Monday, April 20, 2020

elearn

https://www.0daydown.com/04/1279743.html
https://www.downturk.net/2867173-elearnsecurity-practical-web-defense.html
Person
https://mega.nz/folder/VFEzTQhL#MbL40EgnL5rnrlFI0uOGOg
Cyber Tranning 365
https://mega.nz/folder/HGg2TCTA#CjyPNP3bktKV9w4_g2xUDg/folder/CKgShAjA
CEH  v10
https://mega.nz/folder/9QYkRCgC#qvSOMae3mHs_ykZBBbOLDg/folder/oBg3mCrC
PWN v1
https://mega.nz/folder/7qQwCIID#m2C7XUPS1URuqhgWKwrm5A
==========
https://mega.nz/folder/MUMHkQLQ#-Bfcyj8W595D4CcgLCCs4w

https://anonfile.com/Z241b3k1o6/PWK_2020_v2_7z

OSCP
https://mega.nz/folder/bApXQJpK#uGQfXbrQzh7XV8Bh5OPyog

=============
magnet:?xt=urn:btih:236D55D6F80A87728BDE8EF59B1D85C81F232BFF&dn=%5B+FreeCourseWeb+%5D+Penetration+Testing+With+Kali+Linux+PWK+2020&tr=udp%3A%2F%2Ftracker.coppersurfer.tk%3A6969%2Fannounce;tr=udp%3A%2F%2Fexplodie.org%3A6969%2Fannounce;tr=udp%3A%2F%2Fthetracker.org%3A80%2Fannounce;tr=udp%3A%2F%2Ftracker.torrent.eu.org%3A451%2Fannounce;tr=udp%3A%2F%2Fretracker.lanta-net.ru%3A2710%2Fannounce;tr=udp%3A%2F%2Fopen.demonii.si%3A1337%2Fannounce;tr=udp%3A%2F%2Fdenis.stalker.upeer.me%3A6969%2Fannounce;tr=udp%3A%2F%2Ftracker.iamhansen.xyz%3A2000%2Fannounce;tr=udp%3A%2F%2Ftorrentclub.tech%3A6969%2Fannounce;tr=udp%3A%2F%2Ftracker.filemail.com%3A6969%2Fannounce;tr=udp%3A%2F%2Ftracker.filepit.to%3A6969%2Fannounce;tr=udp%3A%2F%2Ftracker.moeking.me%3A6969%2Fannounce;tr=udp%3A%2F%2Ftracker.nyaa.uk%3A6969%2Fannounce;tr=udp%3A%2F%2Fretracker.netbynet.ru%3A2710%2Fannounce;tr=udp%3A%2F%2Ftracker.supertracker.net%3A1337%2Fannounce  

Wednesday, April 1, 2020

Book for Hacking and Coding

- [Matt-Walker]-Certified-Ethical-Hacker-Exam-Guide
- How to Hack Like a Pornstar
- Hacker Playbook
- Hacker Playbook -2
- Hacker Playbook -3

- Metasploit – The Penetration Tester′s Guide
- Penetration Testing: A Hands-On Introduction to Hacking
- Red Team Development and Operations A Practical Guide 
- Computer Hacking Forensic Investigator (CHFI)
- Richard Blum - Professional Assembly Language (2005, Wrox)

- Reversing secrets of reverse engineering by Eldad Eilam
- The Red Team Guide by Peerlyst
- Monnappa K A - Learning Malware Analysis_ Explore the concepts, tools, and 
  techniques to analyze and investigate Windows malware-Packt Publishing (2018)
- Computer-Networking-A-Top-Down-Approach-7th-Edition

- Thomas Wilhelm - Professional Penetration Testing_ Creating and Operating a
   Formal Hacking Lab (2009)
64-ia-32-architectures-software-developer-vol-1-manual
- Unleashing the Ideavirus by Seth Godin, Malcolm Gladwell
- Michal Jaworski, Tarek Ziade - Expert Python Programming (2019, Packt 
  Publishing)
-ubuntu and Centos linux server administration by MD. Tanvir Rahman

- Extreme C Taking you to the limit in Concurrency, OOP, and the most advanced 
  capabilities of C by Kamran Amini
 - First Course in Algorithms Through Puzzles by Ryuhei Uehara
- Introduction to algorithms by Thomas H. Cormen, Charles E. Leiserson, Ronald
  L. Rivest, Clifford Stein
- C++ A Beginners Guide, Second Edition by Herbert Schildt
- Foundations of Game Engine Development, Volume 1 Mathematics by Eric
  Lengyel

- Unity 2D Game Development by Dave Calabrese
- Sets, logic and maths for computing by David Makinson (auth.)
- Mathematics for Game Developers
- Computer-Science-Distilled
- Data Structures and Algorithms - Narasimha Karumanchi

- Practical Malware Analysis
- Hacking the art of exploitation
- The C Programming Language by Brian W. Kernighan, Dennis M. Ritchie
- The Shellcoder's Handbook Discovering and Exploiting Security Holes
- Penetration Testing Shellcode. Detect, exploit, and secure network-level and operating system vulnerabilities by Hamza Megahed

- Python for Offensive PenTest by Hussam Khrais
- How to Hack Computers how to hack computers, hacking for beginners, penetration testing, hacking for dummies, computer security, computer hacking, hacking techniques, network scanning by Tope, Joel (z-lib.org)
- lpic1
- Mastering Reverse Engineering 1st Edition
- Cyber Operations Building, Defending, and Attacking 2nd Edition

- UNIX and Linux System Administration Handbook
- CPENT - Certified Penetration Testing Professional
- Mastering Linux Administration A comprehensive guide to installing
- Attacking Network Protocols_ A Hacker’s Guide to Capture, Analysis, and Exploitation
- The Pentester BluePrint Starting a Career as an Ethical_Hacker

- Linux System Programming Techniques - Become a proficient Linux system programmer using expert recipes and techniques by Jack-Benny Persson
- Learn C the Hard Way Practical Exercises on the Computational Subjects You Keep Avoiding (Till lesson 30)
- CEH v11[2020]
- SEC 552 (Bug Bounties and responsible disclosure)[2021]
- Learn Python 3 the Hard Way A Very Simple Introduction to the Terrifyingly Beautiful World of Computers and Code by Zed A. Shaw

- The Official Radare 2 Book
- Notsosecure - Advanced Web Hacking
- Python Tricks A Buffet of Awesome Python Features
-
-

-
-
-
-
-

-
-
-
-
-
-
-
-
-
-

-
-
-
-
-

-
-
-
-
-

-
-
-
-
-

-
-
-
-
-

-
-
-
-
-
-
-
-
-
-

-
-
-
-
-

-
-
-
-
-