Security/Hacking Ebook Collection
#31
(01-10-2018, 09:05 PM)badprogramme Wrote: Hey if it's not too much trouble could you please suggest what books I should start with? I took a CS course my freshman year (last year) and we learned python but I don't really know where to start when it comes to preparing for a career in penetration testing.

Quote:Everyone wants to run without first learning how to crawl. You'll never get anywhere like that. I have no idea why I'm taking my time to help you, but I am so listen up. Penetration testing isn't simply a matter of being familiar or even fluent with the endless sleuth of automated or semi automated 'hacker' tools which have flooded the markets in recent years. Penetration testing is not an entry level role by any means what so ever. No one simply starts out pen testing without first have accomplished many prerequisites. In the real world, pen testing is a role that comes only after several years of experience in other roles such as system administration, incident response, network security, etc. The very first thing you need to do is ignore all the people telling you to jump right into playing with various tools that come pre-installed with Backtrack, but rather focus on the basics. First thing's first!

The first real prerequisite to any IT security role is a comprehensive understanding on network principles; namely TCP/IP aka the Internet protocol suite. Grab some books on TCP/IP and get to reading. You should throughly understand and familiarize yourself not only with the technical, engineering specifications, but also the actual vendor specific implementations of said specifications. Listing off the 7 OSI layers or telling me what layer traffic is generated when you do x or x r that x operating systems uses x default for TTL,etc doesn't mean anything. You actually need full master of the complete set of protocols that make up the suite and familiarity with the actual vendor implementations. This is the real key! Without networking then the realm of security in general is largely irreverent! You need to understand operating systems; namely, Unix and Windows. Although OS attacks are continually in decline (while application based attacks are more common) you still need to understand the systems themselves. This is why sysadmin experience is so useful.

Once you really start to understand how these systems work then you can work into non-essential applications built on those systems like browsers. One thing that pentesters love to do in the field if they can is gaining access (once they've foot-printed, scanned, enumerated, etc) specifically though security software like AV. There is no better feeling in the world than pwning someone via the very software they use to secure themselves. Programming skills aren't really required per say in the field, though they can be certainly be helpful in situations like examining source for bugs or exploit development, etc. But that stuff is a long ways away for someone just wanting to get started. What is important is programming skills in the sense of scripting languages like bash, perl or python. Again, another obvious benefit of sysadmin experience.

Once you get to this point, where you comfortable enough with networking, operating systems and scripting- sysadmin stuff in general, then you should then and only then move on to playing with tools everyone is so eager to get their hands on. In order to get actual hands on, practical experience in some of the offensive tactics involved in pen testing you need to do so with great caution because you could seriously get yourself into a lot of trouble. I would suggest looking for a local hacker space you could get involved with. There you find group CTF exercises and isolated simulation environments that are safe to experiment on. If you can't find a hacker space then there are many books on the topic of setting up your own practice environments.. just like you will find at CTF tournaments and IT security training courses and bootcamps. If you have the money, then seeking out professional instruction is a major plus and advantage. Even when you think you know a lot about something, you will surprised how much you learn. Plus, you will get the chance to meet other like minded individuals and of course prepare yourself for professional certification.
Source: https://www.reddit.com/r/hacking/comment...entesting/

Summary if lazy to read: learn about how everything works first, then get into hacking things.
My recommendation is to check out those type of books firsts, there are some good books mentioned in this specific thread, but the knowledge can be obtained elsewhere.

If you can afford it, my recommendation would be to get into college. I know there are a lot of self-taught people in this field, but having a degree is a valuable thing to have and also will help you with your path.

If you are curious and you are into videos there are many hacking conferences which might interest you. Check out this website with a lot of them: 
https://infocon.hackingand.coffee
Many of these videos can be found on YouTube. I watch a lot of YouTube so if you want I can tell you a lot of HQ channels to watch too.

And also check this mindnode map, really awesome for learning literally EVERYTHING.
https://my.mindnode.com/KdeMPbxs8KPixsa5...5,-647.4,0

Good luck and never stop learning!  Tongue
Reply
#32
(01-10-2018, 10:08 PM)enmafia2 Wrote:
(01-10-2018, 09:05 PM)badprogramme Wrote: Hey if it's not too much trouble could you please suggest what books I should start with? I took a CS course my freshman year (last year) and we learned python but I don't really know where to start when it comes to preparing for a career in penetration testing.

Quote:Everyone wants to run without first learning how to crawl. You'll never get anywhere like that. I have no idea why I'm taking my time to help you, but I am so listen up. Penetration testing isn't simply a matter of being familiar or even fluent with the endless sleuth of automated or semi automated 'hacker' tools which have flooded the markets in recent years. Penetration testing is not an entry level role by any means what so ever. No one simply starts out pen testing without first have accomplished many prerequisites. In the real world, pen testing is a role that comes only after several years of experience in other roles such as system administration, incident response, network security, etc. The very first thing you need to do is ignore all the people telling you to jump right into playing with various tools that come pre-installed with Backtrack, but rather focus on the basics. First thing's first!

The first real prerequisite to any IT security role is a comprehensive understanding on network principles; namely TCP/IP aka the Internet protocol suite. Grab some books on TCP/IP and get to reading. You should throughly understand and familiarize yourself not only with the technical, engineering specifications, but also the actual vendor specific implementations of said specifications. Listing off the 7 OSI layers or telling me what layer traffic is generated when you do x or x r that x operating systems uses x default for TTL,etc doesn't mean anything. You actually need full master of the complete set of protocols that make up the suite and familiarity with the actual vendor implementations. This is the real key! Without networking then the realm of security in general is largely irreverent! You need to understand operating systems; namely, Unix and Windows. Although OS attacks are continually in decline (while application based attacks are more common) you still need to understand the systems themselves. This is why sysadmin experience is so useful.

Once you really start to understand how these systems work then you can work into non-essential applications built on those systems like browsers. One thing that pentesters love to do in the field if they can is gaining access (once they've foot-printed, scanned, enumerated, etc) specifically though security software like AV. There is no better feeling in the world than pwning someone via the very software they use to secure themselves. Programming skills aren't really required per say in the field, though they can be certainly be helpful in situations like examining source for bugs or exploit development, etc. But that stuff is a long ways away for someone just wanting to get started. What is important is programming skills in the sense of scripting languages like bash, perl or python. Again, another obvious benefit of sysadmin experience.

Once you get to this point, where you comfortable enough with networking, operating systems and scripting- sysadmin stuff in general, then you should then and only then move on to playing with tools everyone is so eager to get their hands on. In order to get actual hands on, practical experience in some of the offensive tactics involved in pen testing you need to do so with great caution because you could seriously get yourself into a lot of trouble. I would suggest looking for a local hacker space you could get involved with. There you find group CTF exercises and isolated simulation environments that are safe to experiment on. If you can't find a hacker space then there are many books on the topic of setting up your own practice environments.. just like you will find at CTF tournaments and IT security training courses and bootcamps. If you have the money, then seeking out professional instruction is a major plus and advantage. Even when you think you know a lot about something, you will surprised how much you learn. Plus, you will get the chance to meet other like minded individuals and of course prepare yourself for professional certification.
Source: https://www.reddit.com/r/hacking/comment...entesting/

Summary if lazy to read: learn about how everything works first, then get into hacking things.
My recommendation is to check out those type of books firsts, there are some good books mentioned in this specific thread, but the knowledge can be obtained elsewhere.

If you can afford it, my recommendation would be to get into college. I know there are a lot of self-taught people in this field, but having a degree is a valuable thing to have and also will help you with your path.

