Index of /files/Technology/Sec Library/


../
Deviance's Material-O-Many (Sync'd)/               30-Nov-2023 10:57       -
Network_and_Security_Certification_Book_Bundle ..> 30-Nov-2023 10:57       -
cryp70b34rd's books directory/                     30-Nov-2023 10:44       -
(CS6823) Cryptography Engineering.pdf              30-Nov-2023 10:42      9M
24-DEADLY-SINS-OF-SOFTWARE-SECURITY-2010.pdf       30-Nov-2023 10:42      3M
Abusing the Internet of Things_ Blackouts, Frea..> 30-Nov-2023 10:42     42M
Advanced Penetration Testing for Highly Secured..> 30-Nov-2023 10:42     15M
Advanced Penetration Testing.pdf                   30-Nov-2023 10:42     10M
Advanced Persistent Threat Hacking, The Art & S..> 30-Nov-2023 10:42     11M
Android_Security_Intern__An_In-Depth_Guide_to_A..> 30-Nov-2023 10:42      8M
Art of Memory Forensics.pdf                        30-Nov-2023 10:42     14M
Assembly Language Step-By-Step - Programming wi..> 30-Nov-2023 10:42      6M
Assembly Language for x86 Processors.pdf           30-Nov-2023 10:42      3M
Attacking Network Protocols_-A-James-Forshaw.pdf   30-Nov-2023 10:42     11M
Automate_the_Boring_Stuff_with_Python_Pr.pdf       30-Nov-2023 10:42      7M
Bug Hunter_s Diary.pdf                             30-Nov-2023 10:42      6M
Building Virtual Pentesting Labs for Advanced P..> 30-Nov-2023 10:42     34M
C Programming Lanuguage.pdf                        30-Nov-2023 10:42     23M
CCNA Certification - All-In-One.pdf                30-Nov-2023 10:42     14M
CEH V9_ Certified Ethical Hacker Version 9 Stud..> 30-Nov-2023 10:42      9M
Computer Forensics with FTK.pdf                    30-Nov-2023 10:42      5M
Computer Networking - A Top-Down Approach.pdf      30-Nov-2023 10:42      9M
Designing BSD Rootkits.pdf                         30-Nov-2023 10:42      9M
Foundations of Python Network Programming (3rd ..> 30-Nov-2023 10:42      4M
From Hacking to Report Writing.pdf                 30-Nov-2023 10:42     12M
Game Hacking.pdf                                   30-Nov-2023 10:42      7M
Google Hacking for Penetration Testers - Johnny..> 30-Nov-2023 10:42     37M
Gray Hat C#.pdf                                    30-Nov-2023 10:42     13M
Gray Hat Hacking The Ethical Hacker's Handbook,..> 30-Nov-2023 10:42     32M
Gray Hat Python.pdf                                30-Nov-2023 10:42      3M
H1_Vuln_List.pdf                                   30-Nov-2023 10:42      1M
HTTP The Definitive Guide.pdf                      30-Nov-2023 10:42      5M
Hacker Playbook 3.pdf                              30-Nov-2023 10:42      9M
Hacking Android.pdf                                30-Nov-2023 10:42     11M
Hacking Web Apps.pdf                               30-Nov-2023 10:42     22M
Hacking Web Intelligence_ Open Source Intellige..> 30-Nov-2023 10:42     36M
Hacking the Xbox.pdf                               30-Nov-2023 10:42     24M
Hacking_The_Art_Of_Exploitation_2nd_Edition.pdf    30-Nov-2023 10:42      5M
IPv6 Fundamentals - A Straightforward Approach.pdf 30-Nov-2023 10:42      6M
IT Disaster Response.pdf                           30-Nov-2023 10:42      1M
Insider-Threat-Program-eBook.pdf                   30-Nov-2023 10:42      8M
Kali Linux CTF Blueprints.pdf                      30-Nov-2023 10:42      4M
Kali-Linux-Revealed-1st-edition.pdf                30-Nov-2023 10:42     10M
