Security/Hacking Ebook Collection
#1
Security/Hacking Ebook Collection
Sharing some of the ebooks I've collected over these years. Enjoy.

Individual files: http://ytxmrc3pcbv5464e.onion/files/Info...Files_Dir/

Offensive Security - Advanced Windows Exploitation (AWE) v 1.1
Code [No Highlight]:

AWE-1.pdf
AWE-2.pdf 
AWE-3.pdf 
AWE-4.pdf


Tor: http://ytxmrc3pcbv5464e.onion/files/Info...20v%201.1/

Security/Hacking Ebooks [Other]
Code [No Highlight]:

Advanced Penetration Testing for Highly-Secured Environments- The Ultimate Security Guide [eBook].pdf
An Introduction to the Analysis of Algorithms, 2nd Edition.pdf
Apress - Pro Bash Programming Scripting the GNULinux Shell (10-2009) (ATTiCA).pdf
Bash Guide for Beginners.pdf
Buffer Overflow Attacks - Detect, Exploit, Prevent (Syngress, 2005) BBS.pdf
CCENT-CCNA ICND1 640-822 Official Cert Guide, 3rd Edition.pdf
command-line.pdf
CompTIA Linux Plus Study Guide 2013 for Exams LX0-101 and LX0-102 2nd Ed.pdf
CompTIA_Security_SY0-301.pdf
Dos Attacked.pdf
Fadia, Ankit - Encryption Algorithms Explained.pdf
firewalls(2).doc
Fundamentals of Computer Programming with C#.pdf
Getting geographical Information using an IP Address (1).doc
GNU-Linux Command-Line Tools Summary Gareth Anderson.pdf
Hacking a Coke Machine.pdf
Hacking and Network Defense.pdf
Hacking Exposed Computer Forensics Secrets & Solutions.pdf
Hacking Exposed Wireless (ntwk security) 2nd ed - J. Cache, et al., (McGraw-Hill, 2010) BBS.pdf
Hacking for Dummies 2.pdf
Hacking.Into.Computer.Systems-A.Beginners.Guide---420ebooks.pdf
Hacking into Linux.doc
Hacking The Art Of Exploitation 2nd Edition V413HAV.pdf
Hacking The Linux.pdf
Hack The Net.pdf
Hardcore Windows XP - The Step by Step Guide To Ultimate Performance.pdf
hashcat_user_manual.pdf
How to Master Subnetting.pdf
HTTP_methods attacks.pdf
Inside Cyber Warfar by Jeffrey Carr.pdf
Introduction to Software Development.pdf
Kevin_Mitnick_-_Art_Of_Deception.pdf
Kevin Mitnick - The Art of Intrusion.pdf
Linux-101-Hacks.pdf
Linux Kernel Development, 3rd Edition.pdf
Linux Shell Scripting Cookbook, Second Edition [eBook].pdf
Machine Learning for hackers.pdf
Mastering Metasploit- RAW [eBook].pdf
Metasploit.pdf
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research.pdf
More Password Cracking Decrypted.doc
Nessus-Network-Auditing.pdf
Nmap 6 Network Exploration and Security Auditing Cookbook.pdf
Offensive Security - BackTrack to the Max Cracking the Perimeter V 1.0.pdf
Offensive.Security.WiFu.v2.0.pdf
Own-The-Box.pdf
Packt.Metasploit.Penetration.Testing.Cookbook.Jun.2012.RETAIL.eBook-ELOHiM.pdf
Programming in Objective-C, 6th Edition.pdf
RTFM - Red Team Field Manual v2.pdf
Scene of the Cybercrime - Computer Forensics Handbook.pdf
Sendmail and Beyond.doc
SET_User_Manual.pdf
SSH_Tectia.pdf
SSL Torn Apart.doc
SSL VPN - Understanding, evaluating and planning secure, web-based remote access [eBook].pdf
The Art of Readable Code.pdf
The Basics of Web Hacking.epub
The Linux Command Line by William Shotts.pdf
The Web Application Hackers Handbook.pdf
Transparent Proxies in Squid.doc
Truths!!!--What they Dont teach in Manuals!!!.pdf
User_Manual.pdf
we-are-anon.pdf
web_for_pentester.pdf
Windows Password Files Torn Apart.doc
Wireshark Network Analysis_ The Official Wireshark Certified Network Analyst Study Guide - Laura Chappell.pdf
WordPress.3.Ultimate.Security.pdf

Tor: http://ytxmrc3pcbv5464e.onion/files/Info...Ebooks1.7z

Security/Hacking Ebooks [Third Batch]
Code [No Highlight]:

100-uC-OS-II-002.pdf
A Day in the Life of a Flux Reversal - Count Zero.pdf
advanced bash scripting guide.pdf
Algorithms Explained.doc
Ankit Fadia Hacking Guide.pdf
BackTrack 5 Cookbook.pdf
BackTrack 5 Wireless Penetration Testing Beginners Guide[NepsterJay].pdf
Bash Reference Manual by Chet Ramey and Brian Fox.pdf
Bluetooth Hacking.pdf
CCENT Cisco Certified Entry Networking Technician (2013).pdf
CCNA Wireless Study Guide_ IUWNE Exam 640-721 - Lammle, Todd.pdf
Certified Ethical Hacker Study Guide.pdf
CompTIA_Network_N10-005.pdf
CWTS_ Certified Wireless Technology Specialist Official Study Guide_ Exam PW0-070 - Robert J. Bartz.pdf
Data Mining and Machine Learning in Cybersecurity.pdf
debian-handbook.pdf
Firebug 1.5 Editing Debugging and Monitoring Web Pages [eBook].pdf
firewalls.doc
FTP Exploits By Ankit Fadia.pdf
Gathering Info on Remote Host.doc
Getting geographical Information using an IP Address.doc
GoogleHackingforPenetrationTesters.pdf
Hackers Delight - By Henry S. Warren,.pdf
Hackers Survival Guide.pdf
Hacking, 2nd Edition.pdf
Hacking - Dangerous Google - Searching For Secrets by Michał Piotrowski.pdf
Hacking Exposed 6 (ntwk security) - S. McClure, et. al., (McGraw-Hill, 2009) BBS.pdf
Hacking Exposed 7.epub
Hacking - Firewalls And Networks How To Hack Into Remote Com.pdf
Hacking---Firewalls-And-Networks-How-To-Hack-Into-Remote-Computers.pdf
hacking_gmail.pdf
Hacking Into Computer Systems - Beginners.pdf
Hacking Intranet Websites.pdf
Hacking the Human.pdf
Hacking Web Apps.pdf
Hacking with Kali - Broad, James, Bindner, Andrew.pdf
Hack Proofing Your Web Server.pdf
How to Crack CD Protections.pdf
How to Make Key Generators.pdf
How to Master CCNA v2.0.pdf
HTML-Guide.pdf
Identify Theft for Dummies - M. Arata (Wiley, 2010).pdf
Instant Wireshark Starter [eBook].pdf
Introduction to Linux; A Hands on Guide by Machtelt Garrels.pdf
Java Programming From Problem Analysis To Program Design 4th ed.pdf
Kali Linux Cookbook.pdf
learnd2.pdf
Learning Java, 4th Edition[A4].pdf
Learning PHP, MySQL & JavaScript, 4th Edition.pdf
linux_server_hacks.pdf
Linux System Programming.pdf
Linux Utilities Cookbook [eBook].pdf
Low Tech Hacking -Street Smarts for Security Professionals [NepsterJay].pdf
Mastering Microsoft Exchange Server 2013 - Elfassy, David.pdf
metasplitable2_sih60b.pdf
Metasploit Penetration Testing Cookbook, Second Edition [eBook].pdf
Microsoft Windows Xp - Command-Line Reference A-Z.pdf
Moore-Critical-Thinking-Intelligence-Analysis.pdf
Net+ 2009.pdf
netcat_power_tools.pdf
Ninja-Hacking.pdf
Nmap Network Scanning.pdf
Offensive Security - Penetration Testing with BackTrack (Lab Guide)v3.2.pdf
OpenVPN 2 Cookbook [eBook].pdf
OS_and_application_fingerprinting.pdf
PayPal Hacks.pdf
PracticalPacketAnalysis2e.pdf
Removing Banners from your site.doc
Scalix- Linux Administrator’s Guide.pdf
Secrets of Network Cartography A Comprehensive Guide to Nmap.pdf
Seven Deadliest Web Application Attacks.pdf
Simple Hacks - Addons, Macros And More.pdf
Syngress.Asterisk.Hacking.May.2007.pdf
TCP Wrappers Unwrapped.doc
The Basics of Web Hacking - Pauli, Josh.pdf
The Psychology of Interrogations and Confessions A Handbook - Gisli H. Gudjonsson.pdf
Tracing IP,DNS,WHOIS-nsLOOKUP.pdf
Understanding TCP_IP [eBook].pdf
Untold Windows Tips and Secrets.doc
Web Penetration Testing with Kali Linux.pdf
Wiley.Ubuntu.Linux.Toolbox.1000.plus.Commands.for.Ubuntu.and.Debian.Power.Users.Nov.2007.pdf
Wireshark Network Analysis_ The Official Wireshark Certork Analyst Study Guide - Laura Chappell & Gerald Combs.mobi
WordPress Web Application Development [eBook].pdf


Tor: http://ytxmrc3pcbv5464e.onion/files/Info...Ebooks2.7z

Security/Computing [Forth Release]
Code [No Highlight]:

003 - Activar Windows XP - WindowsXP 01.pdf
0321108957.Addison-Wesley Professional.Honeypots- Tracking Hackers.pdf
070-215.TestKing.v13.Q209.pdf
070-228 Test King Mcdba Study Guide (70-228).pdf
070-271 actualtests supporting users and troubleshooting a ms windows xp os v07.01.05 200q.pdf
070-284 MCSE 2003 Installing, Configuring and Administering Microsoft Exchange 2003 v26 [TestKing.pdf
070-292 Actual Tests MCSE Exam Q&A v10.22.03.pdf
070 292 Test King MCSE Windows Server 2003 Managing A Network Environment MCSA Upgrade Study Guide v1.0(70-292).pdf
070-310 - Test King - MCSD-MCAD - Developing XML Web Services and Server Components with Microsoft Visual Basic .NET Q & A.pdf
11 Passwords.pdf
12 Tips for Dreamweaver 4.pdf
2003-11-12 TEST KING 70-229 MCDBA.pdf
2 2 Sybex - 70-290 Mcsa Mcse - Windows Xp Professional Study Guide (2Nd Edition).pdf
24742335-Bash-Shell-Referance.pdf
285063-Hacker.Bibel.[278.kB_www.netz.ru].pdf
2_Cisco Press - CCNA ICND Exam Certification Guide.2004.pdf
2_MCDBA 70-291 MCSE MCSA - Win Server 2003 Network Infrastructure by Syngress.pdf
2_Oracle OCP Admin Exam.doc
2_SCJP Exam - TestKing 310-055 Sun Java Certified Programmer v3.0.pdf
2__Test King - 070-290 - Version 03.00 - Managing and Maintaining a Microsoft Windows Server 2003 Environment (MCSE).pdf
2_Testking - 70-290 Microsoft MCSE 2003 Managing and Maintaining a MS Win Server 2003 Environment Edt 6.0 .pdf
2_TestKing Ccnp Cisco 642-801 BSCI v4.0.pdf
3077366-HackerHighSchool.pdf
330 Java Tips.pdf
361q_Test King Cisco 640-607 Exam Q&A v11.1.pdf
376-karplus molecular computer simulation.pdf
640-607 Cisco Press CCNA 3.0 Study Guide (con indice).PDF
640-801 - Cisco CCNA - TestKing 15.1.pdf
640-861.Ciscopress.Exam.Certification.Guide.ccda.pdf
70-215 MCSE Windows 2000 Server Study Guide 2nd Edition Sybex.pdf
70-215 MCSE Windows 2000 Server Training.pdf
70-216 MCSE Windows 2000 Network Infrastructure Administration Study Guide 2nd Edition Sybex.pdf
70-216 Sybex - MCSE Training Guide.pdf
70-219 testking mcse study guide Case studies w2k.designing.active.directory.edition 1.1.pdf
70-220 - Sybex - Windows 2000 Network Security Design.pdf
70-228 Mspress - Mcdba Exam 70-228 Sql Server 2K System Administration 2 Ed Dec.pdf
70-229 Designing Databases SQL 2000 TestKing.pdf
(70-229) Mcad Mcsd Mcse - Designing And Implementing Sql 2000 Server - Testking v1-1.pdf
70-270 - McGraw-Hill - MCSE - Windows XP Professional Study Guide.pdf
70-270 Mcse - Testking - Xp Pro 7.0.pdf
70-270 Question Correct Exams MCSE Exam Q&A v6.0.pdf
70-270 - Test King - MCSE 2003 - Study Guide, Installing, COnfiguring, and Administering Windows XP Pro.pdf
70-270 Testking Microsoft Exam Q And A v20.0.pdf
70-270 TestKing.Microsoft.Exam.Q.And.A.V21.0.doc
70-270 TestKing.Microsoft.Exam.Q.And.A.V21.0.pdf
70-270 TestKing - Microsoft Exam - Q And A - v26.0.pdf
70-270 Testking Windows XP Complete.pdf
70-284 TestKing - Microsoft Exam - Q And A - v28.0.pdf
70-290 actual Tests.pdf
70-290 - Mcse - 2003 - Addison Wesley - Inside Windows Server 2003.chm
70290Training.pdf
70-291 Mcsa-Mcse Self-Paced Training Kit Implementing, Managing And Maintaining A Microsoft Windows Server 2003 Network Infrastructure(1).pdf
70-291 - MCSE + MCSA - 2003 - O'Reilly - DNS on Windows Server 2003.chm
70-291 Testking.Microsoft.Exam.Q.And.A.v36.0.pdf
70-291 Windows Server 2003 Network Infrastructure, Implementation, Management & Maintenance - MCSE Study Guide - Sybex.pdf
70-292-Ebook Syngress - Mcsa Mcse Exam 70-292 - Managing And Maintaining w2003 For w2000 Mcsas.pdf
70-294 testking planning implementing and maintaining a microsoft windows server 2003 active directory infrastructure v15.1 144q.pdf
70-294 Testking v21.0.pdf
70-298 - MicroSoft - MCSE Self Paced Training Kit Designing Security For A MicroSoft Windows Server 2003 Network (Exam 70-298).pdf
70-298-MSPress-Designing Security for Windows Server 2003 Network (2004).pdf
70-298 TestKing.Microsoft.Exam.Q.And.A.V8.0.pdf
70-305 Mcad-Mcsd Net Developing And Implementing Web Applications With Visual Basic And Visual Studio Net (Exam 70-305) By Xabel.pdf
70-306 TestKing - Developing Windows Applications.pdf
720_User_Guide.pdf
731986-Hacker's Desk Reference.pdf
A Buffer Overflow Study - Attacks and Defenses (2002).pdf
A Byte of Python, v1.20 (for Python 2.x) (2005).pdf
A+ Certification for Dummies.pdf
Actualtest 642-501 v02.24.05.pdf
ActualTest 642-501 v03.20.04.pdf
Actualtest 642-501 v05.08.04.pdf
ActualTest 642-501 v07.25.05.pdf
Actualtest 642-501 v12.14.04.pdf
Addison.Wesley.Advanced.Linux.Networking.chm
Addison-Wesley Effective Java - Programming Language Guide.pdf
Addison Wesley - Hackers Delight 2002.pdf
Addison Wesley - Hack I.T. Security Through Penetration Test.chm
[Addison-Wesley] Latex Companion, 2nd Edition.pdf
