• DummiesHub believe in censorship free world
  • You will find here everything that can't find anywhere!
  • Sign Up Now!
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5

cyber security and hacking books

#1
[Image: layout.gif]43.pdf2018-10-31 23:05651K
 [Image: layout.gif]Advanced Penetration Testing for Highly Secured Environments.pdf2018-10-31 23:0516M
 [Image: layout.gif]Attacks and sockets: smorgasbord of vulnerabilities.pdf2018-10-31 23:053.1M
 [Image: layout.gif]BHUSA09-Dzulfakar-MySQLExploit-SLIDES.pdf2018-10-31 23:0511M
 [Image: layout.gif]BHUSA09-VelaNava-FavoriteXSS-SLIDES.pdf2018-10-31 23:051.1M
 [Image: unknown.gif]Basics of Hacking and Penetration Testing, The (Second Edition).epub2018-10-31 23:053.5M
 [Image: layout.gif]Bible cheatsheet.pdf2018-10-31 23:05335K
 [Image: layout.gif]Evading All Web-Application Firewalls XSS Filters.pdf2018-10-31 23:05199K
 [Image: layout.gif]Exploitation Of PHP Wrappers.pdf2018-10-31 23:05703K
 [Image: layout.gif]Frame Busting.pdf2018-10-31 23:05722K
 [Image: text.gif]HOW_TO_HACK_FH2.txt2018-10-31 23:05915
 [Image: unknown.gif]HackBack2018-10-31 23:0518K
 [Image: layout.gif]Mastering Kali Linux for Advanced Penetration Testing - Beggs, Robert.pdf2018-10-31 23:059.0M
 [Image: layout.gif]Mastering_Bitcoin-Antonopoulos.pdf2018-10-31 23:0510M
 [Image: layout.gif]O'Reilly - HTTP - The Definitive Guide.pdf2018-10-31 23:055.2M
 [Image: layout.gif]OWASP_Testing_Guide_v4.pdf2018-10-31 23:052.1M
 [Image: layout.gif]Penetration_Testing_Guidance_March_2015.pdf2018-10-31 23:051.1M
 [Image: layout.gif]Penetration_Testing_LAB_Setup_Guide-iab.pdf2018-10-31 23:051.4M
 [Image: layout.gif]Reverse_Engineering_for_Beginners-en.pdf2018-10-31 23:056.9M
 [Image: layout.gif]SSRFbible.Cheatsheet.pdf2018-10-31 23:05304K
 [Image: unknown.gif]Sergey_Belov_-_NGinx_Warhead.pptx2018-10-31 23:05277K
 [Image: unknown.gif]Spam_Nation_The_Inside_Story_of_Organized_Cybercrime_-_Brian_Krebs.DOC2018-10-31 23:05684K
 [Image: layout.gif]Stealing the Network - The Complete Series Collector's Edition.pdf2018-10-31 23:0511M
 [Image: layout.gif]T3.pdf2018-10-31 23:054.2M
 [Image: unknown.gif]The Art of Grey-Box Attack2018-10-31 23:0557K
 [Image: layout.gif]The Hacker Playbook 2- Practical Guide To Penetration Testing.pdf2018-10-31 23:0523M
 [Image: layout.gif]The Hacker Playbook Practical Guide To Penetration Testing.pdf2018-10-31 23:0526M
 [Image: layout.gif]Ultimate Test Drive_NGFW_Workshop Guide_3.0-20150616.pdf2018-10-31 23:055.5M
 [Image: layout.gif]WebHacking101.pdf2018-10-31 23:05543K
 [Image: layout.gif]Web Penetration Testing with Kali Linux, Second Edition.pdf2018-10-31 23:0511M
 [Image: layout.gif]bh-eu-12-Be'ery-FYI_you_got_LFI-WP.pdf2018-10-31 23:051.0M
 [Image: text.gif]hack_back!_a_diy_guide.txt2018-10-31 23:0542K