Kali_Linux_Cookbook.pdf                            30-Nov-2023 10:42     10M
Kevin_Mitnick - The Art of Invisibility 2017.pdf   30-Nov-2023 10:42      1M
Kevin_Mitnick -.The.Art.of.Intrusion.The.Real.S..> 30-Nov-2023 10:42      3M
Kevin_Mitnick_-_The_Art_of_Deception_(Plus_Bann..> 30-Nov-2023 10:42      1M
Learning Linux Binary Analysis.pdf                 30-Nov-2023 10:42     14M
Learning_PHP__MySQL___JavaScript_With_jQuery__C..> 30-Nov-2023 10:42     11M
Linux Shell Scripting Cookbook.pdf                 30-Nov-2023 10:42      3M
Malware Analyst's Cookbook.pdf                     30-Nov-2023 10:42     19M
Metasploit-The Penetration Tester s Guide.pdf      30-Nov-2023 10:42      7M
NLP_ Neuro linguistic programming, the essentia..> 30-Nov-2023 10:42      2M
Network Forensics 2012.1.pdf                       30-Nov-2023 10:42     17M
Network Security Monitoring.pdf                    30-Nov-2023 10:42     18M
Networking All-In-One for Dummies - Doug Lowe.pdf  30-Nov-2023 10:42     30M
OpenVPN Cookbook, 2nd Edition.pdf                  30-Nov-2023 10:42     10M
Operating Systems.pdf                              30-Nov-2023 10:42      9M
PGP and GPG Email for the Practical Paranoid.pdf   30-Nov-2023 10:42      3M
Penetration Testing A Hands-On Introduction to ..> 30-Nov-2023 10:42     12M
PoC or GTFO.pdf                                    30-Nov-2023 10:43     51M
Practical Reverse Engineering_ X86, X64, ARM, W..> 30-Nov-2023 10:42      5M
Practical_Malware_Analysis.pdf                     30-Nov-2023 10:42      9M
Python for Hackers.pdf                             30-Nov-2023 10:42      3M
Red Team How to Succeed by Thinking Like The En..> 30-Nov-2023 10:42      2M
Securing Scada Systems.pdf                         30-Nov-2023 10:42      4M
Serious Cryptography A Practical Introduction t..> 30-Nov-2023 10:42      5M
Silence on the Wire.pdf                            30-Nov-2023 10:43      6M
Steal This Computer Book 4.0.pdf                   30-Nov-2023 10:43     19M
The Car Hacker’s Handbook.pdf                    30-Nov-2023 10:43     12M
The Linux Command Line.pdf                         30-Nov-2023 10:43      9M
The Tangled Web - A Guide to Securing Modern We..> 30-Nov-2023 10:43      4M
The Web App. Hacker's Hbk. - Finding, Exploitin..> 30-Nov-2023 10:43     14M
The_Art_of_Human_Hacking.pdf                       30-Nov-2023 10:43      6M
Violent Python - A Cookbook for Hackers, Forens..> 30-Nov-2023 10:43     21M
Web Scraping with Python.pdf                       30-Nov-2023 10:43      6M
Wicked cool Shell Scripts.pdf                      30-Nov-2023 10:43     12M
Windows Group Policy Troubleshooting.pdf           30-Nov-2023 10:43     15M
Windows Server 2012 R2 Pocket Consultant.pdf       30-Nov-2023 10:43      7M
Wireshark for Security Professionals.pdf           30-Nov-2023 10:43     15M
iOS Application Security.pdf                       30-Nov-2023 10:42     16M
malwaredatascience.pdf                             30-Nov-2023 10:42      8M
nmap_network_scanning.pdf                          30-Nov-2023 10:42     55M
rtfm-red-team-field-manual.pdf                     30-Nov-2023 10:42      3M
shellcoders_handbook_discovering_and_exploiting..> 30-Nov-2023 10:43      3M
threat_modeling_designing_for_security.pdf         30-Nov-2023 10:43     22M