Name Size
Parent Directory -
(persian) Learning MetaSploit as a Penetration Testing tool for newbie Hackers How to use.pdf 2.4M
0321108957.Addison-Wesley Professional.Honeypots- Tracking Hackers.pdf 2.1M
285063-Hacker.Bibel.[278.kB_www.netz.ru].pdf 278K
3077366-HackerHighSchool.pdf 2.9M
731986-Hacker's Desk Reference.pdf 715K
Addison Wesley - Hackers Delight 2002.pdf 6.1M
Botnets - The killer web applications.pdf 7.0M
Charles.C.Thomas-Document.Security.Protecting.Physical.and.Electronic.Content.2007.RETAiL.EBook.pdf 1.3M
Gray Hat Hacking_The Ethical Hacker's Handbook, 3e [2011].pdf 12M
HTTPResponseSplitting.pdf 198K
McGraw-Hill - Linux and Unix Security Portable Reference.pdf 3.5M
Metasploit_Penetration.pdf 655K
Nmap.pdf 82K
O'Reilly Security Power Tools.pdf 10M
OReilly - Flickr Hacks Tips and Tools for Sharing Photos Online (Feb 2006).chm 5.4M
OReilly.Google.Hacks.2nd.Edition.Dec.2004.ISBN0596008570.chm 5.2M
OReilly.Linux.Security.Cookbook.pdf 2.0M
OReilly.Linux.Server.Hacks.Volume.Two.Dec.2005.chm 2.2M
OReilly.Statistics.Hacks.May.2006.chm 1.0M
OReilly.VoIP.Hacks.Tips.and.Tools.for.Internet.Telephony.Dec.2005.chm 2.5M
OReilly.Word.Hacks.Oct.2004.eBook-DDU.chm 3.5M
Oded_Goldreich-Foundations_of_Cryptography__Volume_2,_Basic_Applications(2009).pdf 1.9M
Oded_Goldreich-Foundations_of_Cryptography__Volume_2,_Basic_Applications-Cambridge_University_Press(2009).pdf 2.0M
Oreilly.Linux.Desktop.Hacks.Mar.2005.eBook-LiB.chm 453K
Overtaking-Google-Desktop.pdf 429K
Que - UNIX Hints Hacks.chm 806K
SQL Injection Attacks and Defense.pdf 3.3M
Springer.Networked.RFID.Systems.and.Lightweight.Cryptography.Dec.2007.pdf 6.4M
Springer.Open.Source.Systems.Security.Certification.Nov.2008.eBook-DDU.pdf 2.9M
Stamp M., Low R.M. Applied cryptanalysis...pdf 18M
Syngress - Hack Proofing Linux (2001).pdf 12M
Syngress - Nessus Network Auditing - 2004 !! - (By Laxxuss).pdf 5.2M
Syngress - Snort 2.1 Intrusion Detection, 2nd edition.pdf 12M
Syngress Publishing Ethereal Packet Sniffing Ebook-Ddu.pdf 5.9M
Syngress,.Nessus.Snort.and.Ethereal.Power.Tools.Customizing.Open.Source.Security.Applications.(2005).DDU.pdf 7.1M
Syngress.Coding.for.Penetration.Testers.Oct.2011.pdf 9.7M
Syngress.Hacking.a.Terror.Network.Nov.2004.ISBN1928994989.pdf 8.2M
Syngress.Penetration.Testers.Open.Source.Toolkit.3rd.Edition.Aug.2011.pdf 30M
Syngress.The.Basics.of.Hacking.and.Penetration.Testing.Aug.2011.pdf 6.7M
The_Business_of_Cybercrime.pdf 4.7M
Using Metasploit For Real-World Security Tests.pdf 584K
Wardriving - Metasploit Framework Web Interface Tutorial.pdf 1.5M
Wardriving - Metasploit Userguide.pdf 182K
Web_App_Security_jp.pdf 83K
Wiley-Principles.of.Computer.Security.2010.RETAiL.EBook.pdf 5.5M
Wiley.Hacking.GPS.Mar.2005.ISBN0764598805.pdf 10M
Wiley.Lifehacker.Dec.2006.pdf 7.4M
Yehuda_Lindell-Introduction_to_Modern_Cryptography__Principles_and_Protocols-Chapman_and_Hall_CRC.pdf 7.7K
blind-xpath-injection.pdf 125K
css-explained.pdf 114K
developingsecurewebapps.pdf 191K
hack-web-apps-cookie-poisoning.pdf 146K
oreilly,.visual.studio.hacks.(2005).ddu.lotb.chm 6.4M
testing-privilege-escalation.pdf 462K