2014.ISBN.1782163123.pdf

9.4 MB

Packt.Web.Penetration.Testing.With.Kali.Linux.Sep.2013.ISBN.1782163166.pdf

20.2 MB

/Malwares/crypters/

419evolution [DataScrambler ].pdf

1.9 MB

18242.pdf

1.0 MB

Hyperion_ Implementation of a PE-Crypter.pdf

238.7 KB

Malware Obfuscation with Threat Emulation.pdf

381.0 KB

Malware_Magazine_1.pdf

5.7 MB

Malware1.pdf

2.6 MB

MITM ATTACK WITH PATCHING BINARIES ON THE FLY BY ADDING SHELLCODES.pdf

10.9 MB

NocONName_2012-Evadiendo_Antivirus-Uso_de_Crypters.pdf

32.2 MB

ScyllaHide.pdf

429.4 KB

UNPROTECTING THE CRYPTER.pdf

1.0 MB

Utilisation de Stub En VB.NET.pdf

556.7 KB

vb201407-VB6.pdf

348.5 KB

/Malwares/mem injection/

DEFCON-20-King-Reflective-Injection-Detection.pdf

447.7 KB

fatkit_dll_rc3.pdf

101.9 KB

HS-P005_ReflectiveDllInjection.pdf

165.9 KB

lumension_reflective-memory-injection.pdf

404.5 KB

/.../comment-iframe_data/

4079081201-cmtfp.css

16.6 KB

4129472539-cmt.js

80.4 KB

blank.gif

0.0 KB

close.gif

0.3 KB

kufF76WnOWhAaPP3-o86SqnOUvjxwo3mm8qz-n8yLf0.js

9.4 KB

/.../An7i Security_files/fastbutton_data/

photo.jpg

0.8 KB

/.../An7i Security_files/postmessageRelay_data/

162488195-postmessagerelay.js

8.6 KB

api.js

13.0 KB

corerpcshindig.js

68.2 KB

/.../An7i Security_files/

422439_10150655860234757_828564756_8927229_56595808_n.jpg

1.4 KB

329677814-widgets.js

93.1 KB

3846568130-comment_from_post_iframe.js

13.7 KB

4205868711-css_bundle_v2.css

43.0 KB

a.jpeg

1.6 KB

anon36.png

1.7 KB

arrow_dropdown.gif

0.1 KB

authorization.css

0.1 KB

Avatar.jpeg

1.8 KB

b36-rounded.png

0.8 KB

cbgapi.loaded_0

171.2 KB

cbgapi.loaded_1

37.1 KB

cbgapi.loaded_2

7.9 KB

comment-iframe.html

8.2 KB

comments.js

399.2 KB

cookiechoices.js

6.3 KB

css.css

0.3 KB

fastbutton.html

39.0 KB

ga.js

41.0 KB

icon_feed12.png

0.5 KB

icon18_edit_allbkg.gif

0.2 KB

icon18_wrench_allbkg.png

0.5 KB

openid36-rounded.png

1.3 KB

photo.jpg

1.8 KB

photo_002.jpg

1.8 KB

photo_003.jpg

1.5 KB

photo_004.jpg

1.6 KB

plusone.js

37.3 KB

postmessageRelay.html

0.6 KB

shAutoloader.js

1.5 KB

shCore.css

6.2 KB

shCore.js

16.2 KB

shThemeDefault.css

2.9 KB

subscribe-netvibes.png

1.4 KB

subscribe-yahoo.png

0.6 KB

webfont.js

16.6 KB

/.../Vulnerability analysis, Security Papers, Exploit Tutorials - Part 32480_files/

