Name Size
Parent Directory -
Anonymizers/ -
Banner-Grabbing-Tool/ -
Custom-Packet-creator-Tool/ -
CySCA2014InABox/ -
Developpement/ -
Embedded/ -
Google-Hacking/ -
Guide SSI/ -
LINUX/ -
MCSA-MCSE/ -
Materiel/ -
Network-Mapper/ -
Network-Vulnerability-Scanners/ -
Neural Networks/ -
Ping-Sweep-Tools/ -
Proxy-Tools/ -
Reseau/ -
Scanning-Tools/ -
Securite/ -
Systeme/ -
Tunnelling-Tools/ -
War-Dialing-Countermeasure-Tool/ -
War-Dialing-Tools/ -
Wireless/ -
amd_manuals/ -
intel_manuals/ -
15344.pdf 52K
2014-apt-study.pdf 166K
50-1337.pdf 14M
Aamir Lakhani, Joseph Muniz-Penetration Testing with Raspberry Pi-Packt Publishing (2015).pdf 9.7M
Aaron Johns-Mastering Wireless Penetration Testing for Highly-Secured Environments-Packt Publishing (2015).pdf 12M
Aditya Balapure-Learning Metasploit Exploitation and Development-Packt Publishing (2013).pdf 9.1M
Advanced Penetration Testing for Highly Secured Environments.pdf 16M
Advanced Persistent Threat Hacking, The Art & Science...pdf 11M
Alex R. Young, Marc Harter-Node.js in Practice-Manning (2015).pdf 7.3M
Allen Downey B.-Think Bayes-O'Reilly Media (2013).pdf 12M
Apress.Pro.Data.Visualization.Using.R.And.JavaScript.Jun.2013.ISBN.1430258063.pdf 8.8M
Apress.Pro.PHP.And.JQuery.Add.Quick.Smooth.And.Easy.Interactivity.pdf 11M
Bachaalany, Elias_ Koret, Joxean-The Antivirus Hacker's Handbook-Wiley (2015).pdf 5.7M
Basarat Ali Syed (auth.)-Beginning Node.js-Apress (2014).pdf 6.9M
Bastian Ballmann-Understanding Network Hacks_ Attack and Defense with Python-Springer (2015).pdf 11M
Beginning_Arduino.pdf 16M
Ben Clark-Rtfm_ Red Team Field Manual-CreateSpace Independent Publishing Platform (2014).pdf 10M
Building.Embedded.Linux.Systems.pdf 1.4M
C# Programming From Problem Analysis to Program Design, 3rd Edition.pdf 56M
Chris Sanders and Jason Smith (Auth.)-Applied Network Security Monitoring. Collection, Detection, and Analysis (2014).pdf 37M
CreateSpace.Publishing.Basic.Security.Testing.With.Kali.Linux.Jan.2014.ISBN.1494861275.pdf 14M
CybraryAdvancedPenSlides.pdf 2.3M
David Nathans-Designing and Building Security Operations Center-Syngress (2014).pdf 3.4M
Douglas Berdeaux-Penetration Testing with Perl-Packt Publishing - ebooks Account (2015).pdf 4.3M
Drew Conway, John Myles White-Machine Learning for Hackers-O'Reilly Media (2012).pdf 1.7M
Fernando Doglio (auth.)-Pro REST API Development with Node.js-Apress (2015).pdf 7.2M
FirstStrike_Plus.pdf 171K
HITB-Ezine-Issue-003.pdf 16M
HITB-Ezine-Issue-004.pdf 16M
Introduction To Software Reverse Engineering 2003.pdf 333K
Ivan Ristic-Bulletproof SSL and TLS_ Understanding and Deploying SSL_TLS.pdf 6.8M
J.J. MURPHY-ANALISI TECNICA DEI MERCATI FINANZIARI.pdf 15M
Jacob Perkins-Python 3 Text Processing with NLTK 3 Cookbook-Packt Publishing - ebooks Account (2014).pdf 1.6M
JavaScript by Example, 2nd Edition.pdf 27M
Jay Jacobs, Bob Rudis-Data-Driven Security_ Analysis, Visualization and Dashboards-Wiley (2014).pdf 8.2M
Jennifer Golbeck-Introduction to Social Media Investigation_ A Hands-on Approach-Syngress (2015).pdf 59M
Johnny Long, Bill Gardner, Justin Brown-Google Hacking for Penetration Testers-Syngress (2015).pdf 37M
Learning Penetration Testing with Python.pdf 9.2M
Loraine Blaxter, Christina Hughes, Malcolm Tight-How to Research, 4th Edition -Open University Press (2010).pdf 1.2M
Luis Pedro Coelho, Willi Richert-Building Machine Learning Systems with Python-Packt Publishing (2015).pdf 6.5M
Lutz M.-Python pocket reference-O'Reilly (2014).pdf 2.4M
Manning.Secrets.Of.The.JavaScript.Ninja.Dec.2012.ISBN.193398869X.pdf 15M
Mario Casciaro-Node.js Design Patterns-Packt Publishing (2014).pdf 15M
Matthew A. Russell-Mining the social web.pdf 21M
Micha Gorelick, Ian Ozsvald-High Performance Python_ Practical Performant Programming for Humans-O'Reilly.pdf 7.6M
Michael Collins-Network Security Through Data Analysis_ Building Situational Awareness-O'Reilly Media (2014).pdf 13M