If you are curious and you are into videos there are many hacking conferences which might interest you. Check out this website with a lot of them: 
https://infocon.hackingand.coffee
Many of these videos can be found on YouTube. I watch a lot of YouTube so if you want I can tell you a lot of HQ channels to watch too.

And also check this mindnode map, really awesome for learning literally EVERYTHING.
https://my.mindnode.com/KdeMPbxs8KPixsa5...5,-647.4,0

Good luck and never stop learning!  Tongue

Thanks! I always enjoy a long read. Yesterday I went on a downloading spree on pdf drive with nostarchpress books so I do have the book on TCP/IP. I'll start reading that today along with the linux basics one! Thank you for taking the time to reply. Have a good week.
Reply
#33
(01-10-2018, 09:05 PM)badprogramme Wrote: Hey if it's not too much trouble could you please suggest what books I should start with? I took a CS course my freshman year (last year) and we learned python but I don't really know where to start when it comes to preparing for a career in penetration testing.

If you're versatile with Python, I would recommend the following books: (Topic: Applied Security with python, See below).
  • Violent Python
  • Gray Hat Python
  • Black Hat Python

Edit: Not sure these books are in the thread. But I'll find them and upload them :p

For web application hacking:
  • Web Application Hackers Handbook

For social engineering:
  • The art of Human Hacking

For Malware Analysis/Development and/or Reverse engineering: This thread could be helpful - https://greysec.net/showthread.php?tid=2451 Also RE section :p https://greysec.net/forumdisplay.php?fid=13

Also for a good introduction and proof of concept of many web vulnerabilities, see NO-OPs Guide to General Hacking: https://greysec.net/showthread.php?tid=178

Also this might also be of help: https://greysec.net/showthread.php?tid=1563 (See the "Don't know where to start?" Section).

What kind of Computer science course did you take? If you want to expand your knowledge in that area I would recommend topics such as:
* Data Structures & Algorithm
* Boolean Algebra - Digital Logic - Logic Gates
* To expand knowledge of hardware: http://nand2tetris.org/
More: https://teachyourselfcs.com/

Btw to learn more SQL: I recommend Codecademy.



Haha alright, done with this resource pile. I was just going to recommend some books but I got other stuff on my mind. Well you got our whole forum to your disposal Smile I'm sure you'll figure it out.

For any specific questions, feel free to hit me up. I may be of help, I may not. Who knows.
Reply
#34
(01-10-2018, 11:55 PM)Insider Wrote:
(01-10-2018, 09:05 PM)badprogramme Wrote: Hey if it's not too much trouble could you please suggest what books I should start with? I took a CS course my freshman year (last year) and we learned python but I don't really know where to start when it comes to preparing for a career in penetration testing.

If you're versatile with Python, I would recommend the following books: (Topic: Applied Security with python, See below).
  • Violent Python
  • Gray Hat Python
  • Black Hat Python

Edit: Not sure these books are in the thread. But I'll find them and upload them :p

For web application hacking:
  • Web Application Hackers Handbook

For social engineering:
  • The art of Human Hacking

For Malware Analysis/Development and/or Reverse engineering: This thread could be helpful - https://greysec.net/showthread.php?tid=2451 Also RE section :p https://greysec.net/forumdisplay.php?fid=13

Also for a good introduction and proof of concept of many web vulnerabilities, see NO-OPs Guide to General Hacking: https://greysec.net/showthread.php?tid=178

Also this might also be of help: https://greysec.net/showthread.php?tid=1563 (See the "Don't know where to start?" Section).

What kind of Computer science course did you take? If you want to expand your knowledge in that area I would recommend topics such as:
* Data Structures & Algorithm
* Boolean Algebra - Digital Logic - Logic Gates
* To expand knowledge of hardware: http://nand2tetris.org/
More: https://teachyourselfcs.com/

Btw to learn more SQL: I recommend Codecademy.



Haha alright, done with this resource pile. I was just going to recommend some books but I got other stuff on my mind. Well you got our whole forum to your disposal Smile I'm sure you'll figure it out.

For any specific questions, feel free to hit me up. I may be of help, I may not. Who knows.

Thank you very much for the links! I just took a basic CS course. We learned the basics of python and then made simple games.
Reply
#35
I can't figure out how to PM you Insider so I'll just ask here. Are the overthewire labs still up? I tried sshing in but the password isn't working. I'm using bandit0 like the site says.

Edit: Oops I just had to hover my profile. Sorry.
Reply
#36
(01-12-2018, 11:26 PM)badprogramme Wrote: I can't figure out how to PM you Insider so I'll just ask here. Are the overthewire labs still up? I tried sshing in but the password isn't working. I'm using bandit0 like the site says.

Edit: Oops I just had to hover my profile. Sorry.

Are you using the correct port? 2220? Maybe you're right though, could be down. I'm not sure.

If you want to a offline Wargame (just download isos, vm containers, put in virtualbox) then check out Nebula: https://exploit-exercises.com/nebula/ No need to SSH anywhere. You can just set it up in virtualbox. Of course, being on local network I'm sure you can ssh into it from local network or machine though. But yeah, I recommend it, it's pretty cool :p

If you want some assistence for the beginning levels of Nebula, this thread could be a good reference: https://greysec.net/showthread.php?tid=1355


Edit: And yes. To PM. It's quite easy. See the postbit menu below this post? On the right side you see: Edit, Reply, Quote, Report.

See the left side for Email, PM, Find.

PM is the button you're looking for. It's the button with the paper plane as icon.
Also yeah, there's way more scenarios than just Nebula on exploit-exercises. Totally recommend those too when you're ready for it. https://exploit-exercises.com/

Edit 2: I think I know the reason why SSH is not working for you. See this announcement for more information: http://overthewire.org/help/sshinfra.html

Also you can always ask for support in the IRC I guess. http://overthewire.org/help/index.html
Reply
#37
(01-13-2018, 02:21 AM)Insider Wrote:
(01-12-2018, 11:26 PM)badprogramme Wrote: I can't figure out how to PM you Insider so I'll just ask here. Are the overthewire labs still up? I tried sshing in but the password isn't working. I'm using bandit0 like the site says.

Edit: Oops I just had to hover my profile. Sorry.

Are you using the correct port? 2220? Maybe you're right though, could be down. I'm not sure.

If you want to a offline Wargame (just download isos, vm containers, put in virtualbox) then check out Nebula: https://exploit-exercises.com/nebula/ No need to SSH anywhere. You can just set it up in virtualbox. Of course, being on local network I'm sure you can ssh into it from local network or machine though. But yeah, I recommend it, it's pretty cool :p

If you want some assistence for the beginning levels of Nebula, this thread could be a good reference: https://greysec.net/showthread.php?tid=1355


Edit: And yes. To PM. It's quite easy. See the postbit menu below this post? On the right side you see: Edit, Reply, Quote, Report.

See the left side for Email, PM, Find.

PM is the button you're looking for. It's the button with the paper plane as icon.
Also yeah, there's way more scenarios than just Nebula on exploit-exercises. Totally recommend those too when you're ready for it. https://exploit-exercises.com/

Edit 2: I think I know the reason why SSH is not working for you. See this announcement for more information: http://overthewire.org/help/sshinfra.html

Also you can always ask for support in the IRC I guess. http://overthewire.org/help/index.html

Thank you very much! Have a great evening sir or ma'am!
Reply
#38
(05-23-2016, 05:34 PM)Insider Wrote: Security/Hacking Ebook Collection
Sharing some of the ebooks I've collected over these years. Enjoy.

