.. |
01. Advanced Penetration Testing.pdf
|
Upload files to ""
|
2025-08-08 05:46:21 +00:00 |
02. The Basics of Web Hacking.pdf
|
Upload files to ""
|
2025-08-08 05:46:21 +00:00 |
03. The Basics of Hacking and Penetration Testing.pdf
|
Upload files to ""
|
2025-08-08 05:46:21 +00:00 |
04. The Art of Deception by Kevin Mitnick.pdf
|
Upload files to ""
|
2025-08-08 05:46:21 +00:00 |
05. SQL Injection Attacks and Defense.pdf
|
Upload files to ""
|
2025-08-08 05:46:21 +00:00 |
06. Metasploit - The Penetration Tester's Guide.pdf
|
Upload to pdf
|
2025-08-08 05:48:21 +00:00 |
07. Ethical Hacking and Penetration Testing Guide.pdf
|
Upload to pdf
|
2025-08-08 05:48:21 +00:00 |
08. Network Attacks and Exploitation.pdf
|
Upload to pdf
|
2025-08-08 05:48:21 +00:00 |
09. Python Web Penetration Testing Cookbook.pdf
|
Upload to pdf
|
2025-08-08 05:48:21 +00:00 |
10. Wireshark for Security Professionals.pdf
|
Upload to pdf
|
2025-08-08 05:48:21 +00:00 |
11. Modern Web Penetration Testing.pdf
|
Update pdf
|
2025-08-08 06:02:43 +00:00 |
12. The Shellcoder's Handbook.pdf
|
Update pdf
|
2025-08-08 06:02:43 +00:00 |
13. The Little Black Book of Computer Viruses.pdf
|
Update pdf
|
2025-08-08 06:02:43 +00:00 |
14. XSS Attacks - Cross Site Scripting Exploits and Defense.pdf
|
Update pdf
|
2025-08-08 06:02:43 +00:00 |
15. The Web Application Hacker's Handbook.pdf
|
Update pdf
|
2025-08-08 06:02:43 +00:00 |
16. Ethical Hacking and Countermeasures.pdf
|
Update pdf
|
2025-08-08 06:12:53 +00:00 |
17. Reversing - Secrets of Reverse Engineering.pdf
|
Update pdf
|
2025-08-08 06:12:53 +00:00 |
18. Network Security Bible.pdf
|
Update pdf
|
2025-08-08 06:12:53 +00:00 |
19. Hacking Web Applications - Hacking Exposed.pdf
|
Update pdf
|
2025-08-08 06:12:53 +00:00 |
20. Hacking for Dummies.pdf
|
Update pdf
|
2025-08-08 06:12:53 +00:00 |