analytics.js

25.3 KB

bootstrap.js

35.6 KB

codecolorer.css

11.4 KB

comment-reply.js

0.8 KB

css.css

1.5 KB

css_002.css

0.7 KB

Defaults.css

22.4 KB

edb-2015-theme-logo641.png

19.9 KB

exploit.css

5.0 KB

font-awesome.css

30.5 KB

fotorama.css

15.1 KB

imagesloaded.js

6.9 KB

jquery.js

1.5 KB

jquery_002.js

100.5 KB

jquery_003.js

21.8 KB

jquery_004.js

7.1 KB

jquery_005.js

96.0 KB

jquery_006.js

110.0 KB

jquery-migrate.js

7.2 KB

magnific-popup.css

9.2 KB

motioncss.css

43.3 KB

motioncss-responsive.css

2.1 KB

responsive.css

10.9 KB

scripts.js

3.7 KB

settings.css

55.2 KB

style.css

184.6 KB

ultimate.css

471.3 KB

ultimate-params.js

1.2 KB

us.js

45.3 KB

us_002.js

13.4 KB

us_impreza_custom_styles.css

34.8 KB

waypoints.js

8.8 KB

wbt.css

181.5 KB

wp-emoji-release.js

14.6 KB

/Malwares/vectors/

An7i Security.html

870.7 KB

Vulnerability analysis, Security Papers, Exploit Tutorials - Part 32480.html

21.8 KB

/Malwares/worms/

CHAPTER 9 Strategies of Computer Worms.pdf

1.7 MB

jxia-JCS-wormdetection.pdf

434.0 KB

/Malwares/

(Synthesis Lectures on Information Security, Privacy, and Tru) Christian Krieg, Adrian Dabrowski, Heidelinde Hobel, Katharina Krombholz, Edgar Weippl-Hardware Malware-Morgan & Claypool Publishers (201.pdf

1.2 MB

0x90.se_-_Malware_Analysis_-_Part_I.pdf

927.3 KB

03_La complessità del malware.pdf

4.2 MB

1507.06955v1.pdf

159.2 KB

34516.pdf

207.6 KB

34591.pdf

1.1 MB

Addison.Wesley.The.Art.Of.Computer.Virus.Research.And.Defense.Feb.2005.ISBN.0321304543.chm

7.0 MB

Aditya Sood and Richard Enbody (Auth.)-Targeted Cyber Attacks. Multi-staged Attacks Driven by Exploits and Malware-Syngress (2014).pdf

5.8 MB

Advanced Polymorphic Techniques.pdf

731.0 KB

botnets-detection-measurement-disinfection-defence.pdf

4.1 MB

darkhotel_kl_07.11.pdf

2.7 MB

darkhotelappendixindicators_kl.pdf

1.4 MB

Data Mining Tools for Malware Detection Mehedy Masud, Latifur Khan, Bhavani Thuraisingham--Auerbach Publications,CRC Press (2011).pdf

9.4 MB

Detect_Malware_w_Memory_Forensics.pdf

2.5 MB

fighter-pos-whitepaper-en.pdf

5.8 MB

Financial Malware Analysis - Secrets of ZeuS.pdf

642.5 KB

FireEye_AdvMalwareExposed.pdf

795.5 KB

Malware Analyst's Cookbook and DVD.pdf

9.4 MB

-Mobile Malware Attacks And Defense-Syngress (2011).pdf

11.2 MB

Mohssen Mohammed_ Al-Sakib Khan Pathan-Automatic defense against zero-day polymorphic worms in communication networks-Auerbach (2013).pdf

17.1 MB

No.Starch.Practical.Malware.Analisys.Mar.2012.ISBN.1593272901.pdf

9.9 MB

Packt.Cuckoo.Malware.Analysis.Oct.2013.ISBN.1782169237.pdf

7.5 MB

Pattern-Oriented-Diagnostics-Debugging-Malware-Analysis-Reversing.pdf

10.2 MB

Patterns of a Cooperative Malware Analysis Workflow.pdf

621.8 KB

Springer.Android.Malware.Jun.2013.ISBN.1461473934.pdf

3.6 MB

Springer.Computer.Viruses.And.Malware.Advances.In.Information.Security.Jul.2006.ISBN.0387302360.pdf

11.3 MB

Springer.Computer.Viruses.From.Theory.To.Applications.Sep.2005.ISBN.2287239391.pdf

2.8 MB

Springer.Malware.Forensics.Field.Guide.For.Windows.Systems.Jun.2012.ISBN.1597494720.pdf

29.7 MB

Spyware_Adware.pdf

3.7 MB

Syngress.Malware.Forensics.Field.Guide.For.Linux.Systems.Jan.2014.ISBN.1597494704.pdf

41.4 MB

Syngress.Malware.Forensics.Investigating.And.Analyzing.Malicious.Code.Jun.2008.ISBN.159749268X.pdf