Individual files: http://ytxmrc3pcbv5464e.onion/files/Info...Files_Dir/

Offensive Security - Advanced Windows Exploitation (AWE) v 1.1
Code [No Highlight]:

AWE-1.pdf
AWE-2.pdf 
AWE-3.pdf 
AWE-4.pdf

Download Link: https://u.nya.is/rvygpg.7z
Backup Mirror: https://share.databases.today/Offensive-...on-v1.1.7z
Tor: http://ytxmrc3pcbv5464e.onion/files/Info...20v%201.1/

Security/Hacking Ebooks [Other]
Code [No Highlight]:

Advanced Penetration Testing for Highly-Secured Environments- The Ultimate Security Guide [eBook].pdf
An Introduction to the Analysis of Algorithms, 2nd Edition.pdf
Apress - Pro Bash Programming Scripting the GNULinux Shell (10-2009) (ATTiCA).pdf
Bash Guide for Beginners.pdf
Buffer Overflow Attacks - Detect, Exploit, Prevent (Syngress, 2005) BBS.pdf
CCENT-CCNA ICND1 640-822 Official Cert Guide, 3rd Edition.pdf
command-line.pdf
CompTIA Linux Plus Study Guide 2013 for Exams LX0-101 and LX0-102 2nd Ed.pdf
CompTIA_Security_SY0-301.pdf
Dos Attacked.pdf
Fadia, Ankit - Encryption Algorithms Explained.pdf
firewalls(2).doc
Fundamentals of Computer Programming with C#.pdf
Getting geographical Information using an IP Address (1).doc
GNU-Linux Command-Line Tools Summary Gareth Anderson.pdf
Hacking a Coke Machine.pdf
Hacking and Network Defense.pdf
Hacking Exposed Computer Forensics Secrets & Solutions.pdf
Hacking Exposed Wireless (ntwk security) 2nd ed - J. Cache, et al., (McGraw-Hill, 2010) BBS.pdf
Hacking for Dummies 2.pdf
Hacking.Into.Computer.Systems-A.Beginners.Guide---420ebooks.pdf
Hacking into Linux.doc
Hacking The Art Of Exploitation 2nd Edition V413HAV.pdf
Hacking The Linux.pdf
Hack The Net.pdf
Hardcore Windows XP - The Step by Step Guide To Ultimate Performance.pdf
hashcat_user_manual.pdf
How to Master Subnetting.pdf
HTTP_methods attacks.pdf
Inside Cyber Warfar by Jeffrey Carr.pdf
Introduction to Software Development.pdf
Kevin_Mitnick_-_Art_Of_Deception.pdf
Kevin Mitnick - The Art of Intrusion.pdf
Linux-101-Hacks.pdf
Linux Kernel Development, 3rd Edition.pdf
Linux Shell Scripting Cookbook, Second Edition [eBook].pdf
Machine Learning for hackers.pdf
Mastering Metasploit- RAW [eBook].pdf
Metasploit.pdf
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research.pdf
More Password Cracking Decrypted.doc
Nessus-Network-Auditing.pdf
Nmap 6 Network Exploration and Security Auditing Cookbook.pdf
Offensive Security - BackTrack to the Max Cracking the Perimeter V 1.0.pdf
Offensive.Security.WiFu.v2.0.pdf
Own-The-Box.pdf
Packt.Metasploit.Penetration.Testing.Cookbook.Jun.2012.RETAIL.eBook-ELOHiM.pdf
Programming in Objective-C, 6th Edition.pdf
RTFM - Red Team Field Manual v2.pdf
Scene of the Cybercrime - Computer Forensics Handbook.pdf
Sendmail and Beyond.doc
SET_User_Manual.pdf
SSH_Tectia.pdf
SSL Torn Apart.doc
SSL VPN - Understanding, evaluating and planning secure, web-based remote access [eBook].pdf
The Art of Readable Code.pdf
The Basics of Web Hacking.epub
The Linux Command Line by William Shotts.pdf
The Web Application Hackers Handbook.pdf
Transparent Proxies in Squid.doc
Truths!!!--What they Dont teach in Manuals!!!.pdf
User_Manual.pdf
we-are-anon.pdf
web_for_pentester.pdf
Windows Password Files Torn Apart.doc
Wireshark Network Analysis_ The Official Wireshark Certified Network Analyst Study Guide - Laura Chappell.pdf
WordPress.3.Ultimate.Security.pdf

Download Link: https://u.nya.is/ucpoew.7z
Backup Mirror: https://share.databases.today/Security-H...Ebooks1.7z
Tor: http://ytxmrc3pcbv5464e.onion/files/Info...Ebooks1.7z

Security/Hacking Ebooks [Third Batch]
Code [No Highlight]:

100-uC-OS-II-002.pdf
A Day in the Life of a Flux Reversal - Count Zero.pdf
advanced bash scripting guide.pdf
Algorithms Explained.doc
Ankit Fadia Hacking Guide.pdf
BackTrack 5 Cookbook.pdf
BackTrack 5 Wireless Penetration Testing Beginners Guide[NepsterJay].pdf
Bash Reference Manual by Chet Ramey and Brian Fox.pdf
Bluetooth Hacking.pdf
CCENT Cisco Certified Entry Networking Technician (2013).pdf
CCNA Wireless Study Guide_ IUWNE Exam 640-721 - Lammle, Todd.pdf
Certified Ethical Hacker Study Guide.pdf
CompTIA_Network_N10-005.pdf
CWTS_ Certified Wireless Technology Specialist Official Study Guide_ Exam PW0-070 - Robert J. Bartz.pdf
Data Mining and Machine Learning in Cybersecurity.pdf
debian-handbook.pdf
Firebug 1.5 Editing Debugging and Monitoring Web Pages [eBook].pdf
firewalls.doc
FTP Exploits By Ankit Fadia.pdf
Gathering Info on Remote Host.doc
Getting geographical Information using an IP Address.doc
GoogleHackingforPenetrationTesters.pdf
Hackers Delight - By Henry S. Warren,.pdf
Hackers Survival Guide.pdf
Hacking, 2nd Edition.pdf
Hacking - Dangerous Google - Searching For Secrets by Michał Piotrowski.pdf
Hacking Exposed 6 (ntwk security) - S. McClure, et. al., (McGraw-Hill, 2009) BBS.pdf
Hacking Exposed 7.epub
Hacking - Firewalls And Networks How To Hack Into Remote Com.pdf
Hacking---Firewalls-And-Networks-How-To-Hack-Into-Remote-Computers.pdf
hacking_gmail.pdf
Hacking Into Computer Systems - Beginners.pdf
Hacking Intranet Websites.pdf
Hacking the Human.pdf
Hacking Web Apps.pdf
Hacking with Kali - Broad, James, Bindner, Andrew.pdf
Hack Proofing Your Web Server.pdf
How to Crack CD Protections.pdf
How to Make Key Generators.pdf
How to Master CCNA v2.0.pdf
HTML-Guide.pdf
Identify Theft for Dummies - M. Arata (Wiley, 2010).pdf
Instant Wireshark Starter [eBook].pdf
Introduction to Linux; A Hands on Guide by Machtelt Garrels.pdf
Java Programming From Problem Analysis To Program Design 4th ed.pdf
Kali Linux Cookbook.pdf
learnd2.pdf
Learning Java, 4th Edition[A4].pdf
Learning PHP, MySQL & JavaScript, 4th Edition.pdf
linux_server_hacks.pdf
Linux System Programming.pdf
Linux Utilities Cookbook [eBook].pdf
Low Tech Hacking -Street Smarts for Security Professionals [NepsterJay].pdf
Mastering Microsoft Exchange Server 2013 - Elfassy, David.pdf
metasplitable2_sih60b.pdf
Metasploit Penetration Testing Cookbook, Second Edition [eBook].pdf
Microsoft Windows Xp - Command-Line Reference A-Z.pdf
Moore-Critical-Thinking-Intelligence-Analysis.pdf
Net+ 2009.pdf
netcat_power_tools.pdf
Ninja-Hacking.pdf
Nmap Network Scanning.pdf
Offensive Security - Penetration Testing with BackTrack (Lab Guide)v3.2.pdf
OpenVPN 2 Cookbook [eBook].pdf
OS_and_application_fingerprinting.pdf
PayPal Hacks.pdf
PracticalPacketAnalysis2e.pdf
Removing Banners from your site.doc
Scalix- Linux Administrator’s Guide.pdf
Secrets of Network Cartography A Comprehensive Guide to Nmap.pdf
Seven Deadliest Web Application Attacks.pdf
Simple Hacks - Addons, Macros And More.pdf
Syngress.Asterisk.Hacking.May.2007.pdf
TCP Wrappers Unwrapped.doc
The Basics of Web Hacking - Pauli, Josh.pdf
The Psychology of Interrogations and Confessions A Handbook - Gisli H. Gudjonsson.pdf
Tracing IP,DNS,WHOIS-nsLOOKUP.pdf
Understanding TCP_IP [eBook].pdf
Untold Windows Tips and Secrets.doc
Web Penetration Testing with Kali Linux.pdf
Wiley.Ubuntu.Linux.Toolbox.1000.plus.Commands.for.Ubuntu.and.Debian.Power.Users.Nov.2007.pdf
Wireshark Network Analysis_ The Official Wireshark Certork Analyst Study Guide - Laura Chappell & Gerald Combs.mobi
WordPress Web Application Development [eBook].pdf