 [Image: layout.gif]https-bicycle-attack.pdf2018-10-31 23:051.4M
 [Image: layout.gif]php_include_and_post_exploitation.pdf2018-10-31 23:051.1M
 [Image: layout.gif]scribd-download.com_web-hacking-101.pdf2018-10-31 23:055.9M
 [Image: layout.gif]the-web-application-hackers-handbook.pdf2018-10-31 23:0514M
 [Image: layout.gif]thesis.pdf2018-10-31 23:05337K
 [Image: layout.gif]webpenetrationtestingwithkali.pdf2018-10-31 23:0519M
 [Image: layout.gif]wp-pentesters-guide-to-hacking-odata.pdf2018-10-31 23:051.2M
In The Name of Lord Rama
#2
[Image: layout.gif]Black Hat Python - Python programming for hackers and pentesters.pdf2017-10-19 07:133.0M
  [Image: layout.gif]Browser Hacker's Handbook, The - Wade Alcorn & Christian Frichot & Michele Orru.pdf2017-10-20 01:5330M
  [Image: layout.gif]Che Guevara Guerrilla Warfare.pdf2018-05-13 02:21416K
  [Image: layout.gif]EN - Practical packet analysis - Wireshark.pdf2017-10-20 01:2327M
  [Image: layout.gif]JSON Web Tokens Handbook v0.14.1.pdf2018-09-19 15:481.6M
  [Image: layout.gif]Maximum Linux Security 2nd.pdf2017-10-20 01:3411M
  [Image: layout.gif]O'Reilly - HTTP.pdf2017-03-18 11:305.2M
  [Image: layout.gif]RH124-RHEL7.pdf2018-08-15 18:2211M
  [Image: layout.gif]RH134-RHEL7.pdf2018-08-15 18:227.5M
  [Image: layout.gif]TCP IP Guide Oct 2005.pdf2017-10-20 01:5054M
  [Image: layout.gif]The C programming language 2nd.pdf2018-02-18 14:5623M
  [Image: layout.gif]The Hacker Playbook - Practical Guide To Penetration Testing.pdf2018-10-02 10:329.0M
  [Image: layout.gif]The Tagled Web A Guide to Securing Modern Web Applications.pdf2018-03-25 23:514.0M
  [Image: layout.gif]Violent Python - A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers.pdf2017-10-19 07:147.8M
In The Name of Lord Rama
#3
[Image: layout.gif]Mastering Bitcoin - Andreas Antonopoulos.pdf2017-07-16 03:487.9M
 [Image: layout.gif]Price Action Breakdown - Laurentiu Damir.pdf2018-05-13 01:144.7M
In The Name of Lord Rama
#4
[Image: layout.gif]ICMP redirects are bad.pdf2018-02-17 07:3453K
 [Image: layout.gif]Internetworking Technology Handbook.pdf2018-01-27 12:4310M
In The Name of Lord Rama
#5
[Image: layout.gif]An Approach for Mitigating Denial of Service Attack.pdf2017-08-29 16:151.6M
 [Image: layout.gif]Communication Theory of Secrecy Systems.pdf2017-11-26 21:55549K
 [Image: layout.gif]Exploiting capabilities.pdf2017-09-27 05:0394K
 [Image: layout.gif]Lockpicking Detail Overkill[Password: evva3ks].pdf2018-07-08 02:461.2M
 [Image: layout.gif]Mining of Massive Datasets.pdf2018-06-04 01:062.9M
 [Image: layout.gif]Privacy and Protection for Criminals - Behaviors and Patterns of Rogue Hosting Providers.pdf2018-06-27 22:582.6M
 [Image: layout.gif]SamSam - The Almost Six Million Dollar Ransomware.pdf2018-07-31 14:582.6M
In The Name of Lord Rama
#6
[Image: layout.gif]A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.pdf2017-12-22 04:325.2M
