VERIFIED TRUSTED SELLERS - 100% WARRANTY CHECKED SERVICES  
Go Back   VERIFIED TRUSTED SELLERS - 100% WARRANTY CHECKED SERVICES > HACKING FORUM > [FREE] Hacking library

[FREE] Hacking library
[RUS] Бесплатные статьи, мануалы по хакингу
[ENG] Free articles, manuals on hacking.

Advertising
ДАМП+ПИН ДАМП+ПИН












Reply
Thread Tools
Unread 24.05.2023, 19:22   #1
Sanioro
Moderator
 
Join Date: 01.01.2010
Posts: 114
Default Сборка от hackingworld.best: книги, курсы, руководства и немножечко софта (290GB+)

Состав:
Course Books
- Cheat Sheets
-- Cisco_IOS_Versions.pdf
-- Frame_Mode_MPLS.pdf
-- IEEE_802.11_WLAN.pdf
-- IOS_Zone-Based_Firewall.pdf
-- IPsec.pdf
-- IPv4_Multicast.pdf
-- IPv4_Subnetting.pdf
-- Markdown.pdf
-- MediaWiki.pdf
-- physical_terminations.pdf
-- scapy.pdf
-- tcpdump.pdf
-- VOIP_Basics.pdf
-- Wireshark_Display_Filters.pdf
- Cisco
-- ASA
--- Cisco-ASA-for-Accidental-Administrators.pdf
-- CCDA
--- CCDA Exam Certification Guide.pdf
--- CCDA Official Exam Certification Guide 3rd Edition.pdf
--- CCDA Quick Reference Sheets.pdf
--- Designing For Cisco Internetwork Solutions DESGN Exam
-- CCIE Ebooks
--- CCIE Routing and Switching v5.0 Official Cert Guide Volume
--- CCIE Routing and Switching v5.0 Official Cert Guide Volum
-- CCNA Ebooks
--- CCNA cloud
---- CCNA Cloud CLDFND 210-451 Official Cert Guide.pdf
--- CCNA Routing and Switching
---- CCENT CCNA ICND1 100-105 Official Cert Guide (100-105).p
---- CCNA Routing and Switching ICND2 200-105 Official Cert Gui
--- CCNA Security
---- CCNA Security 210-260 Official Cert Guide.pdf
--- CCNA Wireless
----- CCNA Wireless 200-355 Official Cert Guide.pdf
--- Cisco CCNA in 60 Days Exam 100-105, Exam 200-105, Exam 200-125.pdf
--- CiscoPress-CCNA-200-301-Official-Cert-Guide-Volume-1.p
--- New CCNA 200-301 Official Cert Guide.pdf
-- CCNP Ebooks
--- CCNP Routing and Switching ROUTE,SWITCH,TSHOOT Official Cert Guid
---- CCNP Routing and Switching ROUTE 300-101 Official Cer
---- CCNP Routing and Switching SWITCH 300-115 Official C
---- CCNP Routing and Switching TSHOOT 300-135 Official Cert
--- CCNP Security
---- CCNP Security SISAS 300-208 Official Cert Guide.pdf
-- MPLS
--- Advanced MPLS Design And Implementation.pdf
--- CCIP MPLS and VPN Architectures.pdf
--- Cisco ISP Essentials.pdf
--- Designing ATM MPLS Networks.pdf
--- Implementing MPLS.pdf
--- MPLS And Next Generation Networks.pdf
--- MPLS And VPN Architectures Volume 2.pdf
--- MPLS Fundamentals.pdf
--- MPLS Implementing Cisco MPLS Vol 1.pdf
--- MPLS Implementing Cisco MPLS Vol 2.pdf
--- Traffic Engineering With MPLS.pdf
-- Other
--- CCNP BCMSN
--- CCNP BCRAN
--- CCNP BCSI
--- CCNP ISCW
--- CCNP ONT
--- Advanced Internetworking Guide.pdf
--- Cisco Press Internet Routing Architectures 2nd.pdf
--- Cisco Press Network Consultants Handbook.pdf
--- Internet Routing Architectures.pdf
--- Internetworking Case Studies.pdf
--- Internetworking Technologies.pdf
--- Internetworking Technology Overview.pdf
--- IP CEF.pdf
--- IP Services Commands.pdf
--- Metro Ethernet.pdf
--- Networking Simplified.pdf
--- TCP-IP Primer Plus.pdf
-- QOS
--- Catalyst QOS in Campus Networks.pdf
--- DQOS Exam Certification Guide.pdf
-- Routing
--- BGP
--- CCNA
--- CCNP
--- EIGRP
--- OSPF
--- CCIE Notes.pdf
--- CCIE Practical Studies Volume I.pdf
--- CCIE Practical Studies Volume II.pdf
--- CCIE R&S 5.1 Narbik.pdf
--- CCIE Scale IP Network Solutions.pdf
--- Cisco LAN Switching Configuration Handbook.pdf