Download: https://u.nya.is/yiquuz.7z
Backup Mirror: https://share.databases.today/Security-H...Ebooks2.7z
Tor: http://ytxmrc3pcbv5464e.onion/files/Info...Ebooks2.7z

Security/Computing [Forth Release]
Code [No Highlight]:

003 - Activar Windows XP - WindowsXP 01.pdf
0321108957.Addison-Wesley Professional.Honeypots- Tracking Hackers.pdf
070-215.TestKing.v13.Q209.pdf
070-228 Test King Mcdba Study Guide (70-228).pdf
070-271 actualtests supporting users and troubleshooting a ms windows xp os v07.01.05 200q.pdf
070-284 MCSE 2003 Installing, Configuring and Administering Microsoft Exchange 2003 v26 [TestKing.pdf
070-292 Actual Tests MCSE Exam Q&A v10.22.03.pdf
070 292 Test King MCSE Windows Server 2003 Managing A Network Environment MCSA Upgrade Study Guide v1.0(70-292).pdf
070-310 - Test King - MCSD-MCAD - Developing XML Web Services and Server Components with Microsoft Visual Basic .NET Q & A.pdf
11 Passwords.pdf
12 Tips for Dreamweaver 4.pdf
2003-11-12 TEST KING 70-229 MCDBA.pdf
2 2 Sybex - 70-290 Mcsa Mcse - Windows Xp Professional Study Guide (2Nd Edition).pdf
24742335-Bash-Shell-Referance.pdf
285063-Hacker.Bibel.[278.kB_www.netz.ru].pdf
2_Cisco Press - CCNA ICND Exam Certification Guide.2004.pdf
2_MCDBA 70-291 MCSE MCSA - Win Server 2003 Network Infrastructure by Syngress.pdf
2_Oracle OCP Admin Exam.doc
2_SCJP Exam - TestKing 310-055 Sun Java Certified Programmer v3.0.pdf
2__Test King - 070-290 - Version 03.00 - Managing and Maintaining a Microsoft Windows Server 2003 Environment (MCSE).pdf
2_Testking - 70-290 Microsoft MCSE 2003 Managing and Maintaining a MS Win Server 2003 Environment Edt 6.0 .pdf
2_TestKing Ccnp Cisco 642-801 BSCI v4.0.pdf
3077366-HackerHighSchool.pdf
330 Java Tips.pdf
361q_Test King Cisco 640-607 Exam Q&A v11.1.pdf
376-karplus molecular computer simulation.pdf
640-607 Cisco Press CCNA 3.0 Study Guide (con indice).PDF
640-801 - Cisco CCNA - TestKing 15.1.pdf
640-861.Ciscopress.Exam.Certification.Guide.ccda.pdf
70-215 MCSE Windows 2000 Server Study Guide 2nd Edition Sybex.pdf
70-215 MCSE Windows 2000 Server Training.pdf
70-216 MCSE Windows 2000 Network Infrastructure Administration Study Guide 2nd Edition Sybex.pdf
70-216 Sybex - MCSE Training Guide.pdf
70-219 testking mcse study guide Case studies w2k.designing.active.directory.edition 1.1.pdf
70-220 - Sybex - Windows 2000 Network Security Design.pdf
70-228 Mspress - Mcdba Exam 70-228 Sql Server 2K System Administration 2 Ed Dec.pdf
70-229 Designing Databases SQL 2000 TestKing.pdf
(70-229) Mcad Mcsd Mcse - Designing And Implementing Sql 2000 Server - Testking v1-1.pdf
70-270 - McGraw-Hill - MCSE - Windows XP Professional Study Guide.pdf
70-270 Mcse - Testking - Xp Pro 7.0.pdf
70-270 Question Correct Exams MCSE Exam Q&A v6.0.pdf
70-270 - Test King - MCSE 2003 - Study Guide, Installing, COnfiguring, and Administering Windows XP Pro.pdf
70-270 Testking Microsoft Exam Q And A v20.0.pdf
70-270 TestKing.Microsoft.Exam.Q.And.A.V21.0.doc
70-270 TestKing.Microsoft.Exam.Q.And.A.V21.0.pdf
70-270 TestKing - Microsoft Exam - Q And A - v26.0.pdf
70-270 Testking Windows XP Complete.pdf
70-284 TestKing - Microsoft Exam - Q And A - v28.0.pdf
70-290 actual Tests.pdf
70-290 - Mcse - 2003 - Addison Wesley - Inside Windows Server 2003.chm
70290Training.pdf
70-291 Mcsa-Mcse Self-Paced Training Kit Implementing, Managing And Maintaining A Microsoft Windows Server 2003 Network Infrastructure(1).pdf
70-291 - MCSE + MCSA - 2003 - O'Reilly - DNS on Windows Server 2003.chm
70-291 Testking.Microsoft.Exam.Q.And.A.v36.0.pdf
70-291 Windows Server 2003 Network Infrastructure, Implementation, Management & Maintenance - MCSE Study Guide - Sybex.pdf
70-292-Ebook Syngress - Mcsa Mcse Exam 70-292 - Managing And Maintaining w2003 For w2000 Mcsas.pdf
70-294 testking planning implementing and maintaining a microsoft windows server 2003 active directory infrastructure v15.1 144q.pdf
70-294 Testking v21.0.pdf
70-298 - MicroSoft - MCSE Self Paced Training Kit Designing Security For A MicroSoft Windows Server 2003 Network (Exam 70-298).pdf
70-298-MSPress-Designing Security for Windows Server 2003 Network (2004).pdf
70-298 TestKing.Microsoft.Exam.Q.And.A.V8.0.pdf
70-305 Mcad-Mcsd Net Developing And Implementing Web Applications With Visual Basic And Visual Studio Net (Exam 70-305) By Xabel.pdf
70-306 TestKing - Developing Windows Applications.pdf
720_User_Guide.pdf
731986-Hacker's Desk Reference.pdf
A Buffer Overflow Study - Attacks and Defenses (2002).pdf
A Byte of Python, v1.20 (for Python 2.x) (2005).pdf
A+ Certification for Dummies.pdf
Actualtest 642-501 v02.24.05.pdf
ActualTest 642-501 v03.20.04.pdf
Actualtest 642-501 v05.08.04.pdf
ActualTest 642-501 v07.25.05.pdf
Actualtest 642-501 v12.14.04.pdf
Addison.Wesley.Advanced.Linux.Networking.chm
Addison-Wesley Effective Java - Programming Language Guide.pdf
Addison Wesley - Hackers Delight 2002.pdf
Addison Wesley - Hack I.T. Security Through Penetration Test.chm
[Addison-Wesley] Latex Companion, 2nd Edition.pdf
Addison.Wesley.Moving.to.Ubuntu.Linux.Aug.2006.chm
Addison.Wesley.The.Java.Programming.Language.4th.Edition.Aug.2005.chm
Addison.Wesley.The.Ruby.Way.2nd.Edition.Oct.2006.chm
Administering Cisco Qos.pdf
Advanced Software Vulnerability Assessment.pdf
AFF - Advanced Forensic Format.pdf
AFF - A New Format for Storing Hard Drive Images.pdf
Ahmad-Reza_Sadeghi,_David_Naccache,_Pim_Tuyls-Towards_Hardware-Intrinsic_Security__Foundations_and_Practice_(Information_Security_and_Cryptography)(2010).pdf
AJAX In Action(2).pdf
Ajax Patterns and Best Practices - C. Gross - Apress - 2006.pdf
Analyse_forensique_d_un_systeme_Windows.pdf
Apress - Beginning JavaScript with DOM Scripting and Ajax - From Novice to Professional.pdf
Apress - Expert Spring Mvc And Web Flow - Feb 2006.pdf
Apress.Foundations.of.Ajax.Oct.2005.pdf
Apress.Hardening.Apache.eBook-LiB.chm
Apress - Pro Apache Ant - 2005.pdf
Apress.Pro.JSF.and.Ajax.Building.Rich.Internet.Components.Feb.2006.pdf
Apress.Sanghera.SCJP.2006.pdf
APress - The Definitive Guide to MySQL, 2nd Ed - 2004 - (By Laxxuss).chm
