Minggu, 17 November 2013

Wa Da Fuck

Offensive security lecture
Biggest password cracking wordlist with millions of words

http://backtrack-page.blogspot.com/2013/05/biggest-password-cracking-wordlist-with.html

Access Denied: The Practice and Policy of Global Internet Filtering:
https://www.dropbox.com/s/oq3jlzsrhvgzxpz/Access.Denied.The.Practice.and.Policy.of.Global.Internet.Filtering.pdf

Linux Iptables:
https://www.dropbox.com/s/qccju93nzq0v5tz/Oreilly.Linux.iptables.Pocket.Reference.pdf

Low Tech Hacking: Street Smarts for Security Professionals:
https://www.dropbox.com/s/64h5tvpi3g1oyil/Syngress.Low.Tech.Hacking.pdf

No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing:
https://www.dropbox.com/s/g7dxxnr98awxd44/No%20TechHacking.epub

http://www.cs.fsu.edu/~redwood/OffensiveSecurity/lectures.html

OWASP TOP 10 2013: 
https://www.dropbox.com/s/q4c99eeuc3xe1n4/OWASP%20Top%2010%20-%202013.pdf

Squid: The Definitive Guide:
https://www.dropbox.com/s/8bn23mk487les2w/Squid%20The%20Definitive%20Guide.pdf

Network Warrior:
https://www.dropbox.com/s/iw6t8k77edow104/O%27Reilly%20-%20Network%20Warrior.pdf

Computer viruses:
https://www.dropbox.com/s/xlm6s1jp7wpqnbt/Computer%20Viruses%20for%20Dummies.pdf

Wireless Networking Complete:
https://www.dropbox.com/s/k8w6u87hzftxppt/Wireless.Networking.Complete.pdf

Network Security Hacks, 2nd Edition:
https://www.dropbox.com/s/g3j0vqo37wfttuf/Oreilly.Network.Security.Hacks.2nd.Edition.pdf

The Hacker's Underground Handbook: Learn how to hack and what it takes to crack even the most secure systems!
https://www.dropbox.com/s/zpl7g4veh1jqbp7/The_Hacker_s_Underground_Handbook.pdf


Computer Networks (5th Edition: 
https://www.dropbox.com/s/oulnocaw192m6kl/Computer_Network_5th.pdf

Hacking Secret Ciphers with Python 
https://www.dropbox.com/s/2lzqbqpmf045wkp/HackingSecretCiphersWithPython.pdf

Ubuntu HacksTips & Tools for Exploring, Using, and Tuning Linux 
https://www.dropbox.com/s/80jma4i6cdlq3yx/ubuntu_hacks.pdf

Inside Cyber Warfare: Mapping the Cyber Underworld 
https://www.dropbox.com/s/lrhzhu368vhguwd/Inside_Cyber_Warfare_Mapping_.pdf

Hacking Exposed Windows 
https://www.dropbox.com/s/xn3ga63m94n8doh/Hacking%20Exposed-Windows%20-%20Windows%20Security%20Secrets%20%26%20Solutions%2C%203rd%20Ed..pdf

he Art of Deception: Controlling the Human Element of Security (Penulis: Kevin Mitnick & William): 
https://www.dropbox.com/s/5oug9skng5rdsk4/The%20Art%20Of%20Deception.pdf

Ebook Secrets of a Super Hacker
https://www.dropbox.com/s/luxbil1a0tsed8q/Secrets%20of%20a%20super%20hacker.pdf

Ebook Secrets of a Super Hacker 
https://www.dropbox.com/s/luxbil1a0tsed8q/Secrets%20of%20a%20super%20hacker.pdf

Ebook Ninja Hacking:
https://www.dropbox.com/s/487ktwxx8rlbwpv/Ninja%20Hacking%20-%20Unconventional%20Penetration%20Testing%20Tactics%20and%20Techniques.pdf

Ebook WordPress 3 Ultimate Security: 
https://www.dropbox.com/s/95w0dpykcjwnvc4/Packtpub.WordPress.3.Ultimate.Security.pdf

Ebook Hacking and Securing iOS Applications: 
https://www.dropbox.com/s/ttc4qw8ztk6piu3/Oreilly.Hacking.and.Securing.iOS.Applications.Jan.2012.pdf

iOS Hacker's Handbook: 
https://www.dropbox.com/s/ptqvi2ot1l4ybqg/Wiley.iOS.Hackers.Handbook.Apr.2012.epub

Tidak ada komentar: