pack14.25
File List
- VTC - Advanced Ethical Hacking (2013).zip 797.4 MB
- Nmap Secrets Training Course.zip 569.5 MB
- Metasploit Extreme on Kali Linux.zip 484.0 MB
- Website Hacking In Practice Tutorial.zip 360.1 MB
- Security, Collaboration, and Wireless Network Design for CCDA DESGN (200-310).zip 135.8 MB
- Wireless Network Penetration Testing Advanced Techniques.zip 91.9 MB
- Penetration Testing: A Survival Guide Learning Path.pdf 52.9 MB
- Professional Java for Web Applications: Featuring WebSockets, Spring Framework, JPA Hibernate, and Spring Security.pdf 41.4 MB
- Future Data and Security Engineering.pdf 32.7 MB
- Unified Communications Forensics: Anatomy of Common UC Attacks.pdf 32.4 MB
- BackTrack 5 Cookbook: Over 80 recipes to execute many of the best known and little known penetration testing aspects of BackTrack 5.pdf 32.0 MB
- Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation.epub 28.5 MB
- Keys to the Kingdom: Impressioning, Bumping, Master Escalation, and Other Key-Based Attacks Against Physical Locks.pdf 27.1 MB
- Penetration Testing with the Bash Shell.pdf 25.2 MB
- How to Attack and Defend Your Website.pdf 23.5 MB
- VMware vSphere Security Cookbook: Over 75 practical recipes to help you successfully secure your vSphere environment.pdf 22.2 MB
- Preventing Digital Extortion: Mitigate ransomware, DDoS, and other cyber-extortion attacks.pdf 21.8 MB
- Cyber Operations: Building, Defending and Attacking Modern Computer Networks.pdf 21.3 MB
- Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers, and Security Engineers.pdf 21.1 MB
- Conducting Network Penetration and Espionage in a Global Environment.pdf 20.5 MB
- Financial Cryptography and Data Security 2017.pdf 20.2 MB
- Software Test Attacks to Break Mobile and Embedded Devices.pdf 19.9 MB
- CCNA Security Study Guide Exam 640-553.pdf 19.5 MB
- Wireless Hacking: Projects for Wi-Fi Enthusiasts.pdf 18.3 MB
- Penetration Tester's Open Source Toolkit 3rd Edition.pdf 17.0 MB
- Social Engineering Penetration Testing.pdf 15.1 MB
- Client-Side Attacks and Defense.pdf 15.0 MB
- Digital Forensics and Incident Response: An intelligent way to respond to attacks.azw3 13.7 MB
- Cisco Press - Penetration Testing and Network Defense.pdf 12.7 MB
- Mastering Wireless Penetration Testing for Highly-Secured Environments - Aaron Johns.pdf 12.3 MB
- Hack I.T.: Security Through Penetration Testing.pdf 12.3 MB
- Managing Risk and Information Security: Protect to Enable 2nd Edition.pdf 11.3 MB
- Professional ASP.NET 3.5 Security, Membership, and Role Management with C# and VB.pdf 11.2 MB
- Implementing Cisco IOS Network Security IINS CCNA Security Exam 640-553 Authorized Self-Study Guide.pdf 10.9 MB
- Mobile Malware Attacks and Defense.pdf 9.9 MB
- Coding for Penetration Testers: Building Better Tools.pdf 9.9 MB
- Wireless Reconnaissance in Penetration Testing.pdf 9.7 MB
- Securing SQL Server: Protecting Your Database from Attackers 3rd Edition.pdf 9.7 MB
- Hack Attacks Testing: How To Conduct Your Own Security Audit.pdf 9.6 MB
- Mobile Device Exploitation Cookbook: Over 40 recipes to master mobile device penetration testing with open source tools.pdf 9.4 MB
- Web Hacking & Penetration testing.pdf 9.3 MB
- Coding for Penetration Testers: Building Better Tools 2nd Edition.epub 9.1 MB
- RasPi: Attack of the PI Microrobots - Make a Voice Activated AI - Plus Build pyramids in Minecraft January 2018.pdf 9.0 MB