Artech House - Fundamentals of Network Security.pdf
ARTIFICAL IGNORANCE How To Implement Artifical Ignorance Log Analysis.pdf
Attacking the DNS Protocol.pdf
Auerbach.Practical.Hacking.Techniques.and.Countermeasures.Nov.2006.pdf
Auerbach.Pub.The.ABCs.of.LDAP.How.to.Install.Run.and.Administer.LDAP.Services.eBook-DDU.chm
Auerbach.Pub.The.Hackers.Handbook.The.Strategy.Behind.Breaking.into.and.Defending.Networks.Nov.20.pdf
Botnet Detection Countering the Largest Security Threat.pdf
Botnets - The killer web applications.pdf
Building_VPN_tunnels_using_IKE_between_NetScreen_and_Cisco_IOS.pdf
Build Your Own Security Lab A Field Guide for Network Testing.pdf
CCDA (Cisco Certified Design Associates) Study Guide.pdf
CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide 2nd Edition (2005) Cisco Press.chm
CCSP Self-Study CCSP CSI Exam Certification Guide 2nd Edition (2005) Cisco Press.chm
Certified Ethical Hacker (CEH) v3.0 Official Course.pdf
Charles.C.Thomas-Document.Security.Protecting.Physical.and.Electronic.Content.2007.RETAiL.EBook.pdf
Cisco - BGP4 - Case Studies.pdf
Cisco - CCNP Support Exam Guide (640-606).pdf
Cisco - Designing Network Security.pdf
Cisco IP Routing Fundamentals.pdf
Cisco Network Essentials.pdf
Cisco Press Ccie Security Exam Certification Guide Ccie Self Study 2Nd Edition May 2005 Ebook-Lib.chm
Cisco.Press.CCIE.Security.Exam.Certification.Guide.CCIE.Self.Study.2nd.Edition.May.2005.eBook-LiB.chm
Cisco Press, CCNP (Exam 642-811) BCMSN Exam Certification Guide.(2005),.3Ed.BBL.LotB.chm
[Cisco Press] CCSP IPS Exam Certification Guide (2005) - DDU.chm
Cisco.Press,.CCSP.SNRS.(Exam.642-502).Exam.Certification.Guide.(2005),.2Ed.BBL.LotB.chm
Cisco Router Handbook.pdf
Cleaning Windows XP For Dummies (2004).pdf
Comparing Web Frameworks; Struts, Spring MVC, WebWork, Tapestry & JSF.pdf
Computer and Network Forensics.pdf
Computer Forensics_ Investigating Networ - EC-Council.pdf
Computer - Hackers Secrets - e-book.pdf
Computer Vulnerability(March 9 2000).pdf
Cracking_Passwords_Guide.pdf
Crackproof Your Software(No Starch-2002).pdf
Credit Card Visa Hack(Cambridge Lab-2003).pdf
Credit.Card.Visa.Hack.Ucam.Cl.Tr.560.[223.kB_www.netz.ru].pdf
Cross Site Scripting Attacks Xss Exploits and Defense.pdf
Cyberdeterrence and Cyberwar.pdf
DangerousGoogle-SearchingForSecrets.pdf
Dhtml Utopia.pdf
Digital Forensics for Network, Internet, and Cloud Computing.pdf
Digital Forensics of the Digital Memory.pdf
Digital.Press.IPv6.Network.Programming.ISBN1555583180.pdf
Dummies - Hack How To Create Keygens (1).pdf
EBook - A+ Certification Guide.pdf
(e-Book) CCDA Exam Certification Guide, 2nd Ed. (640-861) - Cisco Press 2004.pdf
[eBook] - CCNA Exam 640-607 Certification Guide - Cisco Press 2002.pdf
(Ebook - Computer) Hacking The Windows Registry.pdf
(ebook) Hacking Manual HACKING INTO COMPUTER SYSTEMS.doc
(eBook) - ITU-T - H323-SIP.pdf
[eBook][Java]log4j The Complete Manual.pdf
eBook_Linux.Administration.Made.Easy.ShareReactor.pdf
[eBook] Manning - Java Swing 2nd Edition (2003).pdf
eBook.MS.Press.-.Microsoft.Encyclopedia.of.Security.ShareReactor.pdf
eBook_MySQL-PHP_Database_Applications.ShareReactor.pdf
eBook_Navy.Seal.Physical.Fitness.Guide.ShareReactor.pdf
(eBook) - Network Security Guide - NSA.pdf
(Ebook OCR) Leslie Lamport - Latex A document preparation system (1994 2nd).pdf
Ebook O'reilly High Performance Mysql.pdf
(ebook pdf) hacking into computer systems - a beginners guide.pdf
(ebook - pdf) how to crack cd protections.pdf
(eBook - PDF) Hugo Cornwall - The Hacker's Handbook .pdf
(ebook-pdf) - Programming - Website Database Basics With PHP and MySQL.PDF
(Ebook) Php 5 For Dummies (2004).pdf
eBook_Protected_Internet_Intranet_&_Virtual_Private_Networks.NoFearLevenT.ShareReactor.pdf
(ebook) ted the tool - mit guide to lock picking.pdf
eBook_Web_Application_Development_With_PHP_4.0_ShareReactor.pdf
eBook.Windows_2000_Active_Directory_Survival_Guide.ShareReactor.pdf
(eTrain) MS Press - MCAD.MCSD.Self.Paced.Training.Kit.Developing.XML.Web.Services.And.Server.Components.With.MS.Visual.Basic.Dot.NET.And.MS.CSharp.chm
Excel Advanced Report Development (2005).pdf
EXE File Format.pdf
Exploring Macromedia Studio 8 (2005).pdf
For Dummies Firewalls for Dummies.pdf
For.Dummies.Hacking.Wireless.Networks.For.Dummies.Sep.2005.eBook-DDU.pdf
For.Dummies.Wireless.Network.Hacks.and.Mods.For.Dummies.Sep.2005.eBook-DDU.pdf
For.Dummies.Visual.Basic.2005.Express.Edition.For.Dummies.Dec.2005.pdf
For.Dummies.XML.For.Dummies.The.Fourth.Edition.May.2005.eBook-DDU.pdf
Forensic Analysis of Microsoft Internet Explorer Cookie Files.pdf
Forensic Computer Crime Investigation.pdf
Forensic Disk Imaging Step-by-Step.pdf
Friendsofed Css Mastery Advanced Web Standards Solutions Feb 2006.pdf
FTP-HTTP-ERROR-Codes.pdf
Google Hacking for Penetration Tester (Syngress-2005).pdf
Gray Hat Hacking~The Ethical Hacker's Handbook, 3e [2011].pdf
Gray Hat Python.pdf
Hack Attacks Revealed- A Complete Reference with Custom Security Hacking Toolkit (Wiley-2001).pdf
Hacker Crackdown, The.pdf
Hackers Beware (NewRiders -2002).pdf
Hacking Exposed. Malware and Rootkits (McGraw-Hill, 2010).pdf
Hacking Exposed Malware AND Rootkits - McGrawHill - 2010.pdf
Hack IT Security Through Penetration Testing.pdf
Hack Proofing Linux A Guide to Open Source Security - Stangler, Lane - Syngress -  ISBN 1-928994-34-2.pdf
Hack Proofing Sun Solaris 8.pdf
Hack Proofing Your E-Commerce Site.pdf
Hack Proofing Your Identity in the Information Age (Syngress-2002).pdf
Hack Proofing Your Network - Internet Tradecraft (Syngress-2000).pdf
Hack Proofing Your Network Second Edition.pdf
How to Crack CD Protections.pdf
How.To.Install.Microsoft.Exchange.2000.on.Windows.Server.2003.-.LinkoManija.net.pdf
How to Make a Forensic Copy Through the Network.pdf
Html Utopia - Designing Without Tables Using Css.pdf
Interconeccion de Dispositivos de Red Cisco (eBook spanish espaDol).pdf
Java 2004- Manning- Tapestry In Action- the definitive guide to web application development with Tapestry.pdf
