01. Advanced Penetration Testing
01. Advanced Penetration Testing
02. The Basics of Web Hacking
02. The Basics of Web Hacking
03. The Basics of Hacking and Penetration Testing
03. The Basics of Hacking and Penetration Testing
04. The Art of Deception by Kevin Mitnick
04. The Art of Deception by Kevin Mitnick
05. SQL Injection Attacks and Defense
05. SQL Injection Attacks and Defense
07. Ethical Hacking and Penetration Testing Guide
07. Ethical Hacking and Penetration Testing Guide
08. Network Attacks and Exploitation
08. Network Attacks and Exploitation
10. Wireshark for Security Professionals
10. Wireshark for Security Professionals
12. The Shellcoder's Handbook
12. The Shellcoder's Handbook
14. XSS Attacks - Cross Site Scripting Exploits and Defense
14. XSS Attacks - Cross Site Scripting Exploits and Defense
17. Reversing - Secrets of Reverse Engineering
17. Reversing - Secrets of Reverse Engineering
20. Hacking for Dummies
20. Hacking for Dummies
63. Bluetooth Security
63. Bluetooth Security
79. The TCP-IP Guide
79. The TCP-IP Guide
84. Network Forensics - Tracking Hackers Through Cyberspace
84. Network Forensics - Tracking Hackers Through Cyberspace
2022_Book_ProceedingsOfDataAnalyticsAndM
2022_Book_ProceedingsOfDataAnalyticsAndM
absoluteopenbsd
absoluteopenbsd
androidsecurityinternals
androidsecurityinternals
arduino-workshop-a-hands-on-Introduction
arduino-workshop-a-hands-on-Introduction
Automate the Boring Stuff with Python
Automate the Boring Stuff with Python
BeginnersGuide-4thEd-Eng_v2
BeginnersGuide-4thEd-Eng_v2
bookofpf_ano-nonsenseguidetotheopenbsdfirewall
bookofpf_ano-nonsenseguidetotheopenbsdfirewall
gamehacking
gamehacking
Hacking Hacking Practical Guide for Beginners (Hacking With Python) - PDF Room
Hacking Hacking Practical Guide for Beginners (Hacking With Python) - PDF Room
hacking_artofexploitation_2ndedition
hacking_artofexploitation_2ndedition
hackspace-get-started-with-micropython-on-pico-01-202101
hackspace-get-started-with-micropython-on-pico-01-202101
Hands-On-Machine-Learning-with-Scikit-Learn-Keras-and-Tensorflow_-Concepts-Tools-and-Techniques-to-Build-Intelligent-Systems-O’Reilly-Media-2019
Hands-On-Machine-Learning-with-Scikit-Learn-Keras-and-Tensorflow_-Concepts-Tools-and-Techniques-to-Build-Intelligent-Systems-O’Reilly-Media-2019
iosapplicationsecurity
iosapplicationsecurity
Linux Basics for Hackers - PDF Room
Linux Basics for Hackers - PDF Room
metasploit_apenetrationtestersguide
metasploit_apenetrationtestersguide
penetrationtesting
penetrationtesting
practicalforensicimaging
practicalforensicimaging
practicalpacketanalysis
practicalpacketanalysis
practiceofnetworksecuritymonitoring
practiceofnetworksecuritymonitoring
Python Playground - Mahesh Venkitachalam
Python Playground - Mahesh Venkitachalam
python-crash-course
python-crash-course
smartgirlsguidetoprivacy
smartgirlsguidetoprivacy
The Hacker Playbook 3_ Practical Guide To Penetration Testing - PDF Room
The Hacker Playbook 3_ Practical Guide To Penetration Testing - PDF Room
theidaprobook_2ndedition
theidaprobook_2ndedition
tribeofhackersredteam_tribalknowledgefromthebestinoffensivecybersecurity
tribeofhackersredteam_tribalknowledgefromthebestinoffensivecybersecurity
Web Application Hackers Handbook
Web Application Hackers Handbook
XML 1.1 Bible, 3rd Edition
XML 1.1 Bible, 3rd Edition
Structured Computer Organization 6th Ed
Structured Computer Organization 6th Ed
Absolute Java 5th Edition
Absolute Java 5th Edition
An Introduction to Formal Languages and Automata
An Introduction to Formal Languages and Automata
Operating System Concepts 10th Edition
Operating System Concepts 10th Edition
Docker: Up & Running
Docker: Up & Running
Mastering Linux Security
Mastering Linux Security