- Hack Attacks Revealed.pdf 8.1 MB
- Practical Lock Picking: A Physical Penetration Tester's Training Guide.pdf 7.9 MB
- Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide.pdf 7.7 MB
- The Official CHFI Exam 312-49 Study Guide for Computer Hacking Forensics Investigators.pdf 7.5 MB
- XSS Attacks Cross Site Scripting Exploits and Defense.pdf 7.3 MB
- Seven Deadliest Network Attacks.pdf 7.0 MB
- Metasploit: The Penetration Tester's Guide.pdf 6.9 MB
- Metasploit Penetration Testing Cookbook 2nd Edition.pdf 6.9 MB
- Cyber-Physical Attacks: A Growing Invisible Threat.pdf 6.7 MB
- SQL Injection: Attacks and Defense.pdf 6.5 MB
- Cyber Attack Survival Manual: Tools for Surviving Everything from Identity heft to the Digital Apocalypse.azw3 6.4 MB
- Spring Security 3.1.pdf 6.3 MB
- Web Hacking: Attacks and Defense.chm 6.3 MB
- Secure your Node.js Web Application: Keep Attackers Out and Users Happy.pdf 6.3 MB
- Hacker Attack.pdf 6.1 MB
- SILENCE ON THE WIRE A Field Guide to Passive Reconnaissance and Indirect Attacks.pdf 5.9 MB
- Seven Deadliest Unified Communications Attacks.pdf 5.7 MB
- A Hacker in A Hacker World: Penetrating any kinds of security.azw3 5.6 MB
- Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast.pdf 5.5 MB
- Targeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware.pdf 5.5 MB
- Buffer Overflow Attacks - Detect, Exploit, Prevent.pdf 5.4 MB
- Seven Deadliest Social Network Attacks.pdf 5.4 MB
- Seven Deadliest USB Attacks.pdf 5.2 MB
- Theoretical and Experimental Methods for Defending Against DDoS Attacks.pdf 5.1 MB
- A Practical Guide to TPM 2.0: Using the New Trusted Platform Module in the New Age of Security.pdf 5.1 MB
- Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research.pdf 4.9 MB
- Intelligent Mechanisms for Network Configuration and Security.pdf 4.6 MB
- Learning Nessus for Penetration Testing.pdf 4.4 MB
- Penetration Testing with Perl.pdf 4.4 MB
- Vulnerability Exploit & website Hacking for Dummies.pdf 4.0 MB
- Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations.pdf 3.7 MB
- Penetration Testing with BackBox.pdf 3.5 MB
- Python Penetration Testing Essentials.pdf 3.2 MB
- Seven Deadliest Web Application Attacks.pdf 2.8 MB
- Insider Attack and Cyber Security: Beyond the Hacker.pdf 2.5 MB
- Seven Deadliest Microsoft Attacks.pdf 2.2 MB
- Internet Advanced Denial of Service (DDOS) Attack.chm 2.1 MB
- Smart Grids Security and Privacy Issues.epub 2.0 MB
- Python Web Penetration Testing Cookbook.pdf 1.8 MB
- Seven Deadliest Wireless Technologies Attacks.pdf 1.7 MB
- hacking tutorials.zip 1.5 MB
- Underground Tales of Hacking: Madness and Obsession on the Electronic Frontier.epub 1.1 MB
- White Hat Hacking complete guide to XSS Attacks .pdf 884.7 KB
- WiFi hacking article.pdf 455.8 KB
- SQL Injection Attack and Defense - Sagar Joshi.pdf 401.8 KB
- Penetration Testing With Backtrack 5.pdf 386.8 KB
- SQL Injection attacks and tutorials by Exploit DB.pdf 327.7 KB
- Hacker Highschool: Lesson 7 Attack Analysis.pdf 322.9 KB
- Beginner's Guide to Brute Force & DDoS Attacks.pdf 282.7 KB
- Predicting Security Threats with Splunk: Getting to Know Splunk.epub 244.9 KB
- 50 Reasons For Mastering Penetration Testing.azw3 171.2 KB
- Ultimate Guide to Social Enginnering attacks.pdf 136.4 KB
- Service Provider CCIE Advanced Technologies Class ISP Security and Common Attacks.pdf 129.8 KB
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.