Details for this torrent 

Pack14.25 Black Hat & Penetration Testing Edition j3w1
Type:
Other > E-books
Files:
96
Size:
3.27 GiB (3511353210 Bytes)
Tag(s):
black hat hacking networking pentesting
Uploaded:
2018-01-17 02:04:43 GMT
By:
j3w1
Seeders:
0
Leechers:
1
Comments
0  

Info Hash:
4D0D13CC0A3EF46B6A1CCCFA0D2A92B56E13DD9B




(Problems with magnets links are fixed by upgrading your torrent client!)
Enjoy & Seed!

VTC - Advanced Ethical Hacking (2013).zip797.44 MiB
Vulnerability Exploit & website Hacking for Dummies.pdf4.02 MiB
Insider Attack and Cyber Security: Beyond the Hacker.pdf2.47 MiB
Cyber Operations: Building, Defending and Attacking Modern Computer Networks.pdf21.33 MiB
How to Attack and Defend Your Website.pdf23.46 MiB
Seven Deadliest Wireless Technologies Attacks.pdf1.72 MiB
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations.pdf3.73 MiB
Social Engineering Penetration Testing.pdf15.12 MiB
Hacker Highschool: Lesson 7 Attack Analysis.pdf322.94 KiB
Seven Deadliest Microsoft Attacks.pdf2.17 MiB
Wireless Reconnaissance in Penetration Testing.pdf9.74 MiB
Conducting Network Penetration and Espionage in a Global Environment.pdf20.46 MiB
Beginner's Guide to Brute Force & DDoS Attacks.pdf282.71 KiB
Hacker Attack.pdf6.08 MiB
Seven Deadliest Unified Communications Attacks.pdf5.74 MiB
Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation.epub28.54 MiB
Mastering Wireless Penetration Testing for Highly-Secured Environments - Aaron Johns.pdf12.29 MiB
Buffer Overflow Attacks - Detect, Exploit, Prevent.pdf5.39 MiB
Theoretical and Experimental Methods for Defending Against DDoS Attacks.pdf5.1 MiB
Ultimate Guide to Social Enginnering attacks.pdf136.38 KiB
50 Reasons For Mastering Penetration Testing.azw3171.23 KiB
Penetration Testing: A Survival Guide Learning Path.pdf52.87 MiB
Metasploit Extreme on Kali Linux.zip484.05 MiB
Cisco Press - Penetration Testing and Network Defense.pdf12.72 MiB
Mobile Device Exploitation Cookbook: Over 40 recipes to master mobile device penetration testing with open source tools.pdf9.36 MiB
Wireless Network Penetration Testing Advanced Techniques.zip91.91 MiB
SQL Injection attacks and tutorials by Exploit DB.pdf327.69 KiB
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers, and Security Engineers.pdf21.1 MiB
SQL Injection: Attacks and Defense.pdf6.55 MiB
Preventing Digital Extortion: Mitigate ransomware, DDoS, and other cyber-extortion attacks.pdf21.8 MiB
Seven Deadliest USB Attacks.pdf5.18 MiB
Learning Nessus for Penetration Testing.pdf4.38 MiB
Software Test Attacks to Break Mobile and Embedded Devices.pdf19.91 MiB
WiFi hacking article.pdf455.76 KiB
Python Penetration Testing Essentials.pdf3.23 MiB
Digital Forensics and Incident Response: An intelligent way to respond to attacks.azw313.66 MiB
Hack Attacks Testing: How To Conduct Your Own Security Audit.pdf9.56 MiB
Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast.pdf5.54 MiB
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research.pdf4.9 MiB
Penetration Testing with the Bash Shell.pdf25.19 MiB
Smart Grids Security and Privacy Issues.epub1.96 MiB
Securing SQL Server: Protecting Your Database from Attackers 3rd Edition.pdf9.71 MiB
RasPi: Attack of the PI Microrobots - Make a Voice Activated AI - Plus Build pyramids in Minecraft January 2018.pdf8.99 MiB
Client-Side Attacks and Defense.pdf15.02 MiB
Internet Advanced Denial of Service (DDOS) Attack.chm2.06 MiB
Targeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware.pdf5.52 MiB
Penetration Tester's Open Source Toolkit 3rd Edition.pdf16.99 MiB