 [Image: layout.gif]Attacks and sockets: smorgasbord of vulnerabilities.pdf2017-03-18 11:303.1M
 [Image: layout.gif]Command Injection and Shell Injection.pdf2017-08-31 13:085.3M
 [Image: layout.gif]Compression Oracle attacks on VPN Networks.pdf2018-08-23 21:443.2M
 [Image: layout.gif]Introduction to OpenID Connect and OAuth 2.pdf2018-05-24 00:5516M
 [Image: layout.gif]LFI With PHPInfo Assistance.pdf2018-02-11 02:28212K
 [Image: layout.gif]Modern Web Application Firewalls Fingerprinting and Bypassing XSS FIlters.pdf2018-03-19 20:291.2M
 [Image: layout.gif]PHP Magic Tricks: Type Juggling.pdf2018-01-12 02:57590K
 [Image: layout.gif]Red Team Field Manual v2.pdf2017-03-18 11:302.9M
 [Image: layout.gif]SSRF Bible cheatsheet.pdf2017-08-16 10:01335K
 [Image: layout.gif]SSRF Pwns: new techniques and stories.pdf2017-03-18 11:302.5M
 [Image: layout.gif]Same Origin Method Execution (SOME) - Exploiting A Callback for Same Origin Policy Bypass.pdf2018-06-02 22:322.7M
 [Image: layout.gif]Web application security.pdf2017-03-18 11:301.8M
In The Name of Lord Rama
#7
[Image: layout.gif]Anomalous keys in Tor relays.pdf2017-08-09 01:01510K
 [Image: layout.gif]Automatic Product Categorization for Anonymous Marketplaces.pdf2018-10-10 19:57879K
 [Image: layout.gif]Cell_counting.pdf2018-10-31 23:05387K
 [Image: layout.gif]DEFCON-25-Roger-Dingledine-Next-Generation-Tor-Onion-Services.pdf2018-10-31 23:052.2M
 [Image: layout.gif]Deanonymisation techniques for Tor and Bitcoin.pdf2017-08-22 21:322.8M
 [Image: layout.gif]Design of cell-counting-based attack against Tor.pdf2017-08-09 01:15387K
 [Image: layout.gif]Detecting Intruders and Preventing Hackers from Evasion by Tor Circuit Selection.pdf2018-10-02 05:07265K
 [Image: layout.gif]DigesTor: Comparing Passive Traffic Analysis Attacks on Tor.pdf2018-10-10 16:50464K
 [Image: layout.gif]Everything About Tor v1.6.pdf2017-06-09 02:131.8M
 [Image: layout.gif]How Do Tor Users Interact With Onion Services.pdf2018-10-22 21:15728K
 [Image: layout.gif]Measuring_Tor.pdf2018-10-31 23:052.5M
 [Image: layout.gif]Next-Generation-Tor-Onion-Services.pdf2017-08-08 00:582.2M
 [Image: layout.gif]Protocol-level attacks against Tor.pdf2017-08-09 01:151.7M
 [Image: layout.gif]Tor: Hidden Service Intelligence Extraction.pdf2018-11-01 01:39691K
 [Image: layout.gif]Tor: Hidden Service Scaling.pdf2018-10-09 06:151.2M
 [Image: layout.gif]Tor and circumvention.pdf2018-10-31 23:053.2M
 [Image: layout.gif]Tor and circumvention: Lessons learned.pdf2017-08-08 00:583.2M
 [Image: layout.gif]kadianakis2017a.pdf2018-10-31 23:05510K
 [Image: layout.gif]protocol_level_attack.pdf2018-10-31 23:051.7M
 [Image: layout.gif]sucu-torscaling.pdf2018-10-31 23:051.2M
 [Image: layout.gif]tor-v1.6.pdf2018-10-31 23:051.8M
In The Name of Lord Rama
#8