Addison.Wesley.Moving.to.Ubuntu.Linux.Aug.2006.chm
Addison.Wesley.The.Java.Programming.Language.4th.Edition.Aug.2005.chm
Addison.Wesley.The.Ruby.Way.2nd.Edition.Oct.2006.chm
Administering Cisco Qos.pdf
Advanced Software Vulnerability Assessment.pdf
AFF - Advanced Forensic Format.pdf
AFF - A New Format for Storing Hard Drive Images.pdf
Ahmad-Reza_Sadeghi,_David_Naccache,_Pim_Tuyls-Towards_Hardware-Intrinsic_Security__Foundations_and_Practice_(Information_Security_and_Cryptography)(2010).pdf
AJAX In Action(2).pdf
Ajax Patterns and Best Practices - C. Gross - Apress - 2006.pdf
Analyse_forensique_d_un_systeme_Windows.pdf
Apress - Beginning JavaScript with DOM Scripting and Ajax - From Novice to Professional.pdf
Apress - Expert Spring Mvc And Web Flow - Feb 2006.pdf
Apress.Foundations.of.Ajax.Oct.2005.pdf
Apress.Hardening.Apache.eBook-LiB.chm
Apress - Pro Apache Ant - 2005.pdf
Apress.Pro.JSF.and.Ajax.Building.Rich.Internet.Components.Feb.2006.pdf
Apress.Sanghera.SCJP.2006.pdf
APress - The Definitive Guide to MySQL, 2nd Ed - 2004 - (By Laxxuss).chm
Artech House - Fundamentals of Network Security.pdf
ARTIFICAL IGNORANCE How To Implement Artifical Ignorance Log Analysis.pdf
Attacking the DNS Protocol.pdf
Auerbach.Practical.Hacking.Techniques.and.Countermeasures.Nov.2006.pdf
Auerbach.Pub.The.ABCs.of.LDAP.How.to.Install.Run.and.Administer.LDAP.Services.eBook-DDU.chm
Auerbach.Pub.The.Hackers.Handbook.The.Strategy.Behind.Breaking.into.and.Defending.Networks.Nov.20.pdf
Botnet Detection Countering the Largest Security Threat.pdf
Botnets - The killer web applications.pdf
Building_VPN_tunnels_using_IKE_between_NetScreen_and_Cisco_IOS.pdf
Build Your Own Security Lab A Field Guide for Network Testing.pdf
CCDA (Cisco Certified Design Associates) Study Guide.pdf
CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide 2nd Edition (2005) Cisco Press.chm
CCSP Self-Study CCSP CSI Exam Certification Guide 2nd Edition (2005) Cisco Press.chm
Certified Ethical Hacker (CEH) v3.0 Official Course.pdf
Charles.C.Thomas-Document.Security.Protecting.Physical.and.Electronic.Content.2007.RETAiL.EBook.pdf
Cisco - BGP4 - Case Studies.pdf
Cisco - CCNP Support Exam Guide (640-606).pdf
Cisco - Designing Network Security.pdf
Cisco IP Routing Fundamentals.pdf
Cisco Network Essentials.pdf
Cisco Press Ccie Security Exam Certification Guide Ccie Self Study 2Nd Edition May 2005 Ebook-Lib.chm
Cisco.Press.CCIE.Security.Exam.Certification.Guide.CCIE.Self.Study.2nd.Edition.May.2005.eBook-LiB.chm
Cisco Press, CCNP (Exam 642-811) BCMSN Exam Certification Guide.(2005),.3Ed.BBL.LotB.chm
[Cisco Press] CCSP IPS Exam Certification Guide (2005) - DDU.chm
Cisco.Press,.CCSP.SNRS.(Exam.642-502).Exam.Certification.Guide.(2005),.2Ed.BBL.LotB.chm
Cisco Router Handbook.pdf
Cleaning Windows XP For Dummies (2004).pdf
Comparing Web Frameworks; Struts, Spring MVC, WebWork, Tapestry & JSF.pdf
Computer and Network Forensics.pdf
Computer Forensics_ Investigating Networ - EC-Council.pdf
Computer - Hackers Secrets - e-book.pdf
Computer Vulnerability(March 9 2000).pdf
Cracking_Passwords_Guide.pdf
Crackproof Your Software(No Starch-2002).pdf
Credit Card Visa Hack(Cambridge Lab-2003).pdf
Credit.Card.Visa.Hack.Ucam.Cl.Tr.560.[223.kB_www.netz.ru].pdf
Cross Site Scripting Attacks Xss Exploits and Defense.pdf
Cyberdeterrence and Cyberwar.pdf
DangerousGoogle-SearchingForSecrets.pdf
Dhtml Utopia.pdf
Digital Forensics for Network, Internet, and Cloud Computing.pdf
Digital Forensics of the Digital Memory.pdf
Digital.Press.IPv6.Network.Programming.ISBN1555583180.pdf
Dummies - Hack How To Create Keygens (1).pdf
EBook - A+ Certification Guide.pdf
(e-Book) CCDA Exam Certification Guide, 2nd Ed. (640-861) - Cisco Press 2004.pdf
[eBook] - CCNA Exam 640-607 Certification Guide - Cisco Press 2002.pdf
(Ebook - Computer) Hacking The Windows Registry.pdf
(ebook) Hacking Manual HACKING INTO COMPUTER SYSTEMS.doc
(eBook) - ITU-T - H323-SIP.pdf
[eBook][Java]log4j The Complete Manual.pdf
eBook_Linux.Administration.Made.Easy.ShareReactor.pdf
[eBook] Manning - Java Swing 2nd Edition (2003).pdf
eBook.MS.Press.-.Microsoft.Encyclopedia.of.Security.ShareReactor.pdf
eBook_MySQL-PHP_Database_Applications.ShareReactor.pdf
eBook_Navy.Seal.Physical.Fitness.Guide.ShareReactor.pdf
(eBook) - Network Security Guide - NSA.pdf
(Ebook OCR) Leslie Lamport - Latex A document preparation system (1994 2nd).pdf
Ebook O'reilly High Performance Mysql.pdf
(ebook pdf) hacking into computer systems - a beginners guide.pdf
(ebook - pdf) how to crack cd protections.pdf
(eBook - PDF) Hugo Cornwall - The Hacker's Handbook .pdf
(ebook-pdf) - Programming - Website Database Basics With PHP and MySQL.PDF
(Ebook) Php 5 For Dummies (2004).pdf
eBook_Protected_Internet_Intranet_&_Virtual_Private_Networks.NoFearLevenT.ShareReactor.pdf