Java 2 Network Security.pdf
Java Programming Language Handbook 1.pdf
JavaServer.Faces.JSF.in.Action_Manning.pdf
Jess_Garcia-Web_Forensics.pdf
John Wiley And Sons - Data Mining-Concepts Models Methods And Algorithms Ebook-Fos.chm
Kennedy D., O'Gorman J., Kearns D., Aharoni M. - Metasploit. The Penetration Tester's Guide -.pdf
Learn Windows PowerShell In A Month Of Lunches.pdf
LPI Linux Certification.doc
Managing Cisco Network Security Second Edition.pdf
[Manning - 2004] Tapestry In Action.pdf
Manning.Ajax.in.Action.Oct.2005.pdf
Manning Art Of Java Web Development - Struts, Tapestry, Commons, Velocity, Junit, Axis, Cocoon, Internetbeans, Webwork (2007).pdf
Manning,.IntelliJ.IDEA.in.Action.(2006).BBL.pdf
Manning - JSTL in Action - 2003.pdf
Manning - Struts In Action - Building web applications with the leading Java framework.pdf
Mathematics For Game Developers (2004).pdf
[MCAD-MCSD 70-300] Analyzing Requirements and Defining .NET Solution Architectures [MS Press, 2003, 0-7356-1894-1].chm
MCAD MCSD Visual Basic .NET Windows and Web Applications Study Guide.chm
mcgraw hill cisco security architectures [found via www.filedonkey.com].pdf
McGraw Hill - Cisco TCP-IP Routing Professional Reference.pdf
McGraw.Hill.-.Oracle.Database.10g..High.Availablity.with.RAC.Flashback.&.Data.Guard.chm
McGrawHill-Oracle_Database_10g_New_Features.chm
MCSE - Deploying Virtual Private Networks with Microsoft Windows Server 2003 [MS Press 2004].chm
MCSE Microsoft Training Kit - 70-216 - Windows 2000 Network Infrastructure Administration.CHM
Mcse - Microsoft Windows Xp Professional Training Kit (Exam 70-270).chm
MCSE.Training.Kit.Microsoft.SQL.Server.2000.Database.Desing.and.Implementation.Exam.70-229.eBook.eng.chm
MCSE Training Kit - M$ Win2000 Server 70-215 (CHM-11,302,984).pdf
Microsoft Office Access 2003 Step By Step (2004).pdf
Microsoft Office Excel 2003 Bible (2003).pdf
Microsoft Office Excel 2003 Programming Inside Out (2004).pdf
Microsoft.Press.MCSE.Self.Paced.Training.Kit.Exam.70.293.Planning.and.Maintaining.a.Microsoft.Windows.Server.2003.Network.Infrastructure.eBook-LiB.chm
Microsoft.Press.MCSE.Self.Paced.Training.Kit.Exam.70-294.Planning.Implementing.and.Maintaining.a.Microsoft.Windows.Server.2003.Active.Directory.Infras.chm
Microsoft Press Mcse Self Paced Training Kit Exam 70-298 Designing Security For A Microsoft Windows Server 2003 Network Ebook-Lib.chm
Microsoft.Press.MCSE.Self.Paced.Training.Kit.Exam.70-298.Designing.Security.for.a.Microsoft.Windows.Server.2003.Network.eBook-LiB.chm
Microsoft.Press.Microsoft.ASP.Dot.NET.Coding.Strategies.with.the.Microsoft.ASP.Dot.NET.Team.eBook-LiB.chm
MS Press - MCAD MCSD 70-306 70-316 - Developing .NET (2002).chm
MS Press - MCAD.MCSE.MCDBA.Self-Paced.Training.Kit-Microsoft.SQL.Server.2000.Database.Design.and.Implementation.Second.Edition.Exam.70-229.chm
MS Press - MCDBA Training Kit - SQL 7.0 Database Implementation.chm
MS Press - MCDBA Training Kit - SQL 7.0 Data Warehousing.chm
MS Press - MCDBA Training Kit - SQL 7.0 System Administration.chm
MS Press - MCSD Training Kit - Desktop Applications with MS Visual C++ 6.0.CHM
nessus_4.2_user_guideplus.pdf
Nessus Network Auditing 2ed [AAVV] Syngress.pdf
[Network] Cisco Seminar - Securing 802.11 Wireless Networks.pdf
New Riders - Web Application Development With PHP4.chm
Nmap network security scanner man page.doc
(Nokia) Getting Started with Python.pdf
(Nokia) Programming with Python.pdf
No.Starch.Press.Wicked.Cool.Shell.Scripts-101.Scripts.for.Linux.Mac.OS.X.and.Unix.Systems.eBook-LiB.chm
Novell.Press.Linux.Firewalls.3rd.Edition.Sep.2005.chm
O'Reilly - Apache Cookbook - 2003 ! - (By Laxxuss).chm
OReilly.Essential.PHP.Security.Oct.2005.chm
OReilly.Fedora.Linux.Oct.2006.chm
OReilly.Java.Cookbook.2nd.Edition.Jun.30.2004.eBook-DDU.chm
OReilly_ Java Programming On Linux.pdf
O'Reilly - JavaServer Pages, 3rd Edition.pdf
O'Reilly,.Learning.Red.Hat.Enterprise.Linux.and.Fedora.(2004).4Ed.DDU.ShareConnector.chm
Oreilly.linux.device.drivers.3rd.edition.feb.2005.ebook-ddu.chm
OReilly _LPI-Linux Certification in a nutshell.pdf
OReilly.Mac.OS.X.Tiger.for.Unix.Geeks.Jun.2005.eBook-DDU.chm
OReilly,.Managing.Projects.with.GNU.make.(2004),.3Ed.DDU.chm
OReilly.Oracle.PL.SQL.for.DBAs.Oct.2005.chm
OReilly.PHP.Cookbook.2nd.Edition.Aug.2006.chm
OReilly.Producing.Open.Source.Software.Oct.2005.eBook-DDU.chm
OReilly - Python Pocket Reference, 2nd Ed 2001.chm
OReilly - Sed & Awk 2nd Edition.pdf
OReilly.SELinux.NSAs.Open.Source.Security.Enhanced.Linux.Oct.2004.eBook-DDU.chm
OReilly.SSH.The.Secure.Shell.The.Definitive.Guide.2nd.Edition.May.2005.eBook-DDU.chm
OReilly.-.Unix.Backup.and.Recovery.pdf
OReilly.Unix.in.a.Nutshell.4th.Edition.Oct.2005.eBook-DDU.chm
O'Reilly, Version Control with Subversion (2004) DDU.chm
O'Reilly - Windows XP Annoyances.chm
Password_Policy.pdf
Peachpit.Press.JavaScript.and.Ajax.for.the.Web.6th.Edition.Aug.2006.chm
Penetration_Tester__s_Open_Source_Toolkitplus.pdf
Practical-Reverse-Engineering-x86-x64-ARM-Windows-Kernel-Reversing-Tools-and-Obfuscation.epub
Premier - PHP Fast And Easy Web Development 2nd Edition.chm
Premier.Press.Game.Programming.with.Python.Lua.and.Ruby.ebook-LiB.chm
Prentice.Hall.Java.How.to.Program.6th.Edition.Aug.2004.INTERNAL.chm
Prentice.Hall.Network.Forensics.Jun.2012.pdf
Prentice.Hall.PTR.Embedded.Linux.Primer.A.Practical.Real.World.Approach.Sep.2006.chm
Prentice.Hall.PTR.Linux.Quick.Fix.Notebook.Mar.2005.chm
Prentice.Hall.PTR.PHP.5.Power.Programming.Oct.2004.eBook-LiB.chm
Prentice.Hall.PTR.Samba.3.by.Example.Practical.Exercises.to.Successful.Deployment.2nd.Edition.Aug.2005.chm
Prentice.Hall.PTR.SELinux.by.Example.Using.Security.Enhanced.Linux.Jul.2006.chm
Prentice.Hall.PTR.Solaris.Performance.and.Tools.Jul.2006.chm
Prentice.Hall.PTR.The.Official.Samba.3.HOWTO.and.Reference.Guide.2nd.Edition.Aug.2005.chm
Prentice.Hall.PTR.Understanding.AJAX.Using.JavaScript.to.Create.Rich.Internet.Applications.Aug.2006.chm
Prentice.Oracle.DBA.Guide.To.Data.Warehousing.And.Star.Schemas.eBook-LiB.chm