[Image: pdf.gif]Analyse d un packer de trojan et programmation d un unpacker.pdfJuly-11-2014 12:00756 Ko
 [Image: pdf.gif]CodeBreakers 2006 - AntiDebugging techniques.pdfMay-29-2016 23:07217 Ko
 [Image: pdf.gif]Comment contourner la protection aleatoire de la pile sur le noyau 2.6.pdfApril-16-2010 01:111 Mo
 [Image: pdf.gif]Construction d un desassembleur de taille oriente Hooking.pdfApril-16-2010 01:112 Mo
 [Image: pdf.gif]Control Flow Obfuscations in Malwares.pdfJuly-11-2014 12:032 Mo
 [Image: pdf.gif]Corruption de la memoire lors de l exploitation.pdfMarch-03-2010 22:06510 Ko
 [Image: pdf.gif]Crack de Auto Window Manager.pdfMarch-17-2010 23:51249 Ko
 [Image: pdf.gif]Cracker les SSHA sous LDAP.pdfOctober-20-2010 15:01501 Ko
 [Image: pdf.gif]Cracking ZIP file s Password.pdfJune-14-2014 21:2216 Ko
 [Image: pdf.gif]Cracking_Passwords_Guide.pdfMarch-29-2015 22:55272 Ko
 [Image: pdf.gif]Crackme KillNag de KiTo.pdfOctober-20-2010 15:01152 Ko
 [Image: pdf.gif]Creating code obfuscation Virtual Machines.pdfMay-29-2016 23:07612 Ko
 [Image: folder.png]DeamonMarch-29-2015 23:35-
 [Image: pdf.gif]Deobfuscation of Virtualization-Obfuscated Software.pdfMay-29-2016 23:07192 Ko
 [Image: pdf.gif]Depassement de capacite de la pile.pdfMarch-20-2010 23:151001
Ko[Image: pdf.gif]EN-Decimalisation Table Attacks For PIN Cracking.pdfMarch-14-2011 17:31223 Ko
 [Image: pdf.gif]Etude d un Loader Tout en Memoire pour Packer.pdfJuly-11-2014 12:22475 Ko
 [Image: pdf.gif]Exploit writing tutorial part 7 Unicode - from 0.00410041 to calc.pdfJanuary-11-2015 22:33622 Ko
 [Image: pdf.gif]GDB - petit tutoriel.pdfOctober-20-2010 15:0184 Ko
 [Image: pdf.gif]HARES: Hardened Anti-Reverse Engineering System.pdfMay-29-2016 23:07241 Ko
 [Image: pdf.gif]Hi GDB, this is python.pdfMay-29-2016 23:07242 Ko
 [Image: pdf.gif]How We Cracked the Code Book Ciphers.pdfOctober-20-2010 15:01272 Ko
 [Image: pdf.gif]IDA L usine a Gaz.pdfJuly-11-2014 12:02532 Ko
 [Image: pdf.gif]Ingenierie inverse du code executable ELF dans l analyse apres intrusion.pdfApril-16-2010 01:12226 Ko
 [Image: pdf.gif]Introduction au format Portable Executable.pdfOctober-20-2010 15:013 Mo
 [Image: pdf.gif]Intro Reverse et Patch Android.pdfJuly-11-2014 12:022 Mo
 [Image: folder.png]KromCrackMarch-29-2015 23:35-
 [Image: pdf.gif]Manual Unpacking d Anti007 2.5.pdfOctober-20-2010 15:01376 Ko
 [Image: pdf.gif]Multi-stage Binary Code Obfuscation using Improved Virtual Machine.pdfMay-29-2016 23:07485 Ko
 [Image: pdf.gif]OllyDbg.pdfJanuary-03-2010 19:21446 Ko
 [Image: pdf.gif]OllyDbg 2.0 Brief Help.pdfJune-03-2010 23:03372 Ko
 [Image: pdf.gif]Packer-analysis-report-debugging-unpacking-nspack-3.4-packer-3.7.pdfMarch-29-2015 22:585 Mo
 [Image: pdf.gif]pas-a-pas-vers-l-assembleur-par-lord-noteworthy.pdfOctober-20-2010 15:012 Mo
 [Image: folder.png]PifomanMarch-29-2015 23:35-
