cipherstorm/pdf
Hira Barton 15e0262f2c Update pdf
Added PDFs because reading is power, and power corrupts
2025-08-08 06:36:21 +00:00
..
01. Advanced Penetration Testing.pdf Upload files to "" 2025-08-08 05:46:21 +00:00
02. The Basics of Web Hacking.pdf Upload files to "" 2025-08-08 05:46:21 +00:00
03. The Basics of Hacking and Penetration Testing.pdf Upload files to "" 2025-08-08 05:46:21 +00:00
04. The Art of Deception by Kevin Mitnick.pdf Upload files to "" 2025-08-08 05:46:21 +00:00
05. SQL Injection Attacks and Defense.pdf Upload files to "" 2025-08-08 05:46:21 +00:00
06. Metasploit - The Penetration Tester's Guide.pdf Upload to pdf 2025-08-08 05:48:21 +00:00
07. Ethical Hacking and Penetration Testing Guide.pdf Upload to pdf 2025-08-08 05:48:21 +00:00
08. Network Attacks and Exploitation.pdf Upload to pdf 2025-08-08 05:48:21 +00:00
09. Python Web Penetration Testing Cookbook.pdf Upload to pdf 2025-08-08 05:48:21 +00:00
10. Wireshark for Security Professionals.pdf Upload to pdf 2025-08-08 05:48:21 +00:00
11. Modern Web Penetration Testing.pdf Update pdf 2025-08-08 06:02:43 +00:00
12. The Shellcoder's Handbook.pdf Update pdf 2025-08-08 06:02:43 +00:00
13. The Little Black Book of Computer Viruses.pdf Update pdf 2025-08-08 06:02:43 +00:00
14. XSS Attacks - Cross Site Scripting Exploits and Defense.pdf Update pdf 2025-08-08 06:02:43 +00:00
15. The Web Application Hacker's Handbook.pdf Update pdf 2025-08-08 06:02:43 +00:00
16. Ethical Hacking and Countermeasures.pdf Update pdf 2025-08-08 06:12:53 +00:00
17. Reversing - Secrets of Reverse Engineering.pdf Update pdf 2025-08-08 06:12:53 +00:00
18. Network Security Bible.pdf Update pdf 2025-08-08 06:12:53 +00:00
19. Hacking Web Applications - Hacking Exposed.pdf Update pdf 2025-08-08 06:12:53 +00:00
20. Hacking for Dummies.pdf Update pdf 2025-08-08 06:12:53 +00:00
26. Basic Security Testing with Kali Linux.PDF Update pdf 2025-08-08 06:17:06 +00:00
27. Mastering Kali Linux For Advanced Penetration Testing.pdf Update pdf 2025-08-08 06:17:06 +00:00
28. Kali Linux CTF Blueprints.pdf Update pdf 2025-08-08 06:17:06 +00:00
29. Kali Linux Cookbook.pdf Update pdf 2025-08-08 06:17:06 +00:00
30. Kali Linux- Assuring Security by Penetration Testing.pdf Update pdf 2025-08-08 06:17:06 +00:00
31. Information Security Management Handbook.pdf Update pdf 2025-08-08 06:20:50 +00:00
32. Computer.and.Information.Security.Handbook.pdf Update pdf 2025-08-08 06:20:50 +00:00
33. CISSP - Certified Information Systems Security Professional Study Guide.pdf Update pdf 2025-08-08 06:20:50 +00:00
34. Computer Security and Cryptography.pdf Update pdf 2025-08-08 06:20:50 +00:00
35. Python for Kids.pdf Update pdf 2025-08-08 06:20:50 +00:00
36. End to End Network Security - Defense-In-Depth.pdf Update pdf 2025-08-08 06:22:15 +00:00
37. A Guide to Computer Network Security.pdf Update pdf 2025-08-08 06:22:15 +00:00
38. Essential Computer Security.pdf Update pdf 2025-08-08 06:22:15 +00:00
39. Security in Wireless Mesh Networks.pdf Update pdf 2025-08-08 06:22:15 +00:00
40. Hacking Windows XP.pdf Update pdf 2025-08-08 06:22:15 +00:00
41. Hacking Exposed - Windows Security Secrets & Solutions.pdf Update pdf 2025-08-08 06:23:26 +00:00
42. Hacking Exposed - Network Security Secrets & Solutions.pdf Update pdf 2025-08-08 06:23:26 +00:00
43. Information Security - Principles and Practice.pdf Update pdf 2025-08-08 06:23:26 +00:00
44. Nessus, Snort and Ethereal Power Tools.pdf Update pdf 2025-08-08 06:23:26 +00:00
45. Active Defense - A Comprehensive Guide to Network Security.pdf Update pdf 2025-08-08 06:23:26 +00:00
46. Information Security Fundamentals.pdf Update pdf 2025-08-08 06:23:56 +00:00