(ebook) ted the tool - mit guide to lock picking.pdf
eBook_Web_Application_Development_With_PHP_4.0_ShareReactor.pdf
eBook.Windows_2000_Active_Directory_Survival_Guide.ShareReactor.pdf
(eTrain) MS Press - MCAD.MCSD.Self.Paced.Training.Kit.Developing.XML.Web.Services.And.Server.Components.With.MS.Visual.Basic.Dot.NET.And.MS.CSharp.chm
Excel Advanced Report Development (2005).pdf
EXE File Format.pdf
Exploring Macromedia Studio 8 (2005).pdf
For Dummies Firewalls for Dummies.pdf
For.Dummies.Hacking.Wireless.Networks.For.Dummies.Sep.2005.eBook-DDU.pdf
For.Dummies.Wireless.Network.Hacks.and.Mods.For.Dummies.Sep.2005.eBook-DDU.pdf
For.Dummies.Visual.Basic.2005.Express.Edition.For.Dummies.Dec.2005.pdf
For.Dummies.XML.For.Dummies.The.Fourth.Edition.May.2005.eBook-DDU.pdf
Forensic Analysis of Microsoft Internet Explorer Cookie Files.pdf
Forensic Computer Crime Investigation.pdf
Forensic Disk Imaging Step-by-Step.pdf
Friendsofed Css Mastery Advanced Web Standards Solutions Feb 2006.pdf
FTP-HTTP-ERROR-Codes.pdf
Google Hacking for Penetration Tester (Syngress-2005).pdf
Gray Hat Hacking~The Ethical Hacker's Handbook, 3e [2011].pdf
Gray Hat Python.pdf
Hack Attacks Revealed- A Complete Reference with Custom Security Hacking Toolkit (Wiley-2001).pdf
Hacker Crackdown, The.pdf
Hackers Beware (NewRiders -2002).pdf
Hacking Exposed. Malware and Rootkits (McGraw-Hill, 2010).pdf
Hacking Exposed Malware AND Rootkits - McGrawHill - 2010.pdf
Hack IT Security Through Penetration Testing.pdf
Hack Proofing Linux A Guide to Open Source Security - Stangler, Lane - Syngress -  ISBN 1-928994-34-2.pdf
Hack Proofing Sun Solaris 8.pdf
Hack Proofing Your E-Commerce Site.pdf
Hack Proofing Your Identity in the Information Age (Syngress-2002).pdf
Hack Proofing Your Network - Internet Tradecraft (Syngress-2000).pdf
Hack Proofing Your Network Second Edition.pdf
How to Crack CD Protections.pdf
How.To.Install.Microsoft.Exchange.2000.on.Windows.Server.2003.-.LinkoManija.net.pdf
How to Make a Forensic Copy Through the Network.pdf
Html Utopia - Designing Without Tables Using Css.pdf
Interconeccion de Dispositivos de Red Cisco (eBook spanish espaDol).pdf
Java 2004- Manning- Tapestry In Action- the definitive guide to web application development with Tapestry.pdf
Java 2 Network Security.pdf
Java Programming Language Handbook 1.pdf
JavaServer.Faces.JSF.in.Action_Manning.pdf
Jess_Garcia-Web_Forensics.pdf
John Wiley And Sons - Data Mining-Concepts Models Methods And Algorithms Ebook-Fos.chm
Kennedy D., O'Gorman J., Kearns D., Aharoni M. - Metasploit. The Penetration Tester's Guide -.pdf
Learn Windows PowerShell In A Month Of Lunches.pdf
LPI Linux Certification.doc
Managing Cisco Network Security Second Edition.pdf
[Manning - 2004] Tapestry In Action.pdf
Manning.Ajax.in.Action.Oct.2005.pdf
Manning Art Of Java Web Development - Struts, Tapestry, Commons, Velocity, Junit, Axis, Cocoon, Internetbeans, Webwork (2007).pdf
Manning,.IntelliJ.IDEA.in.Action.(2006).BBL.pdf
Manning - JSTL in Action - 2003.pdf
Manning - Struts In Action - Building web applications with the leading Java framework.pdf
Mathematics For Game Developers (2004).pdf
[MCAD-MCSD 70-300] Analyzing Requirements and Defining .NET Solution Architectures [MS Press, 2003, 0-7356-1894-1].chm
MCAD MCSD Visual Basic .NET Windows and Web Applications Study Guide.chm
mcgraw hill cisco security architectures [found via www.filedonkey.com].pdf
McGraw Hill - Cisco TCP-IP Routing Professional Reference.pdf
McGraw.Hill.-.Oracle.Database.10g..High.Availablity.with.RAC.Flashback.&.Data.Guard.chm
McGrawHill-Oracle_Database_10g_New_Features.chm
MCSE - Deploying Virtual Private Networks with Microsoft Windows Server 2003 [MS Press 2004].chm
MCSE Microsoft Training Kit - 70-216 - Windows 2000 Network Infrastructure Administration.CHM
Mcse - Microsoft Windows Xp Professional Training Kit (Exam 70-270).chm
MCSE.Training.Kit.Microsoft.SQL.Server.2000.Database.Desing.and.Implementation.Exam.70-229.eBook.eng.chm
MCSE Training Kit - M$ Win2000 Server 70-215 (CHM-11,302,984).pdf
Microsoft Office Access 2003 Step By Step (2004).pdf
Microsoft Office Excel 2003 Bible (2003).pdf
Microsoft Office Excel 2003 Programming Inside Out (2004).pdf
Microsoft.Press.MCSE.Self.Paced.Training.Kit.Exam.70.293.Planning.and.Maintaining.a.Microsoft.Windows.Server.2003.Network.Infrastructure.eBook-LiB.chm
Microsoft.Press.MCSE.Self.Paced.Training.Kit.Exam.70-294.Planning.Implementing.and.Maintaining.a.Microsoft.Windows.Server.2003.Active.Directory.Infras.chm
Microsoft Press Mcse Self Paced Training Kit Exam 70-298 Designing Security For A Microsoft Windows Server 2003 Network Ebook-Lib.chm
Microsoft.Press.MCSE.Self.Paced.Training.Kit.Exam.70-298.Designing.Security.for.a.Microsoft.Windows.Server.2003.Network.eBook-LiB.chm
Microsoft.Press.Microsoft.ASP.Dot.NET.Coding.Strategies.with.the.Microsoft.ASP.Dot.NET.Team.eBook-LiB.chm
MS Press - MCAD MCSD 70-306 70-316 - Developing .NET (2002).chm
MS Press - MCAD.MCSE.MCDBA.Self-Paced.Training.Kit-Microsoft.SQL.Server.2000.Database.Design.and.Implementation.Second.Edition.Exam.70-229.chm
MS Press - MCDBA Training Kit - SQL 7.0 Database Implementation.chm
MS Press - MCDBA Training Kit - SQL 7.0 Data Warehousing.chm
MS Press - MCDBA Training Kit - SQL 7.0 System Administration.chm
MS Press - MCSD Training Kit - Desktop Applications with MS Visual C++ 6.0.CHM
nessus_4.2_user_guideplus.pdf
Nessus Network Auditing 2ed [AAVV] Syngress.pdf
[Network] Cisco Seminar - Securing 802.11 Wireless Networks.pdf
New Riders - Web Application Development With PHP4.chm
Nmap network security scanner man page.doc
(Nokia) Getting Started with Python.pdf
(Nokia) Programming with Python.pdf
No.Starch.Press.Wicked.Cool.Shell.Scripts-101.Scripts.for.Linux.Mac.OS.X.and.Unix.Systems.eBook-LiB.chm
Novell.Press.Linux.Firewalls.3rd.Edition.Sep.2005.chm
O'Reilly - Apache Cookbook - 2003 ! - (By Laxxuss).chm
OReilly.Essential.PHP.Security.Oct.2005.chm
OReilly.Fedora.Linux.Oct.2006.chm
OReilly.Java.Cookbook.2nd.Edition.Jun.30.2004.eBook-DDU.chm
OReilly_ Java Programming On Linux.pdf
O'Reilly - JavaServer Pages, 3rd Edition.pdf
O'Reilly,.Learning.Red.Hat.Enterprise.Linux.and.Fedora.(2004).4Ed.DDU.ShareConnector.chm
Oreilly.linux.device.drivers.3rd.edition.feb.2005.ebook-ddu.chm
OReilly _LPI-Linux Certification in a nutshell.pdf
OReilly.Mac.OS.X.Tiger.for.Unix.Geeks.Jun.2005.eBook-DDU.chm
OReilly,.Managing.Projects.with.GNU.make.(2004),.3Ed.DDU.chm
OReilly.Oracle.PL.SQL.for.DBAs.Oct.2005.chm
OReilly.PHP.Cookbook.2nd.Edition.Aug.2006.chm
OReilly.Producing.Open.Source.Software.Oct.2005.eBook-DDU.chm
OReilly - Python Pocket Reference, 2nd Ed 2001.chm
OReilly - Sed & Awk 2nd Edition.pdf
OReilly.SELinux.NSAs.Open.Source.Security.Enhanced.Linux.Oct.2004.eBook-DDU.chm
OReilly.SSH.The.Secure.Shell.The.Definitive.Guide.2nd.Edition.May.2005.eBook-DDU.chm
OReilly.-.Unix.Backup.and.Recovery.pdf
OReilly.Unix.in.a.Nutshell.4th.Edition.Oct.2005.eBook-DDU.chm
O'Reilly, Version Control with Subversion (2004) DDU.chm
O'Reilly - Windows XP Annoyances.chm
Password_Policy.pdf
Peachpit.Press.JavaScript.and.Ajax.for.the.Web.6th.Edition.Aug.2006.chm
Penetration_Tester__s_Open_Source_Toolkitplus.pdf
Practical-Reverse-Engineering-x86-x64-ARM-Windows-Kernel-Reversing-Tools-and-Obfuscation.epub
Premier - PHP Fast And Easy Web Development 2nd Edition.chm
Premier.Press.Game.Programming.with.Python.Lua.and.Ruby.ebook-LiB.chm
Prentice.Hall.Java.How.to.Program.6th.Edition.Aug.2004.INTERNAL.chm
Prentice.Hall.Network.Forensics.Jun.2012.pdf
Prentice.Hall.PTR.Embedded.Linux.Primer.A.Practical.Real.World.Approach.Sep.2006.chm
Prentice.Hall.PTR.Linux.Quick.Fix.Notebook.Mar.2005.chm
Prentice.Hall.PTR.PHP.5.Power.Programming.Oct.2004.eBook-LiB.chm
Prentice.Hall.PTR.Samba.3.by.Example.Practical.Exercises.to.Successful.Deployment.2nd.Edition.Aug.2005.chm
Prentice.Hall.PTR.SELinux.by.Example.Using.Security.Enhanced.Linux.Jul.2006.chm
Prentice.Hall.PTR.Solaris.Performance.and.Tools.Jul.2006.chm
Prentice.Hall.PTR.The.Official.Samba.3.HOWTO.and.Reference.Guide.2nd.Edition.Aug.2005.chm
Prentice.Hall.PTR.Understanding.AJAX.Using.JavaScript.to.Create.Rich.Internet.Applications.Aug.2006.chm
Prentice.Oracle.DBA.Guide.To.Data.Warehousing.And.Star.Schemas.eBook-LiB.chm
Prentice.Oracle.PL.SQL.By.Example.3rd.Edition-LiB.chm
Prentice.Programming.Oracle.Triggers.And.Stored.Procedures.3rd.Edition.eBook-LiB.chm
Prentice.Technical.Java.Developing.Scientific.And.Engineering.Applications.eBook-LiB.chm
Princess_Activity_Kit.pdf
Programming Spiders, Bots, and Aggregators in Java [Sybex, 2.pdf
Pro Jakarta Velocity.pdf
Que.CCNA.Practice.Questions.Exam.Cram.2.2nd.Edition.Dec.2005.eBook-DDU.chm
Que MCAD MCSD Developing XML Web.Services And Server Components With Visual C Sharp .NET And the .NET Framework Exam Cram 2 Kalani (Exam 70-320)(2003).chm
Que,.MCAD.MCSE.MCDBA.(Exam.70-229).Designing.and.Implementing.Databases.with.SQL.Server.2000.(2005).BBL.LotB.chm
Que.MCSA.MCSE.Implementing.and.Managing.Exchange.Server.2003.Exam.Cram.2.Exam.Cram.70-284.chm
Que.MCSA.MCSE.Managing.And.Maintaining.A.Microsoft.Windows.Server.2003.Environment.Exam.Cram.2.Exam.70-290.eBook-LiB.chm
Que - MCSE 070-294 Win Server 2003 Active Directory Infrastructure Exam Cram 2.chm
Red Hat Linux Bible - Fedora and Enterprise Edition.chm
Risk Analysis and Security Countermeasure selection.pdf
rootkit- Rootkits.for.Dummies 2007.pdf
Sams.Advanced.PHP.Programming.Feb.2004.INTERNAL.chm
Sams - C++ Primer Plus, Fourth Edition.chm
Sams.FreeBSD.6.Unleashed.Jun.2006.chm