26.2 MB

The.Rootkit.Arsenal.Escape.and.Evasion.in.the.Dark.Corners.of.the.System,Second.Edition.pdf

98.7 MB

WGM12349USEN.PDF

2.5 MB

/.../1. Instant Metasploit Starter/

Instant Metasploit Starter - Ranganath, Karthik.epub

8.4 MB

Instant Metasploit Starter - Ranganath, Karthik.jpg

34.1 KB

Instant Metasploit Starter - Ranganath, Karthik.opf

1.2 KB

/.../2. Learning Metasploit Exploitation and Development/

Learning Metasploit Exploitation and Development - Balapure, Aditya.epub

26.0 MB

Learning Metasploit Exploitation and Development - Balapure, Aditya.jpg

39.8 KB

Learning Metasploit Exploitation and Development - Balapure, Aditya.opf

1.3 KB

Thumbs.db

16.9 KB

/Metasploit Books/

Aditya Balapure-Learning Metasploit Exploitation and Development-Packt Publishing (2013).pdf

9.5 MB

Monika Agarwal, Abhinav Singh-Metasploit Penetration Testing Cookbook, Second Edition-Packt Publishing (2013).pdf

7.2 MB

No.Starch.Meta.Jun.2011.ISBN.159327288X.pdf

7.2 MB

Packt.Mastering.Metasploit.May.2014.ISBN.1782162224.pdf

14.8 MB

Packt.Metasploit.Jun.2012.ISBN.1849517428.pdf

5.2 MB

/MISC/

(Lecture Notes in Computer Science 8550 Security and Cryptology) Sven Dietrich (eds.)-Detection of Intrusions and Malware, and Vulnerability Assessment_ 11th International Conference, DIMVA 2014, Egha.pdf

9.8 MB

(Lecture Notes in Computer Science 9148) Magnus Almgren, Vincenzo Gulisano, Federico Maggi (eds.)-Detection of Intrusions and Malware, and Vulnerability Assessment_ 12th International Conference, DIMV.pdf

18.3 MB

32719.pdf

1.8 MB

nsa.pdf

11.9 MB

/Mobile/

OReilly.20.Recipes.For.Programming.PhoneGap.Apr.2012.ISBN.1449319548.pdf

6.7 MB

Packt.PhoneGap.3.X.Mobile.Application.Development.Hotshot.May.2014.ISBN.1783287926.pdf

6.1 MB

/Modern Web/

No.Starch.The.Modern.Web.Apr.2013.ISBN.1593274874.pdf

8.6 MB

OReilly.Building.Hypermedia.APIs.With.HTML5.And.Node.Dec.2011.ISBN.1449306578.pdf

7.2 MB

OReilly.Building.Web.Apps.With.Ember.JS.Aug.20214.ISBN.1449370926.pdf

12.1 MB

OReilly.Enterprise.Web.Development.Building.HTML5.Jul.2014.ISBN.1449356818.pdf

46.2 MB

OReilly.Full.Stack.Web.Development.With.Backbone.JS.Jun.2014.ISBN.1449370985.pdf

6.7 MB

OReilly.Getting.Started.With.GEO.CouchDB.And.Node.JS.Aug.2011.ISBN.1449307523.pdf

7.2 MB

OReilly.Programming.3D.Applications.With.HTML5.And.WebGL.Mar.2014.ISBN.1449362966.pdf

67.1 MB

OReilly.Programming.HTML5.Applications.Nov.2011.ISBN.1449399088.pdf

8.4 MB

OReilly.Restful.Web.Services.Cookbook.Mar.2010.ISBN.0596801688.pdf

2.3 MB

OReilly.Restful.Web.Services.May.2007.ISBN.0596529260.pdf

3.2 MB

OReilly.Web.Development.With.Node.And.Express.Jul.2014.ISBN.1491949309.pdf

8.5 MB

Packt.Building.Impressive.Presentations.With.Impress.Dot.JS.Mar.2013.ISBN.1849696489.pdf

