![]() |
|
[FREE] Hacking library [RUS] Бесплатные статьи, мануалы по хакингу [ENG] Free articles, manuals on hacking. |
![]() |
Thread Tools |
![]() |
#1 |
Moderator
Join Date: 01.01.2010
Posts: 114
|
![]()
Состав:
Course Books - Cheat Sheets -- Cisco_IOS_Versions.pdf -- Frame_Mode_MPLS.pdf -- IEEE_802.11_WLAN.pdf -- IOS_Zone-Based_Firewall.pdf -- IPsec.pdf -- IPv4_Multicast.pdf -- IPv4_Subnetting.pdf -- Markdown.pdf -- MediaWiki.pdf -- physical_terminations.pdf -- scapy.pdf -- tcpdump.pdf -- VOIP_Basics.pdf -- Wireshark_Display_Filters.pdf - Cisco -- ASA --- Cisco-ASA-for-Accidental-Administrators.pdf -- CCDA --- CCDA Exam Certification Guide.pdf --- CCDA Official Exam Certification Guide 3rd Edition.pdf --- CCDA Quick Reference Sheets.pdf --- Designing For Cisco Internetwork Solutions DESGN Exam -- CCIE Ebooks --- CCIE Routing and Switching v5.0 Official Cert Guide Volume --- CCIE Routing and Switching v5.0 Official Cert Guide Volum -- CCNA Ebooks --- CCNA cloud ---- CCNA Cloud CLDFND 210-451 Official Cert Guide.pdf --- CCNA Routing and Switching ---- CCENT CCNA ICND1 100-105 Official Cert Guide (100-105).p ---- CCNA Routing and Switching ICND2 200-105 Official Cert Gui --- CCNA Security ---- CCNA Security 210-260 Official Cert Guide.pdf --- CCNA Wireless ----- CCNA Wireless 200-355 Official Cert Guide.pdf --- Cisco CCNA in 60 Days Exam 100-105, Exam 200-105, Exam 200-125.pdf --- CiscoPress-CCNA-200-301-Official-Cert-Guide-Volume-1.p --- New CCNA 200-301 Official Cert Guide.pdf -- CCNP Ebooks --- CCNP Routing and Switching ROUTE,SWITCH,TSHOOT Official Cert Guid ---- CCNP Routing and Switching ROUTE 300-101 Official Cer ---- CCNP Routing and Switching SWITCH 300-115 Official C ---- CCNP Routing and Switching TSHOOT 300-135 Official Cert --- CCNP Security ---- CCNP Security SISAS 300-208 Official Cert Guide.pdf -- MPLS --- Advanced MPLS Design And Implementation.pdf --- CCIP MPLS and VPN Architectures.pdf --- Cisco ISP Essentials.pdf --- Designing ATM MPLS Networks.pdf --- Implementing MPLS.pdf --- MPLS And Next Generation Networks.pdf --- MPLS And VPN Architectures Volume 2.pdf --- MPLS Fundamentals.pdf --- MPLS Implementing Cisco MPLS Vol 1.pdf --- MPLS Implementing Cisco MPLS Vol 2.pdf --- Traffic Engineering With MPLS.pdf -- Other --- CCNP BCMSN --- CCNP BCRAN --- CCNP BCSI --- CCNP ISCW --- CCNP ONT --- Advanced Internetworking Guide.pdf --- Cisco Press Internet Routing Architectures 2nd.pdf --- Cisco Press Network Consultants Handbook.pdf --- Internet Routing Architectures.pdf --- Internetworking Case Studies.pdf --- Internetworking Technologies.pdf --- Internetworking Technology Overview.pdf --- IP CEF.pdf --- IP Services Commands.pdf --- Metro Ethernet.pdf --- Networking Simplified.pdf --- TCP-IP Primer Plus.pdf -- QOS --- Catalyst QOS in Campus Networks.pdf --- DQOS Exam Certification Guide.pdf -- Routing --- BGP --- CCNA --- CCNP --- EIGRP --- OSPF --- CCIE Notes.pdf --- CCIE Practical Studies Volume I.pdf --- CCIE Practical Studies Volume II.pdf --- CCIE R&S 5.1 Narbik.pdf --- CCIE Scale IP Network Solutions.pdf --- Cisco LAN Switching Configuration Handbook.pdf --- Developing Ip Multicast Networks Vol 1.pdf --- Global IPv6 Strategies.pdf --- GRE Over IPSEC + DMVPN.pdf --- Implementing Cisco IP Routing.pdf --- LAN Switching.pdf --- Preparing For The CCIE RS Lab.pdf --- Routing TCP IP Volume 1.pdf --- Routing TCP IP Volume 2.pdf --- RS Exam Certification Guide.pdf --- RS Official Exam Certification Guide 3rd.pdf --- Troubleshooting IP Routing Protocols.pdf -- Security -- Wireless - Citrix - Databases - Forensics -- FOR500 - Windows Forensic Analysis -- FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting -- FOR518 - Mac and iOS Forensic Analysis and Incident Response -- FOR526 - Memory Forensics In-Depth -- FOR572 - Advanced Network Forensics Threat Hunting, Analysis, and Inciden -- FOR585 - Advanced Smartphone Forensics -- FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques - Gentoomen Library - Hacking and Pen Testing - Linux - Microsoft - Networking - Programming -- C --- C_Programming.pdf --- ModernC.pdf --- Objective-C for Absolute Beginners, 4th Edition.pdf -- C# --- 2010 - C# 2010 AIO For Dummies (Wiley).pdf --- Accelerated C# 2010.pdf --- C_Sharp_Programming.pdf --- C# Bible.pdf --- C# Primer.pdf --- C# Programming.pdf --- C# Your Visual Blueprint for Building.NET Applications.pdf --- CLR via C3, 3rd Edition.pdf --- Effective C# - 50 Specific Ways to Improve your C#, Second Edition.pdf --- Essential C# 4.0.pdf --- Head First C#, 2nd Edition.pdf --- Head First C#, 3rd Edition.pdf --- Pro C# 2010 and the.NET 4 Platform.pdf --- Professional C# 4 and.NET 4.pdf --- Programming C# 4.0.pdf --- Visual C# 2010 Recipes.pdf -- C++ --- Beginning C++17, 5th Edition.pdf --- c++ how to program 8th.edition.pdf --- C++3e20100119.pdf -- HTML --- HTML 4 for Dummies (ISBN - 0764589172).pdf --- HTML XHTML & CSS For Dummies (ISBN - 047023847X).pdf --- HTML XHTML and CSS All-in-One Desk Reference for Dummies (ISBN - 0470186275).pdf -- Java --- Java How to Program By Dietel & Dietel (9th Edition).pdf --- Java.Programming.10th.Edition.Jan.2014.pdf -- Machine Learning --- Artificial Intelligence for.NET.pdf --- Machine Learning with R.pdf --- Machine Learning with TensorFlow.pdf -- PHP & MySQL --- PHP & MySQL for Dummies (ISBN - 0470096004).pdf --- PHP & MySQL Web Development All-in-One Desk Reference fo --- PHP 5 for Dummies (ISBN - 0764541668).pdf --- PHP and MySQL for Dummies (ISBN - 0470527587).pdf --- PHP and MySQL for Dummies (ISBN - 0764555898).pdf -- Python --- Black Hat Python.pdf --- Mastering Python Forensics.pdf --- Non-Programmer's_Tutorial_for_Python_3.pdf --- The Python 3 Standard Library by Example.pdf --- thinkpython.pdf --- Web Scraping with Python, 2nd Edition.pdf -- Reverse Engineering --- Reverse Engineering.pdf --- ReverseEngineeringForBeginners.en.pdf --- The Architecture Of Computer Hardware.pdf -- Algorithms_Nutshell .pdf -- Algorithms.pdf -- Modern X86 Assembly Language Programming.pdf - SAP - Security - VMware - Windows Forensics - Hardening Linux (2005).pdf - Linux Command Line and Shell Scripting Bible by Richard Blum, Christine Bresnahan.pdf Course Videos - Amazon -- AWS Certified Solutions Architect - Associate - Arduino -- Intro To Arduino --- 1. Introduction