Prentice.Oracle.PL.SQL.By.Example.3rd.Edition-LiB.chm
Prentice.Programming.Oracle.Triggers.And.Stored.Procedures.3rd.Edition.eBook-LiB.chm
Prentice.Technical.Java.Developing.Scientific.And.Engineering.Applications.eBook-LiB.chm
Princess_Activity_Kit.pdf
Programming Spiders, Bots, and Aggregators in Java [Sybex, 2.pdf
Pro Jakarta Velocity.pdf
Que.CCNA.Practice.Questions.Exam.Cram.2.2nd.Edition.Dec.2005.eBook-DDU.chm
Que MCAD MCSD Developing XML Web.Services And Server Components With Visual C Sharp .NET And the .NET Framework Exam Cram 2 Kalani (Exam 70-320)(2003).chm
Que,.MCAD.MCSE.MCDBA.(Exam.70-229).Designing.and.Implementing.Databases.with.SQL.Server.2000.(2005).BBL.LotB.chm
Que.MCSA.MCSE.Implementing.and.Managing.Exchange.Server.2003.Exam.Cram.2.Exam.Cram.70-284.chm
Que.MCSA.MCSE.Managing.And.Maintaining.A.Microsoft.Windows.Server.2003.Environment.Exam.Cram.2.Exam.70-290.eBook-LiB.chm
Que - MCSE 070-294 Win Server 2003 Active Directory Infrastructure Exam Cram 2.chm
Red Hat Linux Bible - Fedora and Enterprise Edition.chm
Risk Analysis and Security Countermeasure selection.pdf
rootkit- Rootkits.for.Dummies 2007.pdf
Sams.Advanced.PHP.Programming.Feb.2004.INTERNAL.chm
Sams - C++ Primer Plus, Fourth Edition.chm
Sams.FreeBSD.6.Unleashed.Jun.2006.chm
Sams - MySQL and JSP Web Applications Data Driven Programming Using Tomcat And MySQL.chm
Sams.MySQL.Phrasebook.Essential.Code.and.Commands.Mar.2006.chm
Sams, Mysql Tutorial (2004).chm
Sams.PHP.5.Unleashed.Dec.2004.eBook-LiB.chm
Sams.PostgreSQL.2nd.Edition.Jul.2005.chm
Sams - PostgreSQL Developers Handbook.chm
Sams.SUSE.Linux.10.Unleashed.Nov.2005.eBook-DDU.chm
Sams - Teach Yourself BEA WebLogic Server 7.0 in 21 Days - 2002 - (By Laxxuss).chm
SANS Incident Handling Step by step.pdf
SANS Intrusion Dectection.pdf
Scambray - Hacking Exposed - Windows 3E (Mcgraw, 2008)plus-.pdf
Scene of the Cybercrime - Computer Forensics Handbook (Syngress).pdf
S C Enterprise Hackers Secrets Revealed.pdf
S C Enterprises Hacking Secrets Revealed Information and.pdf
SCJP Exam - 310-055.Exam.Q.and.A.12.06.05-BBL.pdf
SCJP Sun Certified Programmer for Java 5 Study Guide (Exam 310-055).pdf
SitePoint.The.CSS.Anthology.101.Essential.Tips.Tricks.and.Hacks.pdf
SkillSoft.Press.Migrating.from.Exchange.Server.to.qmail.eBook-LiB.chm
Stealing the Network - How to Own an Identity.pdf
stealing-the-network-how-to-own-a-shadow.pdf
Stealing the Network How to Own the Box.pdf
Steven Levy - Hackers Heroes of the Computer Revolution - 2010.pdf
Steve'S Rhce Study Guide.doc
Struts Recipes Chp2.pdf
Stylin' with CSS - A Designer's Guide.pdf
Sun - Core JSTL Mastering the JSP Standard Tag Library.pdf
Sybex.Effective.Software.Test.Automation.Developing.an.Automated.Software.Testing.Tool.eBook-LiB.chm
Sybex.EnCase.Computer.Forensics.Study.Guide.2nd.Edition.Dec.2007.pdf
Sybex.Linux.Network.Servers.eBook-EEn.pdf
Sybex.Mastering.Active.Directory.for.Windows.Server.2003.eBook-KB.pdf
Sybex - Mcad Mcsd Visual Basic Net Xml Web Services And Server Components Study Guide(2003).chm
-Sybex, MCSA MCSE (Exam 70-270) Windows XP Professional Study Guide (2005), 3Ed DDU OCR 7.0-2.6 LotB.pdf
Sybex - MCSE Training Guide - Exam 70-220_web.pdf
Sybex - MCSE.Windows.Server.2003.Network.Security.Design.Study.Guide.70.298.May.2004.chm
Sybex.MCSE.Windows.Server.2003.Network.Security.Design.Study.Guide.70.298.May.2004.eBook-DDU(1).chm
Sybex.MCSE.Windows.Server.2003.Network.Security.Design.Study.Guide.70.298.May.2004.eBook-DDU.chm
Sybex - .NET Development Security Solutions.chm
Sybex - Pc.Disaster.And.Recovery.Ebook.chm
Sybex.TCP.IP.Foundations.Aug.2004.eBook-DDU.pdf
Syngress - Exam 70-297 MCSE Designing a Windows Server 2003 Active Directory and Network Infrastructure.chm
Syngress.Force.Emerging.Threat.Analysis.From.Mischief.to.Malicious.Oct.2006.pdf
Syngress.Hacking.a.Terror.Network.Nov.2004.ISBN1928994989.pdf
Syngress-Hack Proofing Linux (2001).pdf
Syngress.InfoSecurity.2008.Threat.Analysis.Nov.2007plus.pdf
Syngress - Mcse Designing Security For A Windows Server 2003 Network Exam 70-298 Study Guide - 2004 - (By Laxxuss).chm
Syngress.Nessus.Network.Auditing.Second.Edition.May.2008.eBook-DDU.pdf
Syngress,.Nessus.Snort.and.Ethereal.Power.Tools.Customizing.Open.Source.Security.Applications.(2005).DDU.pdf
Syngress.Nmap.in.the.Enterprise.Your.Guide.to.Network.Scanning.Jan.2008plus.pdf
Syngress - Secure Your Network for Free Using NMAP, WIRESHARK, SNORT, NESSUS, and MRTG - 2007.pdf
Syngress,.Writing.Security.Tools.and.Exploits.(2006).DDU.pdf
Syslog Notes.pdf
Teach Yourself Visual C++ 6 in 21 days.pdf
The_Art_of_Deception.pdf
The-Art-of-Exploitation_2nd-Ed.pdf
The Dark Visitor - The Dark Visitor- Inside the World of Chinese Hackers.zip
The Internet and Crime.pdf
The Javascript Anthology 101 Essential Tips, Tricks & Hacks-Sample (2006 - Sitepoint).pdf
The Little Black  Book of Computer Virus.pdf
the.pragmatic.programmers_pragmatic.ajax.pdf
The.Shellcoder_s.Handbook.Discovering.and.Exploiting.Security.Holes.2nd.Edition 2007plus.pdf
Tutorial For Building j2Ee Applications Using Jboss And Eclipse.chm
UNIX and Linux Forensic Analysis DVD Toolkit.2008.pdf
Value-Range Analysis of C Programs.pdf
WebWork In Action.pdf
[Wiley] Cryptography for Dummies.pdf
Wiley - Java Open Source Programming With Xdoclet, Junit, Webwork, Hibernate.pdf
Wiley Publishing, Inc - Hacking Video Game Consoles. Turn Your Old Video Game Systems into Awesom.pdf
Wiley Publishing, Inc - The CISSP Prep Guide. Gold Edition.pdf
Wiley Publishing, Inc - Wireless Network Hacks AND Mods for Dummies.pdf
Windows 2000 - TCPIP Implementation.doc
Windows Forensic Analysis.pdf
Visual Basic C++ 6.doc
VoIP.Cisco.Introduction to IP Telephony.pdf
VoIP.Syngress.Cisco AVVID and IP Telephony Design And Implementation.pdf
VoIP.Syngress.Configuring Cisco Voice Over IP Second Edition.pdf
Wordware Publishing - DirectX9 Audio Exposed Interactive Audio Development.chm
Wrox Press - Professional Apache Tomcat 5.pdf
Wrox - Professional Javascript For Web Developers - 2005 - (By Laxxuss).pdf
WVS Manual.pdf
WVS Mmanual+.pdf