2.2 MB

Packt.Data.Visualization.With.D3.JS.Cookbook.Oct.2013.ISBN.178216216X.pdf

3.2 MB

Packt.Data.Visualization.With.D3.JS.Oct.2013.ISBN.1782160000.pdf

3.6 MB

Packt.Developing.Windows.Store.Apps.With.HTML5.And.JavaScript.Aug.2013.ISBN.1849687102.pdf

2.5 MB

Packt.Ember.Feb.2013.ISBN.1782163387.pdf

3.8 MB

Packt.Getting.Started.With.Memcached.Nov.2013.ISBN.1782163220.pdf

870.8 KB

Packt.HTML5.Graphing.And.Data.Visualization.Cookbook.Nov.2012.ISBN.1849693706.pdf

3.8 MB

Packt.HTML5.IPhone.Web.Application.Development.May.2013.ISBN.1849691029.pdf

9.2 MB

Packt.HTML5.Web.Application.Development.By.Example.Jun.2013.ISBN.1849695946.pdf

3.0 MB

Packt.Oracle.Application.Express.4.0.With.Ext.JS.Mar.2011.ISBN.1849681066.pdf

10.0 MB

Packt.Social.Data.Visualization.With.HTML5.And.JavaScript.Sep.2013.ISBN.1782166548.pdf

1.3 MB

Packt.Tableau.Data.Visualization.Cookbook.Aug.2013.ISBN.1849689784.pdf

3.7 MB

Wrox.Developing.Jul.2009.ISBN.0470414642.pdf

6.5 MB

/Pentesting Books/PenTest/

33859.pdf

1.5 MB

Cisco.Press.Penetration.Testing.And.Network.Defense.Nov.2005.ISBN.1587052083.chm

15.3 MB

CRC.Press.Ethical.Hacking.And.Penetration.Testing.Guide.Aug.2014.ISBN.1482231611.pdf

23.5 MB

CreateSpace.Publishing.The.Hacker.Playbook.Mar.2014.ISBN.1494932636.pdf

27.4 MB

Linux Penetration Testing Laptop Setup v2.pdf

35.9 KB

Linux Penetration Testing Laptop Setup v4.pdf

88.3 KB

No.Starch.Penetration.Testing.Jun.2014.ISBN.1593275641.pdf

12.8 MB

Packt.Penetration.Testing.With.BackBox.Feb.2014.ISBN.1783282975.pdf

6.6 MB

Packt.Penetration.Testing.With.The.Bash.Shell.May.2014.ISBN.1849695105.pdf

3.6 MB

Penetration Testing Philipp Lachberger.pdf

317.1 KB

Penetration_Testing_Guidance_March_2015.pdf

1.1 MB

Syngress.Basics.2nd.Edition.Aug.2013.ISBN.0124116442.pdf

4.7 MB

Syngress.Hacking.And.Penetration.Testing.With.Low.Power.Devices.Sep.2014.ISBN.0128007516.pdf

8.7 MB

Syngress.Ninja.Hacking.Unconventional.Penetration.Testing.Tactics.And.Techniques.Sep.2010.ISBN.1597495883.pdf

10.3 MB

The Basics of Hacking and Penetration.pdf

3.9 MB

Wargames.pdf

302.1 KB

/.../Professional Penetration Testing 2E- Syngress 2013 [Epub]/

Professional Penetration Testing - Wilhelm, Thomas.epub

26.3 MB

Professional Penetration Testing Cover.jpg

191.9 KB

Thumbs.db

10.8 KB

/Pentesting Books/

Juned Ahmed Ansari-Web Penetration Testing with Kali Linux-Packt Publishing (2015).epub

23.3 MB

Learning Penetration Testing wi - Christopher Duffy.azw3

10.9 MB

Learning Penetration Testing wi - Christopher Duffy.epub

9.5 MB

Learning Penetration Testing wi - Christopher Duffy.pdf

9.6 MB

Learning Penetration Testing with Python.azw3

10.9 MB

Learning Penetration Testing with Python.epub

9.5 MB

Learning Penetration Testing with Python.pdf

9.6 MB

No.Starch.Black.Hat.Python.Dec.2014.ISBN.1593275900.pdf

2.8 MB

No.Starch.Gray.Hat.Python.Aug.2009.ISBN.1593271921.pdf

3.7 MB

/PHP/

Apress.PHP.Dec.2010.ISBN.1430233184.pdf

5.0 MB

OReilly.PHP.Cookbook.3rd.Edition.Jul.2014.ISBN.144936375X.pdf

12.6 MB

OReilly.PHP.Web.Services.May.2013.ISBN.1449356567.pdf

10.7 MB

Packt.PHP.Oracle.Web.Development.Data.Processing.Security.Caching.XML.Web.Services.And.AJAX.Jul.2007.ISBN.1847193633.pdf