to Arduino --- 2. Programming Arduino --- 3. Arduino Hardware --- 4. Working with sensors and shields - CompTIA - Computer Forensics -- CHFI -- Computer Hacking Forensic Investigator (CHFIv9) -- EC-Council - Computer Hacking Forensic Investigator (CHFIv9) -- FOR500 - Windows Forensic Analysis -- FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting -- FOR518 - Mac and iOS Forensic Analysis and Incident Response -- FOR526 - Memory Forensics In-Depth -- FOR572 - Advanced Network Forensics Threat Hunting, Analysis, and Incident Responce -- FOR585 - Advanced Smartphone Forensics -- FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques -- FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques Includes Everything (2016) -- Introduction To Windows Forensics -- SANS FOR610 Reverse-Engineering Malware Malware Analysis Tools and Techniques Includes Everything (2016) - Hacking And PenTesting -- Applications --- Hacking Web Applications - The Art of Hacking Series Security ---- 00001 Security_Penetration_Testing_for_Today_s_DevOps_and_Cl ---- 00002 Learning_objectives.mp4 ---- 00003 1.1_Understanding_Ethical_Hacking_and_Penetration_Testing.mp4 ---- 00004 1.2_Surveying_Web_Application_Penetration_Testing ---- 00005 1.3_Understanding_the_Need_for_Web_Applicatio ---- 00006 1.4_Exploring_How_Web_Applications_Have_Evolved_Over_Time.mp4 ---- 00007 1.5_Exploring_What_Programming_Languages_You_Shou ---- 00008 Learning_objectives.mp4 ---- 00009 2.1_Understanding_the_Web_Application_Protocols. ---- 00010 2.2_Exploring_the_HTTP_Request_and_Response.mp --- Hacking-Web-Applications-The-Art-of-Hacking-Series-Security-Penetration-Testing -- Blue Team -- CyberTraining365 Certified Ethical Hacker (CEH) v9 Training -- General --- Ethical Hacking Masterclass [Video] --- Introduction to Penetration Testing Using Metasploit --- Introduction to Pentesting --- Metasploit Basics --- PenTesterAcademy --- Pluralsight Ethical Hacking --- Reverse Engineering --- Social Engineering ---- 1. Humans; The soft center withing the hard shell ----- 1. Introduction.mp4 ----- 2. SE Through the ages.mp4 ----- 3. The soft center that SE exploits.mp4 ----- 4. Human weaknesses that enable SE.mp4 ----- 5. Computer based vs Human based SE.mp4 ----- 6. SE at home and popular culture.mp4 ----- 7. Summary.mp4 ---- 2. A walkthrough of a social engineering attack ----- 1. Introduction.mp4 ----- 2. Case Study; Cold call virus scams.mp4 ----- 3. Establishing authority and creating fear.mp4 ----- 4. Executing the SE attack.mp4 ----- 5. Demonstrating authenticity.mp4 ----- 6. Creating a debt.mp4 ----- 7. Monetizing the scam.mp4 ----- 8. Summary.mp4 ---- 3. Reconnaisance and OSINT ----- 1. Introduction.mp4 ----- 2. Understanding OSINT.mp4 ----- 3. Organizational Recon.mp4 ----- 4. Identifying targets within an organization.mp4 ----- 5. Identity recon with PiPL.mp4 ----- 6. Shoulder surfing, eavesdropping and tailgating.mp4 ----- 7. Dumpster diving and mail theft.mp4 ----- 8. Data breaches.mp4 ----- 9. Summary.mp4 ---- 4. Phishing attacks ----- 1. Introduction.mp4 ----- 2. Phishing.mp4 ----- 3. Call signs of a fishing email.mp4 ----- 4. Call signs of