Details for:

Type:
Files:
Size:

Uploaded On:
Added By:
Not Trusted

Seeders:
Leechers:
Info Hash:
4D0D13CC0A3EF46B6A1CCCFA0D2A92B56E13DD9B
  1. VTC - Advanced Ethical Hacking (2013).zip 797.4 MB
  2. Vulnerability Exploit & website Hacking for Dummies.pdf 4.0 MB
  3. Insider Attack and Cyber Security: Beyond the Hacker.pdf 2.5 MB
  4. Cyber Operations: Building, Defending and Attacking Modern Computer Networks.pdf 21.3 MB
  5. How to Attack and Defend Your Website.pdf 23.5 MB
  6. Seven Deadliest Wireless Technologies Attacks.pdf 1.7 MB
  7. Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations.pdf 3.7 MB
  8. Social Engineering Penetration Testing.pdf 15.1 MB
  9. Hacker Highschool: Lesson 7 Attack Analysis.pdf 322.9 KB
  10. Seven Deadliest Microsoft Attacks.pdf 2.2 MB
  11. Wireless Reconnaissance in Penetration Testing.pdf 9.7 MB
  12. Conducting Network Penetration and Espionage in a Global Environment.pdf 20.5 MB
  13. Beginner's Guide to Brute Force & DDoS Attacks.pdf 282.7 KB
  14. Hacker Attack.pdf 6.1 MB
  15. Seven Deadliest Unified Communications Attacks.pdf 5.7 MB
  16. Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation.epub 28.5 MB
  17. Mastering Wireless Penetration Testing for Highly-Secured Environments - Aaron Johns.pdf 12.3 MB
  18. Buffer Overflow Attacks - Detect, Exploit, Prevent.pdf 5.4 MB
  19. Theoretical and Experimental Methods for Defending Against DDoS Attacks.pdf 5.1 MB
  20. Ultimate Guide to Social Enginnering attacks.pdf 136.4 KB
  21. 50 Reasons For Mastering Penetration Testing.azw3 171.2 KB
  22. Penetration Testing: A Survival Guide Learning Path.pdf 52.9 MB
  23. Metasploit Extreme on Kali Linux.zip 484.0 MB
  24. Cisco Press - Penetration Testing and Network Defense.pdf 12.7 MB
  25. Mobile Device Exploitation Cookbook: Over 40 recipes to master mobile device penetration testing with open source tools.pdf 9.4 MB
  26. Wireless Network Penetration Testing Advanced Techniques.zip 91.9 MB
  27. SQL Injection attacks and tutorials by Exploit DB.pdf 327.7 KB
  28. Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers, and Security Engineers.pdf 21.1 MB
  29. SQL Injection: Attacks and Defense.pdf 6.5 MB
  30. Preventing Digital Extortion: Mitigate ransomware, DDoS, and other cyber-extortion attacks.pdf 21.8 MB
  31. Seven Deadliest USB Attacks.pdf 5.2 MB
  32. Learning Nessus for Penetration Testing.pdf 4.4 MB
  33. Software Test Attacks to Break Mobile and Embedded Devices.pdf 19.9 MB
  34. WiFi hacking article.pdf 455.8 KB
  35. Python Penetration Testing Essentials.pdf 3.2 MB
  36. Digital Forensics and Incident Response: An intelligent way to respond to attacks.azw3 13.7 MB
  37. Hack Attacks Testing: How To Conduct Your Own Security Audit.pdf 9.6 MB
  38. Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast.pdf 5.5 MB
  39. Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research.pdf 4.9 MB
  40. Penetration Testing with the Bash Shell.pdf 25.2 MB
  41. Smart Grids Security and Privacy Issues.epub 2.0 MB
  42. Securing SQL Server: Protecting Your Database from Attackers 3rd Edition.pdf 9.7 MB
  43. RasPi: Attack of the PI Microrobots - Make a Voice Activated AI - Plus Build pyramids in Minecraft January 2018.pdf 9.0 MB
  44. Client-Side Attacks and Defense.pdf 15.0 MB
  45. Internet Advanced Denial of Service (DDOS) Attack.chm 2.1 MB
  46. Targeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware.pdf 5.5 MB
  47. Penetration Tester's Open Source Toolkit 3rd Edition.pdf 17.0 MB
  48. Penetration Testing with Perl.pdf 4.4 MB
  49. Coding for Penetration Testers: Building Better Tools 2nd Edition.epub 9.1 MB