7.4 MB

Packt.Restfull.Oct.2008.ISBN.1847195520.pdf

13.3 MB

Packt.Smarty.PHP.Template.Programming.And.Applications.A.Step.By.Step.Guide.To.Building.PHP.Websites.And.Applications.Using.The.Smarty.Templating.Engine.Apr.2006.ISBN.190481140X.pdf

6.9 MB

/Physical devices/

Syngress.Black.Oct.2004.ISBN.193226681X.pdf

74.8 MB

/.../Invent with Python/Comp Files/

AISim1.py

9.1 KB

AISim2.py

9.4 KB

AISim3.py

11.6 KB

animation.py

2.7 KB

background.mid

7.2 KB

baddie.png

0.4 KB

bagels.py

2.3 KB

buggy.py

0.3 KB

cherry.png

0.4 KB

cipher.py

1.4 KB

collisionDetection.py

4.0 KB

dodger.py

7.1 KB

dragon.py

1.2 KB

gameover.wav

258.9 KB

guess.py

0.9 KB

hangman.py

4.1 KB

hello.py

0.2 KB

hello2.py

0.2 KB

jokes.py

0.4 KB

pickup.wav

8.5 KB

player.png

0.9 KB

pygameHelloWorld.py

1.9 KB

pygameInput.py

3.6 KB

reversi.py

10.1 KB

sonar.py

7.3 KB

spritesAndSounds.py

4.3 KB

tictactoe.py

6.3 KB

/.../Invent with Python/

Invent with Python.pdf

4.8 MB

Thumbs.db

11.3 KB

/Violent Python/Companion Files/CH1/

1-vulnScanner.py

1.3 KB

2-passwdCrack.py

0.8 KB

3-zipCrack.py

1.0 KB

dictionary.txt

0.1 KB

evil.zip

35.8 KB

passwords.txt

0.1 KB

vuln-banners.txt

0.4 KB

/Violent Python/Companion Files/CH2/

1-portScan.py

1.7 KB

2-nmapScan.py

0.9 KB

3-botNet.py

1.1 KB

3-bruteKey.py

2.4 KB

3-pxsshCommand.py

0.4 KB

3-sshBrute.py

1.9 KB

3-sshCommand.py

1.1 KB

4-anonLogin.py

0.5 KB

4-bruteLogin.py

0.8 KB

4-defaultPages.py

0.6 KB

4-injectPage.py

0.6 KB

4-massCompromise.py

3.5 KB

5-conficker.py

3.2 KB

6-freeFloat.py

3.1 KB

pass.txt

0.0 KB

userpass.txt

0.1 KB

/Violent Python/Companion Files/CH3/

1-discoverNetworks.py

2.4 KB

2-dumpRecycleBin.py

1.0 KB

3-pdfRead.py

0.8 KB

4-exifFetch.py

1.8 KB

5-skypeParse.py

3.1 KB

6-firefoxParse.py

3.7 KB

7-iphoneMessages.py

1.6 KB

firefox_profile.zip

32.4 KB

skype_profile.zip

10.7 KB

/Violent Python/Companion Files/CH4/

1-geoIP.py

0.5 KB

2-printDirection.py

0.5 KB

3-geoPrint.py

1.3 KB

4-googleEarthPcap.py

1.6 KB

5-findDDoS.py

2.9 KB

6-spoofDetect.py

1.4 KB

7-testFastFlux.py

0.7 KB

8-testDomainFlux.py

0.6 KB

9-mitnickAttack.py

2.0 KB

10-idsFoil.py

2.3 KB

attack.pcap

10.0 MB

domainFlux.pcap

4.3 KB

download.pcap

1.0 KB

fastFlux.pcap

8.7 KB

geotest.kml

2.1 KB

geotest.pcap

0.7 KB

hivemind.pcap

0.5 KB

/Violent Python/Companion Files/CH5/

1-testSniff.py

0.4 KB

2-creditSniff.py

1.1 KB

3-hotelSniff.py

0.9 KB

4-googleSniff.py

1.1 KB

5-ftpSniff.py

1.0 KB

6-sniffHidden.py

0.8 KB

6-sniffProbe.py

0.4 KB