Monika Agarwal, Abhinav Singh-Metasploit Penetration Testing Cookbook, Second Edition-Packt Publishing (2013).pdf 6.9M
No.Starch.The.Principles.Of.Object.Oriented.JavaScript.Feb.2014.ISBN.1593275404.pdf 2.6M
OReilly.20.Recipes.For.Programming.PhoneGap.Apr.2012.ISBN.1449319548.pdf 6.4M
OReilly.JavaScript.Testing.With.Jasmine.Apr.2013.ISBN.1449356370.pdf 1.4M
OReilly.Programming.JavaScript.Applications.Jul.2014.ISBN.1491950293.pdf 8.1M
Packt.CoffeeScript.Programming.With.JQuery.Rails.And.Node.JS.Dec.2012.ISBN.1849519587.pdf 4.0M
Packt.Creating.2nd.Edition.Feb.2015.ISBN.1783555114.pdf 4.3M
Packt.Creating.Mobile.Apps.With.JQuery.Mobile.Apr.2013.ISBN.178216006X.pdf 3.9M
Packt.JQuery.Mobile.Cookbook.Nov.2012.ISBN.1849517223.pdf 4.5M
Packt.JQuery.UI.1.8.The.User.Interface.Library.For.JQuery.Aug.2011.ISBN.1849516529.pdf 7.1M
Packt.Kali.Linux.Apr.2014.ISBN.184951948X.pdf 7.8M
Packt.Kali.Linux.CTF.Blueprints.Jul.2014.ISBN.1783985984.pdf 3.5M
Packt.Kali.Linux.Cookbook.Oct.2013.ISBN.1783289597.pdf 11M
Packt.Kali.Linux.Network.Scanning.Cookbook.Aug.2014.ISBN.1783982144.pdf 4.6M
Packt.Kali.Linux.Social.Engineering.Dec.2013.ISBN.1783283270.pdf 3.8M
Packt.Mastering.Kali.Linux.For.Advanced.Penetration.Testing.Jun.2014.ISBN.1782163123.pdf 9.0M
Packt.Mastering.Metasploit.May.2014.ISBN.1782162224.pdf 14M
Packt.Object.Oriented.JavaScript.2nd.Edition.Jul.2013.ISBN.1849693129.pdf 2.1M
Packt.Object.Oriented.JavaScript.Create.Scalable.Reusable.High.Quality.JavaScript.Applications.And.Libraries.pdf 7.2M
Packt.PHP.AJAX.Cookbook.Dec.2011.ISBN.1849513082.pdf 5.5M
Packt.PhoneGap.3.X.Mobile.Application.Development.Hotshot.May.2014.ISBN.1783287926.pdf 5.9M
Packt.Web.Penetration.Testing.With.Kali.Linux.Sep.2013.ISBN.1782163166.pdf 19M
Paulino Calderon Pale-Mastering Nmap Scripting Engine-Packt Publishing (2015).pdf 1.9M
Qing Li, Gregory Clark-Security Intelligence_ A Practitioner's Guide to Solving Enterprise Security Challenges-Wiley.pdf 22M
Recognition and Machine Learning-Springer.pdf 8.1M
Richard Lawson-Web Scraping with Python-Packt Publishing (2015).pdf 5.2M
Ryan Mitchell-Web Scraping with Python_ Collecting Data from the Modern Web-O'Reilly Media (2015).pdf 6.1M
Sam Newman-Building Microservices-O'Reilly Media (2015).pdf 4.8M
SitePoint.JQuery.Novice.To.Ninja.2nd.Edition.Feb.2012.ISBN.0987153013.pdf 16M
Sitepoint.Javascript.Jan.2015.ISBN.0992461251.pdf 4.8M
Steven Bird, Ewan Klein, Edward Loper-Natural Language Processing with Python-O'Reilly Media (2009).pdf 5.2M
Syngress.Advanced.Persistent.Threat.Nov.2012.ISBN.1597499498.pdf 7.1M
The_Art_of_Human_Hacking.pdf 6.1M
The_Hacker_Files_Comic.zip 111M
Usurpation.pdf 478K
Wes McKinney-Python for Data Analysis-O'Reilly Media (2012).pdf 14M
Wiley.The.Shellcoders.Handbook.2nd.Edition.Aug.2007.ISBN.047008023X.pdf 3.6M
Will Gragido, John Pirc-Cybercrime and Espionage_ An Analysis of Subversive Multi-Vector Threats-Syngress (2011).pdf 14M
Windows Server 2012 Inside Out V413HAV.pdf 33M
Yuxing Yan-Python for Finance-Packt Publishing - ebooks Account (2014).pdf 4.8M
Yves Hilpisch-Python for Finance_ Analyze Big Financial Data-O'Reilly Media (2014).pdf 10M
ZenkRoulette 1 CR Pixie CMS.pdf 209K
ZenkRoulette 2 CR PluXml 5.0.1.pdf 223K
ZenkRoulette 3 CR SoftBB 0.1.3.pdf 224K
ZenkRoulette 4 CR Cacti 0.8.7g.pdf 233K
ZenkRoulette 5 CR B2evolution.pdf 233K
ZenkRoulette 6 CR Alex Guestbook Version 5.0.2.pdf 274K
[2002] - HTML & XHTML the definite guide 5 ed.chm 2.5M
[French ebook] hackin9_numero4_juillet-aout-2005.pdf 24M
advance-penetration-testing-kali-linux-training.pdf 35K
advanced-persistent-threat-id52631.pdf 82K
analisi_tecnica_rsi_relative_strentgh_index_significato_formula_intepretazione_tempi_ed_esempi.pdf 399K
b-advanced_persistent_threats_WP_21215957.en-us.pdf 3.0M
blackhat-RDP-hacking-terminal-services.pdf 104K
esg-apts-deep-discovery-whitepaper-en.pdf 482K
hakin9-metasploit-nutshell.pdf 7.4M
wireless_hacking_presentation.pdf 2.2M