Sams - MySQL and JSP Web Applications Data Driven Programming Using Tomcat And MySQL.chm
Sams.MySQL.Phrasebook.Essential.Code.and.Commands.Mar.2006.chm
Sams, Mysql Tutorial (2004).chm
Sams.PHP.5.Unleashed.Dec.2004.eBook-LiB.chm
Sams.PostgreSQL.2nd.Edition.Jul.2005.chm
Sams - PostgreSQL Developers Handbook.chm
Sams.SUSE.Linux.10.Unleashed.Nov.2005.eBook-DDU.chm
Sams - Teach Yourself BEA WebLogic Server 7.0 in 21 Days - 2002 - (By Laxxuss).chm
SANS Incident Handling Step by step.pdf
SANS Intrusion Dectection.pdf
Scambray - Hacking Exposed - Windows 3E (Mcgraw, 2008)plus-.pdf
Scene of the Cybercrime - Computer Forensics Handbook (Syngress).pdf
S C Enterprise Hackers Secrets Revealed.pdf
S C Enterprises Hacking Secrets Revealed Information and.pdf
SCJP Exam - 310-055.Exam.Q.and.A.12.06.05-BBL.pdf
SCJP Sun Certified Programmer for Java 5 Study Guide (Exam 310-055).pdf
SitePoint.The.CSS.Anthology.101.Essential.Tips.Tricks.and.Hacks.pdf
SkillSoft.Press.Migrating.from.Exchange.Server.to.qmail.eBook-LiB.chm
Stealing the Network - How to Own an Identity.pdf
stealing-the-network-how-to-own-a-shadow.pdf
Stealing the Network How to Own the Box.pdf
Steven Levy - Hackers Heroes of the Computer Revolution - 2010.pdf
Steve'S Rhce Study Guide.doc
Struts Recipes Chp2.pdf
Stylin' with CSS - A Designer's Guide.pdf
Sun - Core JSTL Mastering the JSP Standard Tag Library.pdf
Sybex.Effective.Software.Test.Automation.Developing.an.Automated.Software.Testing.Tool.eBook-LiB.chm
Sybex.EnCase.Computer.Forensics.Study.Guide.2nd.Edition.Dec.2007.pdf
Sybex.Linux.Network.Servers.eBook-EEn.pdf
Sybex.Mastering.Active.Directory.for.Windows.Server.2003.eBook-KB.pdf
Sybex - Mcad Mcsd Visual Basic Net Xml Web Services And Server Components Study Guide(2003).chm
-Sybex, MCSA MCSE (Exam 70-270) Windows XP Professional Study Guide (2005), 3Ed DDU OCR 7.0-2.6 LotB.pdf
Sybex - MCSE Training Guide - Exam 70-220_web.pdf
Sybex - MCSE.Windows.Server.2003.Network.Security.Design.Study.Guide.70.298.May.2004.chm
Sybex.MCSE.Windows.Server.2003.Network.Security.Design.Study.Guide.70.298.May.2004.eBook-DDU(1).chm
Sybex.MCSE.Windows.Server.2003.Network.Security.Design.Study.Guide.70.298.May.2004.eBook-DDU.chm
Sybex - .NET Development Security Solutions.chm
Sybex - Pc.Disaster.And.Recovery.Ebook.chm
Sybex.TCP.IP.Foundations.Aug.2004.eBook-DDU.pdf
Syngress - Exam 70-297 MCSE Designing a Windows Server 2003 Active Directory and Network Infrastructure.chm
Syngress.Force.Emerging.Threat.Analysis.From.Mischief.to.Malicious.Oct.2006.pdf
Syngress.Hacking.a.Terror.Network.Nov.2004.ISBN1928994989.pdf
Syngress-Hack Proofing Linux (2001).pdf
Syngress.InfoSecurity.2008.Threat.Analysis.Nov.2007plus.pdf
Syngress - Mcse Designing Security For A Windows Server 2003 Network Exam 70-298 Study Guide - 2004 - (By Laxxuss).chm
Syngress.Nessus.Network.Auditing.Second.Edition.May.2008.eBook-DDU.pdf
Syngress,.Nessus.Snort.and.Ethereal.Power.Tools.Customizing.Open.Source.Security.Applications.(2005).DDU.pdf
Syngress.Nmap.in.the.Enterprise.Your.Guide.to.Network.Scanning.Jan.2008plus.pdf
Syngress - Secure Your Network for Free Using NMAP, WIRESHARK, SNORT, NESSUS, and MRTG - 2007.pdf
Syngress,.Writing.Security.Tools.and.Exploits.(2006).DDU.pdf
Syslog Notes.pdf
Teach Yourself Visual C++ 6 in 21 days.pdf
The_Art_of_Deception.pdf
The-Art-of-Exploitation_2nd-Ed.pdf
The Dark Visitor - The Dark Visitor- Inside the World of Chinese Hackers.zip
The Internet and Crime.pdf
The Javascript Anthology 101 Essential Tips, Tricks & Hacks-Sample (2006 - Sitepoint).pdf
The Little Black  Book of Computer Virus.pdf
the.pragmatic.programmers_pragmatic.ajax.pdf
The.Shellcoder_s.Handbook.Discovering.and.Exploiting.Security.Holes.2nd.Edition 2007plus.pdf
Tutorial For Building j2Ee Applications Using Jboss And Eclipse.chm
UNIX and Linux Forensic Analysis DVD Toolkit.2008.pdf
Value-Range Analysis of C Programs.pdf
WebWork In Action.pdf
[Wiley] Cryptography for Dummies.pdf
Wiley - Java Open Source Programming With Xdoclet, Junit, Webwork, Hibernate.pdf
Wiley Publishing, Inc - Hacking Video Game Consoles. Turn Your Old Video Game Systems into Awesom.pdf
Wiley Publishing, Inc - The CISSP Prep Guide. Gold Edition.pdf
Wiley Publishing, Inc - Wireless Network Hacks AND Mods for Dummies.pdf
Windows 2000 - TCPIP Implementation.doc
Windows Forensic Analysis.pdf
Visual Basic C++ 6.doc
VoIP.Cisco.Introduction to IP Telephony.pdf
VoIP.Syngress.Cisco AVVID and IP Telephony Design And Implementation.pdf
VoIP.Syngress.Configuring Cisco Voice Over IP Second Edition.pdf
Wordware Publishing - DirectX9 Audio Exposed Interactive Audio Development.chm
Wrox Press - Professional Apache Tomcat 5.pdf
Wrox - Professional Javascript For Web Developers - 2005 - (By Laxxuss).pdf
WVS Manual.pdf
WVS Mmanual+.pdf