7-dup.py

1.4 KB

7-uavSniff.py

1.9 KB

8-fireCatcher.py

1.1 KB

9-btFind.py

0.5 KB

9-btScan.py

0.4 KB

10-iphoneFinder.py

0.9 KB

11-rfcommScan.py

0.4 KB

12-sdpScan.py

0.4 KB

13-ninjaPrint.py

0.3 KB

14-blueBug.py

0.4 KB

dup.py

1.4 KB

/Violent Python/Companion Files/CH6/

1-viewPage.py

0.2 KB

2-proxyTest.py

0.3 KB

3-userAgentTest.py

0.4 KB

4-printCookies.py

0.3 KB

5-kittenTest.py

0.3 KB

6-linkParser.py

1.1 KB

7-imageMirror.py

1.3 KB

8-anonGoogle.py

1.3 KB

8-googleJson.py

0.4 KB

8-googleJumbled.py

0.3 KB

9-twitterClass.py

2.6 KB

9-twitterGeo.py

2.1 KB

9-twitterInterests.py

2.4 KB

9-twitterRecon.py

1.3 KB

10-sendMail.py

0.8 KB

10-sendSpam.py

2.7 KB

anonBrowser.py

1.2 KB

anonBrowser.pyc

2.4 KB

mlb-cities.txt

0.3 KB

twitterClass.py

2.6 KB

/Violent Python/Companion Files/CH7/

2-virusCheck.py

2.5 KB

/Violent Python/

Thumbs.db

12.3 KB

Violent Python - A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers.pdf

8.2 MB

/Python Programming Books/

byteofpython_120.pdf

240.4 KB

Head First Python.pdf

29.6 MB

No_Starch_Press_-_Gray_Hat_Python_-_Python_Programming_for_Hackers_and_Reverse_Engineers_[]_(2009)_en.pdf

3.2 MB

Packt.Python.Data.Visualization.Cookbook.Nov.2013.ISBN.1782163360.pdf

5.5 MB

Packt.Python.Penetration.Testing.Essentials.Feb.2015.ISBN.1784398586.pdf

3.3 MB

Python Cookbook 3rd Edition 2013.pdf

10.3 MB

Python Programming for the Absolute Beginner, 3rd Edition -nelly-.pdf

13.2 MB

thinkpython.pdf

835.2 KB

/Reverse Engineering/

Practical Reverse Engineering.pdf

5.5 MB

/Semantic web/

Academic.Press.Introduction.To.The.Semantic.Web.And.Semantic.Web.Services.Jun.2007.ISBN.1584889330.pdf

9.2 MB

IGI.Global.Semantic.Web.Services.Theory.Tools.And.Applications.Mar.2007.ISBN.159904045X.pdf

10.2 MB

IOS.Press.Ontology.And.The.Semantic.Web.Volume.156.Frontiers.In.Artificial.Intelligence.And.Applications.Apr.2007.ISBN.1586037293.pdf

2.0 MB

MIT.Press.A.Semantic.Web.Primer.2nd.Edition.Mar.2008.ISBN.0262012421.pdf

2.5 MB

OReilly.Programming.The.Semantic.Web.Jul.2009.ISBN.0596153813.pdf

6.5 MB

Springer.Agent.Based.Semantic.Web.Service.Composition.Aug.2012.ISBN.1461446627.pdf

3.3 MB

Springer.Modeling.Semantic.Web.Services.The.Web.Service.Modeling.Language.Jul.2008.ISBN.3540681698.pdf

4.6 MB

Springer.Ontology.Management.Semantic.Web.Semantic.Web.Services.And.Business.Applications.Dec.2007.ISBN.038769899X.pdf

3.9 MB

Springer.Sem.Apr.2013.ISBN.3642364020.pdf

13.0 MB

Springer.Semantic.Web.Concepts.Technologies.And.Applications.Jan.2007.ISBN.184628581X.pdf