Penetration Testing with Perl.pdf4.35 MiB
Coding for Penetration Testers: Building Better Tools 2nd Edition.epub9.13 MiB
Unified Communications Forensics: Anatomy of Common UC Attacks.pdf32.39 MiB
Security, Collaboration, and Wireless Network Design for CCDA DESGN (200-310).zip135.78 MiB
Cyber-Physical Attacks: A Growing Invisible Threat.pdf6.65 MiB
Professional Java for Web Applications: Featuring WebSockets, Spring Framework, JPA Hibernate, and Spring Security.pdf41.41 MiB
Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide.pdf7.68 MiB
Python Web Penetration Testing Cookbook.pdf1.76 MiB
Web Hacking: Attacks and Defense.chm6.32 MiB
Website Hacking In Practice Tutorial.zip360.13 MiB
Metasploit: The Penetration Tester's Guide.pdf6.93 MiB
The Official CHFI Exam 312-49 Study Guide for Computer Hacking Forensics Investigators.pdf7.54 MiB
SQL Injection Attack and Defense - Sagar Joshi.pdf401.8 KiB
Intelligent Mechanisms for Network Configuration and Security.pdf4.63 MiB
Mobile Malware Attacks and Defense.pdf9.93 MiB
Future Data and Security Engineering.pdf32.72 MiB
Web Hacking & Penetration testing.pdf9.26 MiB
Coding for Penetration Testers: Building Better Tools.pdf9.88 MiB
Practical Lock Picking: A Physical Penetration Tester's Training Guide.pdf7.9 MiB
Metasploit Penetration Testing Cookbook 2nd Edition.pdf6.89 MiB
VMware vSphere Security Cookbook: Over 75 practical recipes to help you successfully secure your vSphere environment.pdf22.24 MiB
Secure your Node.js Web Application: Keep Attackers Out and Users Happy.pdf6.31 MiB
BackTrack 5 Cookbook: Over 80 recipes to execute many of the best known and little known penetration testing aspects of BackTrack 5.pdf31.96 MiB
Penetration Testing With Backtrack 5.pdf386.78 KiB
Seven Deadliest Web Application Attacks.pdf2.82 MiB
Hack I.T.: Security Through Penetration Testing.pdf12.27 MiB
Professional ASP.NET 3.5 Security, Membership, and Role Management with C# and VB.pdf11.16 MiB
Service Provider CCIE Advanced Technologies Class ISP Security and Common Attacks.pdf129.83 KiB
Nmap Secrets Training Course.zip569.54 MiB
CCNA Security Study Guide Exam 640-553.pdf19.47 MiB
Cyber Attack Survival Manual: Tools for Surviving Everything from Identity heft to the Digital Apocalypse.azw36.45 MiB
Financial Cryptography and Data Security 2017.pdf20.19 MiB
Predicting Security Threats with Splunk: Getting to Know Splunk.epub244.85 KiB
Seven Deadliest Network Attacks.pdf6.97 MiB
Hack Attacks Revealed.pdf8.07 MiB
A Hacker in A Hacker World: Penetrating any kinds of security.azw35.57 MiB
A Practical Guide to TPM 2.0: Using the New Trusted Platform Module in the New Age of Security.pdf5.09 MiB
Wireless Hacking: Projects for Wi-Fi Enthusiasts.pdf18.31 MiB
Seven Deadliest Social Network Attacks.pdf5.35 MiB
Spring Security 3.1.pdf6.34 MiB
White Hat Hacking complete guide to XSS Attacks .pdf884.7 KiB
Underground Tales of Hacking: Madness and Obsession on the Electronic Frontier.epub1.08 MiB
Penetration Testing with BackBox.pdf3.53 MiB
XSS Attacks Cross Site Scripting Exploits and Defense.pdf7.34 MiB
hacking tutorials.zip1.54 MiB
SILENCE ON THE WIRE A Field Guide to Passive Reconnaissance and Indirect Attacks.pdf5.86 MiB
Keys to the Kingdom: Impressioning, Bumping, Master Escalation, and Other Key-Based Attacks Against Physical Locks.pdf27.12 MiB
Managing Risk and Information Security: Protect to Enable 2nd Edition.pdf11.34 MiB
Implementing Cisco IOS Network Security IINS CCNA Security Exam 640-553 Authorized Self-Study Guide.pdf10.87 MiB