Tor: http://ytxmrc3pcbv5464e.onion/files/Info..._Ebooks.7z

Hacking/Malware by Voided[Fifth release]
Code [No Highlight]:

applied_cryptography_protocols_algorithms_and_source_code_in_c.pdf
art_of_deception_controlling_the_human_element_of_security.pdf
art_of_memory_forensics_detecting_malware_and_threats_in_windows_linux_and_mac_memory.pdf
cryptography_engineering_design_principles_and_practical_applications.pdf
malwareanalyst_dvd.zip
malware_analysts_cookbook_and_dvd_tools_and_techniques_for_fighting_malicious_code.pdf
practical_reverse_engineering_x86_x64_arm_windows_kernel_reversing_tools_and_obfuscation.pdf
security_engineering_a_guide_to_building_dependable_distributed_systems.pdf
shellcoders_handbook_discovering_and_exploiting_security_holes.pdf
social_engineering_the_art_of_human_hacking.pdf
threat_modeling_designing_for_security.pdf
unauthorised_access_physical_penetration_testing_for_it_security_teams.pdf
web_application_hackers_handbook_finding_and_exploiting_security_flaws.pdf

Download link: https://www_ytxmrc3pcbv5464e.onion.link/...by-voided/


4chan/g/ Cybersecurity Books part 1 (Password: ABD52oM8T1fghmY0)

[Image: SrGy8Zd.png]
Link: https://mega.nz/folder/iZk2WCwQ#3Q9wLIqUm0Vnlr8hvx91Mg


4chan/g/ Cybersecurity Books part 2:

(And more. 3000+ files.)
[Image: DSk8qF3.png]
Link: https://mega.nz/folder/eEkwUIbC#QJuN18nDA2sp-OOYYE6cZw

Will be added to hidden service soon.
Reply
#2
This is an excellent couple of repositories worth of knowledge! Thanks Insider :-)
Reply
#3
(05-26-2016, 11:26 AM)hworth Wrote: This is an excellent couple of repositories worth of knowledge! Thanks Insider :-)

No problem, always happy to help out!
Reply
#4
Please reupload these too brother .

F**king Mega drops ICMP's and they don't know it yet that they can get exploited by it.
Reply
#5
(11-02-2016, 05:13 PM)SciencePower Wrote: Please reupload these too brother .

F**king Mega drops ICMP's and they don't know it yet that they can get exploited by it.

Haha no problem, I'll reupload these later tonight.
Reply
#6
Seems these are all down still, could you possibly reupload, they look very good. Thanks Smile
Reply
#7
Insider, I can put them up on my server if you want. I can set up a range of very professional domain names such as insider.rapes.men, i.roofie-people.online, i.smokecrack.online and soon insider.roofies.men.
Reply
#8
(11-08-2016, 03:58 PM)Cuck Wrote: Insider, I can put them up on my server if you want. I can set up a range of very professional domain names such as insider.rapes.men, i.roofie-people.online, i.smokecrack.online and soon insider.roofies.men.

Haha lol, I was going to put them on yandex later this week. But sure, right now I'm a bit busy. But I might take you up on that later this week.
Reply
#9
All files have been reuploaded and new links updated Smile Hopefully this will last longer than the automatic file deleter, mega.nz.
Reply
#10
(11-11-2016, 11:16 AM)Insider Wrote: All files have been reuploaded and new links updated Smile Hopefully this will last longer than the automatic file deleter, mega.nz.

Much appreciated! Thanks a lot. Smile
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  eLearnsecurity, offensive security and SANS dangcracker 11 9,451 10-22-2020, 06:16 AM
Last Post: R00t3r
  SANS & Offensive-Security BASELINE Torrent++ LFNTHNTR 73 190,284 10-18-2020, 07:26 AM
Last Post: EzioDante
  Offensive Security PWK 2020 v2 Torrent ravasquez 5 4,422 09-22-2020, 12:09 AM
Last Post: tiffani70
  Is releasing hacking tools a bad idea? DeepLogic 2 2,572 07-16-2020, 09:16 PM
Last Post: Vector