Register
or
Login
×
Login
Lost Password?
Remember me
Login
Toggle navigation
Home
Portal
Search
Members
FAQ
More
View unread Posts
View New Posts
View Today's Posts
Contact Us
DummiesHub believe in censorship free world
You will find here everything that can't find anywhere!
Sign Up Now!
DummiesHub
»
Resources
»
Ebooks
»
cyber security and hacking books
Thread Rating:
0 Vote(s) - 0 Average
1
2
3
4
5
cyber security and hacking books
Thread tools
View a Printable Version
Thread Modes
Linear Mode
Threaded Mode
tikna
Administrator
Posts: 91
Threads: 59
Joined: Jun 2019
Reputation:
1
#1
10-19-2019, 03:26 PM
(This post was last modified: 10-19-2019, 03:30 PM by
tikna
.)
43.pdf
2018-10-31 23:05651K
Advanced Penetration Testing for Highly Secured Environments.pdf
2018-10-31 23:0516M
Attacks and sockets: smorgasbord of vulnerabilities.pdf
2018-10-31 23:053.1M
BHUSA09-Dzulfakar-MySQLExploit-SLIDES.pdf
2018-10-31 23:0511M
BHUSA09-VelaNava-FavoriteXSS-SLIDES.pdf
2018-10-31 23:051.1M
Basics of Hacking and Penetration Testing, The (Second Edition).epub
2018-10-31 23:053.5M
Bible cheatsheet.pdf
2018-10-31 23:05335K
Evading All Web-Application Firewalls XSS Filters.pdf
2018-10-31 23:05199K
Exploitation Of PHP Wrappers.pdf
2018-10-31 23:05703K
Frame Busting.pdf
2018-10-31 23:05722K
HOW_TO_HACK_FH2.txt
2018-10-31 23:05915
HackBack
2018-10-31 23:0518K
Mastering Kali Linux for Advanced Penetration Testing - Beggs, Robert.pdf
2018-10-31 23:059.0M
Mastering_Bitcoin-Antonopoulos.pdf
2018-10-31 23:0510M
O'Reilly - HTTP - The Definitive Guide.pdf
2018-10-31 23:055.2M
OWASP_Testing_Guide_v4.pdf
2018-10-31 23:052.1M
Penetration_Testing_Guidance_March_2015.pdf
2018-10-31 23:051.1M
Penetration_Testing_LAB_Setup_Guide-iab.pdf
2018-10-31 23:051.4M
Reverse_Engineering_for_Beginners-en.pdf
2018-10-31 23:056.9M
SSRFbible.Cheatsheet.pdf
2018-10-31 23:05304K
Sergey_Belov_-_NGinx_Warhead.pptx
2018-10-31 23:05277K
Spam_Nation_The_Inside_Story_of_Organized_Cybercrime_-_Brian_Krebs.DOC
2018-10-31 23:05684K
Stealing the Network - The Complete Series Collector's Edition.pdf
2018-10-31 23:0511M
T3.pdf
2018-10-31 23:054.2M
The Art of Grey-Box Attack
2018-10-31 23:0557K
The Hacker Playbook 2- Practical Guide To Penetration Testing.pdf
2018-10-31 23:0523M
The Hacker Playbook Practical Guide To Penetration Testing.pdf
2018-10-31 23:0526M
Ultimate Test Drive_NGFW_Workshop Guide_3.0-20150616.pdf
2018-10-31 23:055.5M
WebHacking101.pdf
2018-10-31 23:05543K
Web Penetration Testing with Kali Linux, Second Edition.pdf
2018-10-31 23:0511M
bh-eu-12-Be'ery-FYI_you_got_LFI-WP.pdf
2018-10-31 23:051.0M
hack_back!_a_diy_guide.txt
2018-10-31 23:0542K
https-bicycle-attack.pdf
2018-10-31 23:051.4M
php_include_and_post_exploitation.pdf
2018-10-31 23:051.1M
scribd-download.com_web-hacking-101.pdf
2018-10-31 23:055.9M
the-web-application-hackers-handbook.pdf
2018-10-31 23:0514M
thesis.pdf
2018-10-31 23:05337K
webpenetrationtestingwithkali.pdf
2018-10-31 23:0519M
wp-pentesters-guide-to-hacking-odata.pdf
2018-10-31 23:051.2M
In The Name of Lord Rama
Reply
Reply
tikna
Administrator
Posts: 91
Threads: 59
Joined: Jun 2019
Reputation:
1
#2
10-19-2019, 03:31 PM
Black Hat Python - Python programming for hackers and pentesters.pdf
2017-10-19 07:133.0M
Browser Hacker's Handbook, The - Wade Alcorn & Christian Frichot & Michele Orru.pdf