--- Developing Ip Multicast Networks Vol 1.pdf
--- Global IPv6 Strategies.pdf
--- GRE Over IPSEC + DMVPN.pdf
--- Implementing Cisco IP Routing.pdf
--- LAN Switching.pdf
--- Preparing For The CCIE RS Lab.pdf
--- Routing TCP IP Volume 1.pdf
--- Routing TCP IP Volume 2.pdf
--- RS Exam Certification Guide.pdf
--- RS Official Exam Certification Guide 3rd.pdf
--- Troubleshooting IP Routing Protocols.pdf
-- Security
-- Wireless
- Citrix
- Databases
- Forensics
-- FOR500 - Windows Forensic Analysis
-- FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting
-- FOR518 - Mac and iOS Forensic Analysis and Incident Response
-- FOR526 - Memory Forensics In-Depth
-- FOR572 - Advanced Network Forensics Threat Hunting, Analysis, and Inciden
-- FOR585 - Advanced Smartphone Forensics
-- FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques
- Gentoomen Library
- Hacking and Pen Testing
- Linux
- Microsoft
- Networking
- Programming
-- C
--- C_Programming.pdf
--- ModernC.pdf
--- Objective-C for Absolute Beginners, 4th Edition.pdf
-- C#
--- 2010 - C# 2010 AIO For Dummies (Wiley).pdf
--- Accelerated C# 2010.pdf
--- C_Sharp_Programming.pdf
--- C# Bible.pdf
--- C# Primer.pdf
--- C# Programming.pdf
--- C# Your Visual Blueprint for Building.NET Applications.pdf
--- CLR via C3, 3rd Edition.pdf
--- Effective C# - 50 Specific Ways to Improve your C#, Second Edition.pdf
--- Essential C# 4.0.pdf
--- Head First C#, 2nd Edition.pdf
--- Head First C#, 3rd Edition.pdf
--- Pro C# 2010 and the.NET 4 Platform.pdf
--- Professional C# 4 and.NET 4.pdf
--- Programming C# 4.0.pdf
--- Visual C# 2010 Recipes.pdf
-- C++
--- Beginning C++17, 5th Edition.pdf
--- c++ how to program 8th.edition.pdf
--- C++3e20100119.pdf
-- HTML
--- HTML 4 for Dummies (ISBN - 0764589172).pdf
--- HTML XHTML & CSS For Dummies (ISBN - 047023847X).pdf
--- HTML XHTML and CSS All-in-One Desk Reference for Dummies (ISBN - 0470186275).pdf
-- Java
--- Java How to Program By Dietel & Dietel (9th Edition).pdf
--- Java.Programming.10th.Edition.Jan.2014.pdf
-- Machine Learning
--- Artificial Intelligence for.NET.pdf
--- Machine Learning with R.pdf
--- Machine Learning with TensorFlow.pdf
-- PHP & MySQL
--- PHP & MySQL for Dummies (ISBN - 0470096004).pdf
--- PHP & MySQL Web Development All-in-One Desk Reference fo
--- PHP 5 for Dummies (ISBN - 0764541668).pdf
--- PHP and MySQL for Dummies (ISBN - 0470527587).pdf
--- PHP and MySQL for Dummies (ISBN - 0764555898).pdf
-- Python
--- Black Hat Python.pdf
--- Mastering Python Forensics.pdf
--- Non-Programmer's_Tutorial_for_Python_3.pdf
--- The Python 3 Standard Library by Example.pdf
--- thinkpython.pdf
--- Web Scraping with Python, 2nd Edition.pdf
-- Reverse Engineering
--- Reverse Engineering.pdf
--- ReverseEngineeringForBeginners.en.pdf
--- The Architecture Of Computer Hardware.pdf
-- Algorithms_Nutshell .pdf
-- Algorithms.pdf
-- Modern X86 Assembly Language Programming.pdf
- SAP
- Security
- VMware
- Windows Forensics
- Hardening Linux (2005).pdf
- Linux Command Line and Shell Scripting Bible by Richard Blum, Christine Bresnahan.pdf
Course Videos
- Amazon
-- AWS Certified Solutions Architect - Associate
- Arduino
-- Intro To Arduino
--- 1. Introduction to Arduino
--- 2. Programming Arduino
--- 3. Arduino Hardware
--- 4. Working with sensors and shields
- CompTIA
- Computer Forensics
-- CHFI
-- Computer Hacking Forensic Investigator (CHFIv9)
-- EC-Council - Computer Hacking Forensic Investigator (CHFIv9)
-- FOR500 - Windows Forensic Analysis
-- FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting
-- FOR518 - Mac and iOS Forensic Analysis and Incident Response
-- FOR526 - Memory Forensics In-Depth
-- FOR572 - Advanced Network Forensics Threat Hunting, Analysis, and Incident Responce
-- FOR585 - Advanced Smartphone Forensics
-- FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques
-- FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques Includes Everything (2016)
-- Introduction To Windows Forensics
-- SANS FOR610 Reverse-Engineering Malware Malware Analysis Tools and Techniques Includes Everything (2016)
- Hacking And PenTesting
-- Applications
--- Hacking Web Applications - The Art of Hacking Series Security
---- 00001 Security_Penetration_Testing_for_Today_s_DevOps_and_Cl
---- 00002 Learning_objectives.mp4
---- 00003 1.1_Understanding_Ethical_Hacking_and_Penetration_Testing.mp4
---- 00004 1.2_Surveying_Web_Application_Penetration_Testing
---- 00005 1.3_Understanding_the_Need_for_Web_Applicatio
---- 00006 1.4_Exploring_How_Web_Applications_Have_Evolved_Over_Time.mp4
---- 00007 1.5_Exploring_What_Programming_Languages_You_Shou
---- 00008 Learning_objectives.mp4
---- 00009 2.1_Understanding_the_Web_Application_Protocols.
---- 00010 2.2_Exploring_the_HTTP_Request_and_Response.mp
--- Hacking-Web-Applications-The-Art-of-Hacking-Series-Security-Penetration-Testing
-- Blue Team
-- CyberTraining365 Certified Ethical Hacker (CEH) v9 Training‬
-- General
--- Ethical Hacking Masterclass [Video]
--- Introduction to Penetration Testing Using Metasploit
--- Introduction to Pentesting
--- Metasploit Basics
--- PenTesterAcademy
--- Pluralsight Ethical Hacking
--- Reverse Engineering
--- Social Engineering
---- 1. Humans; The soft center withing the hard shell
----- 1. Introduction.mp4
----- 2. SE Through the ages.mp4
----- 3. The soft center that SE exploits.mp4
----- 4. Human weaknesses that enable SE.mp4
----- 5. Computer based vs Human based SE.mp4
----- 6. SE at home and popular culture.mp4
----- 7. Summary.mp4
---- 2. A walkthrough of a social engineering attack
----- 1. Introduction.mp4
----- 2. Case Study; Cold call virus scams.mp4
----- 3. Establishing authority and creating fear.mp4
----- 4. Executing the SE attack.mp4
----- 5. Demonstrating authenticity.mp4
----- 6. Creating a debt.mp4
----- 7. Monetizing the scam.mp4
----- 8. Summary.mp4
---- 3. Reconnaisance and OSINT
----- 1. Introduction.mp4
----- 2. Understanding OSINT.mp4
----- 3. Organizational Recon.mp4
----- 4. Identifying targets within an organization.mp4
----- 5. Identity recon with PiPL.mp4
----- 6. Shoulder surfing, eavesdropping and tailgating.mp4
----- 7. Dumpster diving and mail theft.mp4
----- 8. Data breaches.mp4
----- 9. Summary.mp4
---- 4. Phishing attacks
----- 1. Introduction.mp4
----- 2. Phishing.mp4
----- 3. Call signs of a fishing email.mp4
----- 4. Call signs of a fishing page.mp4
----- 5. Understanding spearphishing.mp4
----- 6. Enumeration as a verification vector.mp4
----- 7. Filter evasion and concealment techniques.mp4
----- 8. Identifying attacks with phishtank.mp4
----- 9. Phishing with beef.mp4
----- 10. Phish5.mp4
----- 11. Summary.mp4
---- 5. Identity theft and impersonation
----- 1. Introduction.mp4
----- 2. The impact of identity theft.mp4
----- 3. Identities for sale.mp4
----- 4. The mechanics of an identity theft attack.mp4
----- 5. In-person Human-based identity theft.mp4
----- 6. Impersonation.mp4
----- 7. Social Engineering and impersonation by example.mp4
----- 8. Summary.mp4
---- 6. Social Engineering Countermeasures
----- 1. Introduction.mp4
----- 2. Defenses in the browser and mail clients.mp4
----- 3. Record destruction.mp4
----- 4. Physical security.mp4
----- 5. Separation of duties and Principle of least privilege.mp4
----- 6. Multistep and side channel identity verification.mp4
----- 7. Logging, auditing and monitoring.mp4
----- 8. Identity monitoring.mp4
----- 9. Conditioning the humans.mp4
----- 10. Summary.mp4
--- SQL Injection
--- System hacking
--- The Art Of Hacking Video Collection
-- Networks
--- Hacking wireless networks
--- Wireshark 2.0
--- WireShark For Packet Analysis And Ethical Hacking
-- Red Team
--- Red Team Hacking Course
--- RedTeam Blueprint - A Unique Guide To Ethical Hacking
--- Windows Red Team Lab
---- 01-Basics.mp4
---- 02-DomainEnumeration.mp4
---- 03-LocalPrivEscalation.mp4
---- 04-LateralMovement.mp4
---- 05-DomainPrivEscalation.mp4
---- 06-PersistenceTechniques.mp4
---- 07-PrivEscalationAcrossTrusts.mp4
---- 08-Defenses.mp4
- IoT (Internet of Things)
- Linux
- Microsoft Courses
- Networking
- Programming
-- C
-- C#
-- C++
-- CSS
-- Data Science
-- Etc
-- GIT
-- HTML
-- Java
-- JavaScript
-- Machine Learning
-- Other Code Courses
-- PHP
-- Projects
-- Python
-- React
-- SQL
-- Web Development
- Security
- Virtualization
- VoIP
-- Build Free VoIP PBX Call Center on Asterisk Issabel
--- 1. Introduction & VoIP Fundamentals
--- 2. Network Requirements for the VoIP
--- 3. Course Project
--- 4. Issabel Installation
--- 5. Issabel Overview
--- 6. Issabel Phone System Setup
--- 7. Issabel Phone System Maintenance
--- 8. Issabel Call Center Module
--- 9. Getting Started - Issabel Call Center Core Configurations
--- 10. issabel Call Center Inbound Call Campaign
--- 11. Issabell Call Center Outbound Call Campaign
--- 12. Issabel Call Center Reports & Statistics
--- 13. Call Center Realtime Dashboard & Live Wallboard
--- 14. Call Center Supervisor Level Functions & Features for Q
--- 15. Deploy Issabel IP PBX on Public Cloud
--- 16. Issabel Meet - WebRTC Video Conferencing & Collaboration
--- 17. Bonus Issabel Resources & VoIP Hardware
Software
- Bandicam 4.0.1.1339 with crack
-- Crack File
--- keymaker.exe
-- bdcamsetup.exe
-- How To Insatll.txt
- BandiCut + Crack
-- crack
--- bdcut.exe
-- Bandicut.v1.2.2.65.exe
- ISO's
-- Hirens.BootCD.15.2
--- BurnCDCC.exe
--- BurnToCD.cmd
--- changes.txt
--- DefaultKeyboardPatch.zip
--- HBCD.txt
--- HBCDCustomizer.exe
--- Hiren's.BootCD.15.2.iso
-- dban-2.2.8_i586.iso
-- ERD50_Servers.iso
-- HBCD_PE_x64.iso
-- MediaCreationTool1903.exe
-- Parrot-kde-security-4.7_x64.iso
-- pmagic_2018_03_27.iso
-- Windows.iso
- SysAdmin Tools
-- Advanced Tokens Manager.exe
-- Advanced_Port_Scanner_2.5.3869.exe
-- DiskWarrior(MAC).zip
-- DiskWipe.exe
-- DriverGenius.exe
-- netlimiter-4.0.50.0.exe
-- rufus-3.6.exe
-- Speccy Portable.zip
-- Speccy.exe
-- stopupdates10portable.zip
-- SysinternalsSuite.zip
-- TreeSizeFree.exe
-- WiresharkPortable_3.0.3.paf.exe
- VMSphere 6
-- m-vmvsp6.iso

Важно: имейте в виду, что все бинарники могут быть клеены с чем-нибудь веселым. Не запускать на рабочих десктопах! Только виртуалки-дедики. Возможности хэшировать все и проверять у меня лично нет, раздача не моя.

Полная раздача на Меге
Sanioro is offline   Reply With Quote
Reply

Thread Tools



All times are GMT +2. The time now is 18:13.