47. Wireless Network Security.pdf Update pdf 2025-08-08 06:23:56 +00:00
48. Red Hat Linux Security and Optimization.pdf Update pdf 2025-08-08 06:23:56 +00:00
49. Windows Forensics Analysis.pdf Update pdf 2025-08-08 06:23:56 +00:00
50. Mobile and Wireless Network Security and Privacy.pdf Update pdf 2025-08-08 06:23:56 +00:00
51. Firewalls and Internet Security.pdf Update pdf 2025-08-08 06:26:38 +00:00
52. An Introduction To Computer Security - The NIST Handbook.pdf Update pdf 2025-08-08 06:26:38 +00:00
53. Unauthorized Access - Physical Penetration Testing for IT Security Teams.pdf Update pdf 2025-08-08 06:26:38 +00:00
54. Testing Web Security.pdf Update pdf 2025-08-08 06:26:38 +00:00
55. Maximum Security - A Hacker's Guide to Protecting Your Internet Site and Network.pdf Update pdf 2025-08-08 06:26:38 +00:00
56. Information Resource Guide - Computer, Internet and Network Systems Security.pdf Update pdf 2025-08-08 06:26:42 +00:00
57. The Hacker's Underground Handbook.pdf Update pdf 2025-08-08 06:26:42 +00:00
58. Guide to SCADA and Industrial Control Systems Security.pdf Update pdf 2025-08-08 06:26:42 +00:00
59. The International Handbook of Computer Security.pdf Update pdf 2025-08-08 06:26:42 +00:00
60. The Code Book - How to Make It, Break It, Hack It, Crack It.pdf Update pdf 2025-08-08 06:26:42 +00:00
61. Linux 101 Hacks.pdf Update pdf 2025-08-08 06:27:51 +00:00
62. Introduction to Linux - A Hands on Guide.pdf Update pdf 2025-08-08 06:27:51 +00:00
63. Bluetooth Security.pdf Update pdf 2025-08-08 06:27:51 +00:00
64. IT Governance - A Manager's Guide to Data Security and ISO 27001 and 27002.pdf Update pdf 2025-08-08 06:27:51 +00:00
65. Batch File Programming.pdf Update pdf 2025-08-08 06:27:51 +00:00
66. Cracking the Coding Interview.pdf Update pdf 2025-08-08 06:27:47 +00:00
67. Dictionary of Networking.pdf Update pdf 2025-08-08 06:27:47 +00:00
68. Hacking Gmail.pdf Update pdf 2025-08-08 06:27:47 +00:00
69. Linux Complete Command Reference.pdf Update pdf 2025-08-08 06:30:18 +00:00
71. The Art of Intrusion by Kevin Mitnick.pdf Update pdf 2025-08-08 06:32:13 +00:00
72. Hack Notes - Windows Security Portable Reference.pdf Update pdf 2025-08-08 06:32:13 +00:00
73. Hacking - The Next Generation.pdf Update pdf 2025-08-08 06:32:13 +00:00
74. Hacking The Cable Modem.pdf Update pdf 2025-08-08 06:32:13 +00:00
75. Hackers Beware - Defending Your Network From The Wiley Hacker.pdf Update pdf 2025-08-08 06:32:13 +00:00
76. Hack Proofing Your Network.pdf Update pdf 2025-08-08 06:32:29 +00:00
77. Hack Attacks Revealed.pdf Update pdf 2025-08-08 06:32:29 +00:00
78. Dissecting the Hack - The F0rb1dd3n Network.pdf Update pdf 2025-08-08 06:32:29 +00:00
79. The TCP-IP Guide.pdf Update pdf 2025-08-08 06:33:06 +00:00
87. Hacking Exposed - Malware and Rootkits.pdf Update pdf 2025-08-08 06:34:43 +00:00
88. Malware Analyst's Cookbook.pdf Update pdf 2025-08-08 06:34:43 +00:00
89. Mobile Malware - Attacks and Defense.pdf Update pdf 2025-08-08 06:34:43 +00:00
90. Java 2 Network Security.pdf Update pdf 2025-08-08 06:34:43 +00:00
91. A Bug Hunter's Diary.pdf Update pdf 2025-08-08 06:36:21 +00:00
92. Viruses Revealed - Undestand and Counter Malicious Software.pdf Update pdf 2025-08-08 06:36:21 +00:00
93. Digital Forensics With Open Source Tools.pdf Update pdf 2025-08-08 06:36:21 +00:00
94. SSH, The Secure Shell - The Definitive Guide.pdf Update pdf 2025-08-08 06:36:21 +00:00
95. Pro PHP Security.pdf Update pdf 2025-08-08 06:36:21 +00:00
96. Zero Day Exploit - Countdown to Darkness.pdf Update pdf 2025-08-08 06:35:22 +00:00
97. Metasploit Penetration Testing Cookbook.pdf Update pdf 2025-08-08 06:35:22 +00:00