2017-10-20 01:5330M
Che Guevara Guerrilla Warfare.pdf
2018-05-13 02:21416K
EN - Practical packet analysis - Wireshark.pdf
2017-10-20 01:2327M
JSON Web Tokens Handbook v0.14.1.pdf
2018-09-19 15:481.6M
Maximum Linux Security 2nd.pdf
2017-10-20 01:3411M
O'Reilly - HTTP.pdf
2017-03-18 11:305.2M
RH124-RHEL7.pdf
2018-08-15 18:2211M
RH134-RHEL7.pdf
2018-08-15 18:227.5M
TCP IP Guide Oct 2005.pdf
2017-10-20 01:5054M
The C programming language 2nd.pdf
2018-02-18 14:5623M
The Hacker Playbook - Practical Guide To Penetration Testing.pdf
2018-10-02 10:329.0M
The Tagled Web A Guide to Securing Modern Web Applications.pdf
2018-03-25 23:514.0M
Violent Python - A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers.pdf
2017-10-19 07:147.8M
In The Name of Lord Rama
Reply
Reply
tikna
Administrator
Posts: 91
Threads: 59
Joined: Jun 2019
Reputation:
1
#3
10-19-2019, 03:32 PM
Mastering Bitcoin - Andreas Antonopoulos.pdf
2017-07-16 03:487.9M
Price Action Breakdown - Laurentiu Damir.pdf
2018-05-13 01:144.7M
In The Name of Lord Rama
Reply
Reply
tikna
Administrator
Posts: 91
Threads: 59
Joined: Jun 2019
Reputation:
1
#4
10-19-2019, 03:33 PM
ICMP redirects are bad.pdf
2018-02-17 07:3453K
Internetworking Technology Handbook.pdf
2018-01-27 12:4310M
In The Name of Lord Rama
Reply
Reply
tikna
Administrator
Posts: 91
Threads: 59
Joined: Jun 2019
Reputation:
1
#5
10-19-2019, 03:34 PM
An Approach for Mitigating Denial of Service Attack.pdf
2017-08-29 16:151.6M
Communication Theory of Secrecy Systems.pdf
2017-11-26 21:55549K
Exploiting capabilities.pdf
2017-09-27 05:0394K
Lockpicking Detail Overkill[Password: evva3ks].pdf
2018-07-08 02:461.2M
Mining of Massive Datasets.pdf
2018-06-04 01:062.9M
Privacy and Protection for Criminals - Behaviors and Patterns of Rogue Hosting Providers.pdf
2018-06-27 22:582.6M
SamSam - The Almost Six Million Dollar Ransomware.pdf
2018-07-31 14:582.6M
In The Name of Lord Rama
Reply
Reply
tikna
Administrator
Posts: 91
Threads: 59
Joined: Jun 2019
Reputation:
1
#6
10-19-2019, 03:35 PM
A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.pdf
2017-12-22 04:325.2M
Attacks and sockets: smorgasbord of vulnerabilities.pdf
2017-03-18 11:303.1M
Command Injection and Shell Injection.pdf
2017-08-31 13:085.3M
Compression Oracle attacks on VPN Networks.pdf
2018-08-23 21:443.2M
Introduction to OpenID Connect and OAuth 2.pdf
2018-05-24 00:5516M
LFI With PHPInfo Assistance.pdf
2018-02-11 02:28212K
Modern Web Application Firewalls Fingerprinting and Bypassing XSS FIlters.pdf
2018-03-19 20:291.2M
PHP Magic Tricks: Type Juggling.pdf
2018-01-12 02:57590K
Red Team Field Manual v2.pdf
2017-03-18 11:302.9M
SSRF Bible cheatsheet.pdf
2017-08-16 10:01335K
SSRF Pwns: new techniques and stories.pdf
2017-03-18 11:302.5M
Same Origin Method Execution (SOME) - Exploiting A Callback for Same Origin Policy Bypass.pdf
2018-06-02 22:322.7M
Web application security.pdf
2017-03-18 11:301.8M
In The Name of Lord Rama
Reply
Reply
tikna
Administrator
Posts: 91
Threads: 59
Joined: Jun 2019
Reputation:
1
#7
10-19-2019, 03:36 PM
Anomalous keys in Tor relays.pdf
2017-08-09 01:01510K
Automatic Product Categorization for Anonymous Marketplaces.pdf
2018-10-10 19:57879K
Cell_counting.pdf
2018-10-31 23:05387K
DEFCON-25-Roger-Dingledine-Next-Generation-Tor-Onion-Services.pdf
2018-10-31 23:052.2M
