- Modern Web Penetration Testing 2016.pdf
- Metasploit Toolkit – Syngress.pdf
- Metasploit Toolkit – Presentation.pdf
- Metasploit, Penetration Testers Guide.pdf
- Network Attacks and Exploitation.pdf
- Network Performance and Security.pdf
- Bluetooth Hacking.pdf
- Buffer Overflow Attacks.pdf
- Cracking Passwords Guide.pdf
- CEH v9 Certified Ethical Hacker Version 9.pdf
- Fun With EtterCap Filters.pdf
- Hacking Exposed – Linux 3rd Edition.pdf
- KALI-LINUX-COMMANDS.pdf
- Pest Control – Taming the RATS.pdf
- Phishing Dark Waters.pdf
- The Basics of Hacking and Penetration.pdf
- The Basics of Web Hacking – Tools and Techniques to Attack the Web(2013).pdf
- Web App Hacking (Hackers Handbook).pdf
- Web Penetration Testing with Kali Linux.pdf
- Wireshark for Security Professionals 2016.pdf
- Reverse Engineering for Beginners.pdf
- SQL Injection Attacks and Defense.pdf
- Seven Deadliest Network Attacks.pdf
- Seven Deadliest USB Attacks.pdf
- Seven Deadliest Web Application Attacks.pdf
- The Art of Invisibility 2017.pdf
- The 60 Minute Network Security Guide, National Security Agency.pdf
- Honeypots and Routers_ Collecting Internet Attacks.pdf
- Exploiting Format String Vulnerabilities.pdf
- Essential Skills for Hackers.pdf
- Erickson, Jon – Hacking – The Art of Exploitation.pdf
- Eldad Eilam – Reversing: Secrets of Reverse Engineering – Wiley 2005.pdf
- DEFCON-24-Thomas-Wilhelm-Intrusion-Prevention-System-Evasion-Techniques.pdf
- DEFCON-24-Ulf-Frisk-Direct-Memory-Attack-the-Kernel.pdf
- DEFCON-24-Fitzpatrick-and-Grand-101-Ways-To-Brick-Your-Hardware.pdf
- DEFCON-24-Chapman-Stone-Toxic-Proxies-Bypassing-HTTPS-and-VPNs.pdf
- DEFCON-24-Brad-Dixon-Pin2Pwn-How-to-Root-An-Embedded-Linux-Box-With-A-Sewin
- Needle.pdf
- DEFCON-24-Anto-Joseph-Fuzzing-Android-Devices.pdf
- 501 Website Hacking Secrets.pdf
- Advanced Penetration Testing Hacking 2017.pdfA Beginners Guide To Hacking Computer Systems.pdf
- Beginning Ethical Hacking with Python.pdf
- Attacking_the_DNS_Protocol.pdf
- Ethical Hacking and Penetration Testing Guide – Baloch, Rafay.pdf
- OWASP_Stammtisch_Frankfurt_WAF_Profiling_and_Evasion.pdf
- OWASP_Testing_Guide_v4.pdf
- PENETRATION.TESTING.WITH.THE.BASH.SHELL.2014.pdf
- PGP & GPG, E-Mail for the Practical and Paranoid.PDF
- Penetration Tester’s Open Source Toolkit.pdf
- Practical Linux Security Cookbook.pdf
18 Likes
Many thanks for your sharing