 [Image: pdf.gif]Practical Reverse Engineering.pdfMay-29-2016 23:075 Mo
 [Image: pdf.gif]radare.pdfJuly-11-2014 12:03281 Ko
 [Image: pdf.gif]RCE-Unpacking-eBook-Translated-by-LithiumLi-Unprotected.pdfMay-29-2016 23:07111
Mo[Image: pdf.gif]Retro-Ingenierie C++ - Heritage et polymorphisme.pdfMay-01-2015 14:59338 Ko
 [Image: pdf.gif]Reverse enginering.pdfOctober-20-2010 15:01269 Ko
 [Image: pdf.gif]Reversing - Secrets Of Reverse Engineering (2005).pdfMay-29-2016 23:078 Mo
 [Image: pdf.gif]Reversing CRC Theory and Practice.pdfMarch-14-2011 17:31624 Ko
 [Image: pdf.gif]Reversing Encrypted Callbacks and COM Interfaces.pdfJuly-11-2014 12:031 Mo
 [Image: folder.png]Reversing Malware Analysis TrainingMarch-29-2015 23:06-
 [Image: pdf.gif]Serial fishing sur un soft.pdfFebruary-17-2010 15:41227 Ko
 [Image: pdf.gif]SSTIC06-Castle in the Skype.pdfMay-29-2016 23:07950 Ko
 [Image: pdf.gif]SSTIC2012-Miasm Framework de reverse engineering-slides.pdfMay-29-2016 23:07589 Ko
 [Image: pdf.gif]SSTIC2012-Miasm Framework de reverse engineering.pdfMay-29-2016 23:07728 Ko
 [Image: pdf.gif]The Art of Unpacking.pdfMay-29-2016 23:07504 Ko
 [Image: pdf.gif]The IDA Pro Book-2nd Edition-2011.pdfMay-29-2016 23:089 Mo
 [Image: pdf.gif]Tuto reversing - Comment enlever une protection anti-debug classique sur un executable.pdfApril-06-2010 00:111 Mo
 [Image: pdf.gif]Unpacking Virtualization Obfuscators.pdfMay-29-2016 23:08130 Ko
 [Image: pdf.gif]Utilisation du framework triton pour l.analyse de code obfusque.pdfMay-29-2016 23:081004
Ko[Image: pdf.gif]Virtual Deobfuscator - A DARPA Cyber Fast Track Funded Effort.pdfMay-29-2016 23:08891
Ko
In The Name of Lord Rama
#9
[Image: pdf.gif]Session_1_Detection _and_Removal_of_Malwares.pdfMarch-29-2015 23:4519 Mo
 [Image: pdf.gif]Session_2_Botnet_Analysis_Part_1.pdfMarch-29-2015 23:194 Mo
 [Image: pdf.gif]Session_3_Botnet_Analysis_Part_2.pdfMarch-29-2015 23:073 Mo
 [Image: pdf.gif]Session_4_Anti-Analysis_Techniques.pdfMarch-29-2015 23:223 Mo
 [Image: pdf.gif]Session_5_Reversing_Automation.pdfMarch-29-2015 23:052 Mo
 [Image: pdf.gif]Session_6_Malware_Sandbox_Analysis.pdfMarch-29-2015 23:216 Mo
 [Image: pdf.gif]Session_7_Malware_Memory_Forensics.pdfMarch-29-2015 23:3717 Mo
[Image: pdf.gif]Session_8_Introduction_to_Android.pdfMarch-29-2015 23:37319 Ko
[Image: pdf.gif]Session_9_Malware Analysis using pymal & malpimp.pdfMarch-29-2015 23:07154 Ko
 [Image: pdf.gif]Session_10 - (Part 1) Reversing & Decrypting_Communications_of_HeartBeat_RAT.pdfMarch-29-2015 23:1613 Mo
 [Image: pdf.gif]Session_11 - (Part 2) Dissecting_the_HeartBeat_RAT_Functionalities.pdfMarch-29-2015 23:3018 Mo
In The Name of Lord Rama
Possibly Related Threads…
Thread
Author
  /  
Last Post
Replies: 1
Views: 1,348
08-20-2019, 09:27 PM
Last Posttikna

Forum Jump:

Users browsing this thread: 2 Guest(s)