  50. Unified Communications Forensics: Anatomy of Common UC Attacks.pdf 32.4 MB
  51. Security, Collaboration, and Wireless Network Design for CCDA DESGN (200-310).zip 135.8 MB
  52. Cyber-Physical Attacks: A Growing Invisible Threat.pdf 6.7 MB
  53. Professional Java for Web Applications: Featuring WebSockets, Spring Framework, JPA Hibernate, and Spring Security.pdf 41.4 MB
  54. Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide.pdf 7.7 MB
  55. Python Web Penetration Testing Cookbook.pdf 1.8 MB
  56. Web Hacking: Attacks and Defense.chm 6.3 MB
  57. Website Hacking In Practice Tutorial.zip 360.1 MB
  58. Metasploit: The Penetration Tester's Guide.pdf 6.9 MB
  59. The Official CHFI Exam 312-49 Study Guide for Computer Hacking Forensics Investigators.pdf 7.5 MB
  60. SQL Injection Attack and Defense - Sagar Joshi.pdf 401.8 KB
  61. Intelligent Mechanisms for Network Configuration and Security.pdf 4.6 MB
  62. Mobile Malware Attacks and Defense.pdf 9.9 MB
  63. Future Data and Security Engineering.pdf 32.7 MB
  64. Web Hacking & Penetration testing.pdf 9.3 MB
  65. Coding for Penetration Testers: Building Better Tools.pdf 9.9 MB
  66. Practical Lock Picking: A Physical Penetration Tester's Training Guide.pdf 7.9 MB
  67. Metasploit Penetration Testing Cookbook 2nd Edition.pdf 6.9 MB
  68. VMware vSphere Security Cookbook: Over 75 practical recipes to help you successfully secure your vSphere environment.pdf 22.2 MB
  69. Secure your Node.js Web Application: Keep Attackers Out and Users Happy.pdf 6.3 MB
  70. BackTrack 5 Cookbook: Over 80 recipes to execute many of the best known and little known penetration testing aspects of BackTrack 5.pdf 32.0 MB
  71. Penetration Testing With Backtrack 5.pdf 386.8 KB
  72. Seven Deadliest Web Application Attacks.pdf 2.8 MB
  73. Hack I.T.: Security Through Penetration Testing.pdf 12.3 MB
  74. Professional ASP.NET 3.5 Security, Membership, and Role Management with C# and VB.pdf 11.2 MB
  75. Service Provider CCIE Advanced Technologies Class ISP Security and Common Attacks.pdf 129.8 KB
  76. Nmap Secrets Training Course.zip 569.5 MB
  77. CCNA Security Study Guide Exam 640-553.pdf 19.5 MB
  78. Cyber Attack Survival Manual: Tools for Surviving Everything from Identity heft to the Digital Apocalypse.azw3 6.4 MB
  79. Financial Cryptography and Data Security 2017.pdf 20.2 MB
  80. Predicting Security Threats with Splunk: Getting to Know Splunk.epub 244.9 KB
  81. Seven Deadliest Network Attacks.pdf 7.0 MB
  82. Hack Attacks Revealed.pdf 8.1 MB
  83. A Hacker in A Hacker World: Penetrating any kinds of security.azw3 5.6 MB
  84. A Practical Guide to TPM 2.0: Using the New Trusted Platform Module in the New Age of Security.pdf 5.1 MB
  85. Wireless Hacking: Projects for Wi-Fi Enthusiasts.pdf 18.3 MB
  86. Seven Deadliest Social Network Attacks.pdf 5.4 MB
  87. Spring Security 3.1.pdf 6.3 MB
  88. White Hat Hacking complete guide to XSS Attacks .pdf 884.7 KB
  89. Underground Tales of Hacking: Madness and Obsession on the Electronic Frontier.epub 1.1 MB
  90. Penetration Testing with BackBox.pdf 3.5 MB
  91. XSS Attacks Cross Site Scripting Exploits and Defense.pdf 7.3 MB
  92. hacking tutorials.zip 1.5 MB
  93. SILENCE ON THE WIRE A Field Guide to Passive Reconnaissance and Indirect Attacks.pdf 5.9 MB
  94. Keys to the Kingdom: Impressioning, Bumping, Master Escalation, and Other Key-Based Attacks Against Physical Locks.pdf 27.1 MB
  95. Managing Risk and Information Security: Protect to Enable 2nd Edition.pdf 11.3 MB
  96. Implementing Cisco IOS Network Security IINS CCNA Security Exam 640-553 Authorized Self-Study Guide.pdf 10.9 MB