Deanonymisation techniques for Tor and Bitcoin.pdf
2017-08-22 21:322.8M
Design of cell-counting-based attack against Tor.pdf
2017-08-09 01:15387K
Detecting Intruders and Preventing Hackers from Evasion by Tor Circuit Selection.pdf
2018-10-02 05:07265K
DigesTor: Comparing Passive Traffic Analysis Attacks on Tor.pdf
2018-10-10 16:50464K
Everything About Tor v1.6.pdf
2017-06-09 02:131.8M
How Do Tor Users Interact With Onion Services.pdf
2018-10-22 21:15728K
Measuring_Tor.pdf
2018-10-31 23:052.5M
Next-Generation-Tor-Onion-Services.pdf
2017-08-08 00:582.2M
Protocol-level attacks against Tor.pdf
2017-08-09 01:151.7M
Tor: Hidden Service Intelligence Extraction.pdf
2018-11-01 01:39691K
Tor: Hidden Service Scaling.pdf
2018-10-09 06:151.2M
Tor and circumvention.pdf
2018-10-31 23:053.2M
Tor and circumvention: Lessons learned.pdf
2017-08-08 00:583.2M
kadianakis2017a.pdf
2018-10-31 23:05510K
protocol_level_attack.pdf
2018-10-31 23:051.7M
sucu-torscaling.pdf
2018-10-31 23:051.2M
tor-v1.6.pdf
2018-10-31 23:051.8M
In The Name of Lord Rama
Reply
Reply
tikna
Administrator
Posts: 91
Threads: 59
Joined: Jun 2019
Reputation:
1
#8
10-19-2019, 04:06 PM
Analyse d un packer de trojan et programmation d un unpacker.pdf
July-11-2014 12:00756 Ko
CodeBreakers 2006 - AntiDebugging techniques.pdf
May-29-2016 23:07217 Ko
Comment contourner la protection aleatoire de la pile sur le noyau 2.6.pdf
April-16-2010 01:111 Mo
Construction d un desassembleur de taille oriente Hooking.pdf
April-16-2010 01:112 Mo
Control Flow Obfuscations in Malwares.pdf
July-11-2014 12:032 Mo
Corruption de la memoire lors de l exploitation.pdf
March-03-2010 22:06510 Ko
Crack de Auto Window Manager.pdf
March-17-2010 23:51249 Ko
Cracker les SSHA sous LDAP.pdf
October-20-2010 15:01501 Ko
Cracking ZIP file s Password.pdf
June-14-2014 21:2216 Ko
Cracking_Passwords_Guide.pdf
March-29-2015 22:55272 Ko
Crackme KillNag de KiTo.pdf
October-20-2010 15:01152 Ko
Creating code obfuscation Virtual Machines.pdf
May-29-2016 23:07612 Ko
Deamon
March-29-2015 23:35-
Deobfuscation of Virtualization-Obfuscated Software.pdf
May-29-2016 23:07192 Ko
Depassement de capacite de la pile.pdf
March-20-2010 23:151001
Ko
EN-Decimalisation Table Attacks For PIN Cracking.pdf
March-14-2011 17:31223 Ko
Etude d un Loader Tout en Memoire pour Packer.pdf
July-11-2014 12:22475 Ko
Exploit writing tutorial part 7 Unicode - from 0.00410041 to calc.pdf
January-11-2015 22:33622 Ko
GDB - petit tutoriel.pdf
October-20-2010 15:0184 Ko
HARES: Hardened Anti-Reverse Engineering System.pdf
May-29-2016 23:07241 Ko
Hi GDB, this is python.pdf
May-29-2016 23:07242 Ko
How We Cracked the Code Book Ciphers.pdf
October-20-2010 15:01272 Ko
IDA L usine a Gaz.pdf
July-11-2014 12:02532 Ko
Ingenierie inverse du code executable ELF dans l analyse apres intrusion.pdf
April-16-2010 01:12226 Ko
Introduction au format Portable Executable.pdf
October-20-2010 15:013 Mo
Intro Reverse et Patch Android.pdf
July-11-2014 12:022 Mo
KromCrack
March-29-2015 23:35-
Manual Unpacking d Anti007 2.5.pdf
October-20-2010 15:01376 Ko
Multi-stage Binary Code Obfuscation using Improved Virtual Machine.pdf
May-29-2016 23:07485 Ko
OllyDbg.pdf
January-03-2010 19:21446 Ko
OllyDbg 2.0 Brief Help.pdf
June-03-2010 23:03372 Ko
Packer-analysis-report-debugging-unpacking-nspack-3.4-packer-3.7.pdf
March-29-2015 22:585 Mo
pas-a-pas-vers-l-assembleur-par-lord-noteworthy.pdf
October-20-2010 15:012 Mo
Pifoman
March-29-2015 23:35-
Practical Reverse Engineering.pdf
May-29-2016 23:075 Mo
radare.pdf
July-11-2014 12:03281 Ko
RCE-Unpacking-eBook-Translated-by-LithiumLi-Unprotected.pdf
May-29-2016 23:07111
Mo
Retro-Ingenierie C++ - Heritage et polymorphisme.pdf
May-01-2015 14:59338 Ko
Reverse enginering.pdf
October-20-2010 15:01269 Ko
Reversing - Secrets Of Reverse Engineering (2005).pdf
May-29-2016 23:078 Mo
Reversing CRC Theory and Practice.pdf
March-14-2011 17:31624 Ko
Reversing Encrypted Callbacks and COM Interfaces.pdf
July-11-2014 12:031 Mo
Reversing Malware Analysis Training
March-29-2015 23:06-
Serial fishing sur un soft.pdf
February-17-2010 15:41227 Ko
SSTIC06-Castle in the Skype.pdf
May-29-2016 23:07950 Ko
SSTIC2012-Miasm Framework de reverse engineering-slides.pdf
May-29-2016 23:07589 Ko
SSTIC2012-Miasm Framework de reverse engineering.pdf
May-29-2016 23:07728 Ko
The Art of Unpacking.pdf
May-29-2016 23:07504 Ko
The IDA Pro Book-2nd Edition-2011.pdf
May-29-2016 23:089 Mo
Tuto reversing - Comment enlever une protection anti-debug classique sur un executable.pdf
April-06-2010 00:111 Mo
Unpacking Virtualization Obfuscators.pdf
May-29-2016 23:08130 Ko
Utilisation du framework triton pour l.analyse de code obfusque.pdf
May-29-2016 23:081004
Ko
Virtual Deobfuscator - A DARPA Cyber Fast Track Funded Effort.pdf
May-29-2016 23:08891
Ko
In The Name of Lord Rama
Reply
Reply
tikna
Administrator
Posts: 91
Threads: 59
Joined: Jun 2019
Reputation:
1
#9
10-19-2019, 04:07 PM
Session_1_Detection _and_Removal_of_Malwares.pdf
March-29-2015 23:4519 Mo
Session_2_Botnet_Analysis_Part_1.pdf
March-29-2015 23:194 Mo
Session_3_Botnet_Analysis_Part_2.pdf
March-29-2015 23:073 Mo
Session_4_Anti-Analysis_Techniques.pdf
March-29-2015 23:223 Mo
Session_5_Reversing_Automation.pdf
March-29-2015 23:052 Mo
Session_6_Malware_Sandbox_Analysis.pdf
March-29-2015 23:216 Mo
Session_7_Malware_Memory_Forensics.pdf
March-29-2015 23:3717 Mo
Session_8_Introduction_to_Android.pdf
March-29-2015 23:37319 Ko
Session_9_Malware Analysis using pymal & malpimp.pdf
March-29-2015 23:07154 Ko
Session_10 - (Part 1) Reversing & Decrypting_Communications_of_HeartBeat_RAT.pdf
March-29-2015 23:1613 Mo
Session_11 - (Part 2) Dissecting_the_HeartBeat_RAT_Functionalities.pdf
March-29-2015 23:3018 Mo
In The Name of Lord Rama
Reply
Reply
Possibly Related Threads…
Thread
Author
/
Last Post
Books
tikna
Replies:
1
Views: 1,725
08-20-2019, 09:27 PM
Last Post
:
tikna
Forum Jump:
Private Messages
User Control Panel
Who's Online
Search
Forum Home
Announcements
-- From Admin
General Discussions
-- Introduction
-- News
-- Help
-- Random Discussion
Programming
-- C & C++
-- Python
-- Javascript
-- JAVA
-- Others
Computer
-- O.S
-- Software and Programmes
-- Networking
-- IOT
Cyber Security
-- Pentesting Tools
-- 0day
-- Hacking & Cracking Tutorials
Web Developement
-- SEO Tools
-- Web Designing
Cryptocurrency
-- Bitcoin
-- News
-- Mining
-- Buy & Sell
Resources
-- Leaks & Dumps
-- Ebooks
-- Programes
-- Games
-- Lectures
-- Giveaways
Entertainment
-- Memes
-- Movies
-- Web Series
-- Music
Academic
-- Undergraduate
-- Highschool
-- Graduate
Users browsing this thread: 1 Guest(s)
DummiesHub
- Powered By
MyBB
, © 2002-2021
MyBB Group
.
Theme Select
Default
Dark-fire