4.6 MB

Wiley.Semantic.Web.And.Model.Driven.Engineering.Jun.2012.ISBN.1118004175.pdf

6.8 MB

/Social Engineering/

Social Engineering Pen Tests - Gavin Watson, Andrew Mason and Richard Ackroyd (Auth.)-Social Engineering Penetration Testing. Executing , Assessments and Defense-Syngress (2014).pdf

15.8 MB

The_Art_of_Human_Hacking.pdf

6.4 MB

Wiley.Social.Engineering.And.Nonverbal.Behavior.Set.Feb.2014.ISBN.1118906713.pdf

145.9 MB

Wiley.Social.Engineering.The.Art.Of.Human.Hacking.Dec.2010.ISBN.0470639539.pdf

6.4 MB

/.../No.Starch.Metasploit.Jul.2011/

No.Starch.Metasploit.Jul.2011.epub

3.7 MB

No.Starch.Metasploit.Jul.2011.pdf

7.3 MB

/.../The Basics of Web Hacking- Syngress 2013 [Epub]/

Basics of Web Hacking, The - Pauli, Josh.epub

3.7 MB

Basics of Web Hacking, The - Pauli, Josh.jpg

122.9 KB

Basics of Web Hacking, The - Pauli, Josh.opf

1.3 KB

Thumbs.db

13.8 KB

/.../The Web Application Hacker's Handbook -Finding and Exploiting Security Flaws V413HAV/

The Web Application Hacker's Handbook -Finding and Exploiting Security Flaws V413HAV.pdf

14.2 MB

/.../Windows Server 2012 Inside Out V413HAV/

Read Me.txt

0.7 KB

Windows Server 2012 Inside Out V413HAV.epub

21.4 MB

Windows Server 2012 Inside Out V413HAV.pdf

34.8 MB

/Web Hacking Books/

32373.pdf

1.8 MB

33253.pdf

453.0 KB

33931.pdf

847.2 KB

how-to-instrument-for-advanced-web-application-penetration-testing.pdf

981.4 KB

Kali Linux Cookbook.pdf

10.9 MB

Nmap Cookbook The Fat-free Guide to Network Scanning.pdf

6.6 MB

No.Starch.The.Tangled.Web.Nov.2011.ISBN.1593273886.pdf

4.2 MB

Packt.Dreamweaver.CS6.Mobile.And.Web.Development.With.HTML5.CSS3.And.JQuery.Mobile.May.2013.ISBN.1849694745.pdf

9.7 MB

pfSense 2 Cookbook (2011).pdf

12.3 MB

SQL Injection Attacks and Defense - Justin Clarke.2ed.pdf

9.0 MB

Syngress.Hacking.Web.Apps.Sep.2012.ISBN.159749951X.pdf

23.0 MB

Syngress.SQL.Injection.Attacks.And.Defense.2nd.Edition.Jul.2012.ISBN.1597499633.pdf

6.7 MB

Syngress.Web.Application.Vulnerabilities.Detect.Exploit.Prevent.Dec.2007.ISBN.1597492094.pdf

21.9 MB

Syngress.XSS.May.2007.ISBN.1597491543.pdf

60.3 MB

XSS Attacks - Exploits and Defense.pdf

7.7 MB

/wifi 802.11/

Addison.Wesley.Real.802.Dot.11.Security.WiFi.Protected.Access.And.802.Dot.11.I.Jul.2003.ISBN.0321136209.chm

3.1 MB

Addison.Wesley.WiFoo.The.Secrets.Of.Wireless.Hacking.Jul.2004.ISBN.0321202171.chm

7.1 MB

Cisco.Press.WiFi.Hotspots.Setting.Up.Public.Wireless.Internet.Access.Oct.2006.ISBN.1587052660.chm

9.1 MB

McGraw.Hill.Hacking.Exposed.Wireless.2nd.Edition.Aug.2010.ISBN.0071666613.pdf

11.6 MB

Newnes.Bulletproof.Wireless.Security.Jun.2005.ISBN.0750677465.pdf

3.5 MB

OReilly.802.Dot.11.Security.Dec.2002.ISBN.0596002904.pdf

933.9 KB

 

Total files 736


Copyright © 2025 FileMood.com