Download: https://u.nya.is/gcbzdm.7z
Backup Mirror: https://share.databases.today/Security-C..._Ebooks.7z
Tor: http://ytxmrc3pcbv5464e.onion/files/Info..._Ebooks.7z

Hacking/Malware by Voided[Fifth release]
Code [No Highlight]:

applied_cryptography_protocols_algorithms_and_source_code_in_c.pdf
art_of_deception_controlling_the_human_element_of_security.pdf
art_of_memory_forensics_detecting_malware_and_threats_in_windows_linux_and_mac_memory.pdf
cryptography_engineering_design_principles_and_practical_applications.pdf
malwareanalyst_dvd.zip
malware_analysts_cookbook_and_dvd_tools_and_techniques_for_fighting_malicious_code.pdf
practical_reverse_engineering_x86_x64_arm_windows_kernel_reversing_tools_and_obfuscation.pdf
security_engineering_a_guide_to_building_dependable_distributed_systems.pdf
shellcoders_handbook_discovering_and_exploiting_security_holes.pdf
social_engineering_the_art_of_human_hacking.pdf
threat_modeling_designing_for_security.pdf
unauthorised_access_physical_penetration_testing_for_it_security_teams.pdf
web_application_hackers_handbook_finding_and_exploiting_security_flaws.pdf

Download link: https://www_ytxmrc3pcbv5464e.onion.link/...by-voided/


>_
Please Email the above files at, (AnonymousMessage101@protonmail.ch), they will make it available on archive.org for everyone. Link for content that will be archived will be readily available by the 23rd.
Thank you.
-AnonymousMessage101
Reply
#39
(02-13-2018, 09:37 PM)AnonymousM Wrote: >_
Please Email the above files at, (AnonymousMessage101@protonmail.ch), they will make it available on archive.org for everyone. Link for content that will be archived will be readily available by the 23rd.
Thank you.
-AnonymousMessage101

How about this:
  • you download the content
  • you mirror it
  • we do nothing
Sounds like a better idea to me.
Reply
#40
Hi all - can anyone confirm the links for the ebooks still work. Both sets and their mirrors don't seem to work.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Vigilante Hacking - Heroes or Menaces DeepLogic 10 1,494 07-08-2020, 11:26 PM
Last Post: rob13
  Offensive Security PWK 2020 v2 Torrent ravasquez 0 103 07-07-2020, 10:01 PM
Last Post: ravasquez
  Is releasing hacking tools a bad idea? DeepLogic 1 590 06-16-2020, 04:40 PM
Last Post: poppopret
  Is learning Games Hacking useful? Bass_R33v3s 8 1,468 06-16-2020, 12:58 AM
Last Post: Bass_R33v3s