a fishing page.mp4 ----- 5. Understanding spearphishing.mp4 ----- 6. Enumeration as a verification vector.mp4 ----- 7. Filter evasion and concealment techniques.mp4 ----- 8. Identifying attacks with phishtank.mp4 ----- 9. Phishing with beef.mp4 ----- 10. Phish5.mp4 ----- 11. Summary.mp4 ---- 5. Identity theft and impersonation ----- 1. Introduction.mp4 ----- 2. The impact of identity theft.mp4 ----- 3. Identities for sale.mp4 ----- 4. The mechanics of an identity theft attack.mp4 ----- 5. In-person Human-based identity theft.mp4 ----- 6. Impersonation.mp4 ----- 7. Social Engineering and impersonation by example.mp4 ----- 8. Summary.mp4 ---- 6. Social Engineering Countermeasures ----- 1. Introduction.mp4 ----- 2. Defenses in the browser and mail clients.mp4 ----- 3. Record destruction.mp4 ----- 4. Physical security.mp4 ----- 5. Separation of duties and Principle of least privilege.mp4 ----- 6. Multistep and side channel identity verification.mp4 ----- 7. Logging, auditing and monitoring.mp4 ----- 8. Identity monitoring.mp4 ----- 9. Conditioning the humans.mp4 ----- 10. Summary.mp4 --- SQL Injection --- System hacking --- The Art Of Hacking Video Collection -- Networks --- Hacking wireless networks --- Wireshark 2.0 --- WireShark For Packet Analysis And Ethical Hacking -- Red Team --- Red Team Hacking Course --- RedTeam Blueprint - A Unique Guide To Ethical Hacking --- Windows Red Team Lab ---- 01-Basics.mp4 ---- 02-DomainEnumeration.mp4 ---- 03-LocalPrivEscalation.mp4 ---- 04-LateralMovement.mp4 ---- 05-DomainPrivEscalation.mp4 ---- 06-PersistenceTechniques.mp4 ---- 07-PrivEscalationAcrossTrusts.mp4 ---- 08-Defenses.mp4 - IoT (Internet of Things) - Linux - Microsoft Courses - Networking - Programming -- C -- C# -- C++ -- CSS -- Data Science -- Etc -- GIT -- HTML -- Java -- JavaScript -- Machine Learning -- Other Code Courses -- PHP -- Projects -- Python -- React -- SQL -- Web Development - Security - Virtualization - VoIP -- Build Free VoIP PBX Call Center on Asterisk Issabel --- 1. Introduction & VoIP Fundamentals --- 2. Network Requirements for the VoIP --- 3. Course Project --- 4. Issabel Installation --- 5. Issabel Overview --- 6. Issabel Phone System Setup --- 7. Issabel Phone System Maintenance --- 8. Issabel Call Center Module --- 9. Getting Started - Issabel Call Center Core Configurations --- 10. issabel Call Center Inbound Call Campaign --- 11. Issabell Call Center Outbound Call Campaign --- 12. Issabel Call Center Reports & Statistics --- 13. Call Center Realtime Dashboard & Live Wallboard --- 14. Call Center Supervisor Level Functions & Features for Q --- 15. Deploy Issabel IP PBX on Public Cloud --- 16. Issabel Meet - WebRTC Video Conferencing & Collaboration --- 17. Bonus Issabel Resources & VoIP Hardware Software - Bandicam 4.0.1.1339 with crack -- Crack File --- keymaker.exe -- bdcamsetup.exe -- How To Insatll.txt - BandiCut + Crack -- crack --- bdcut.exe -- Bandicut.v1.2.2.65.exe - ISO's -- Hirens.BootCD.15.2 --- BurnCDCC.exe --- BurnToCD.cmd --- changes.txt --- DefaultKeyboardPatch.zip --- HBCD.txt --- HBCDCustomizer.exe --- Hiren's.BootCD.15.2.iso -- dban-2.2.8_i586.iso -- ERD50_Servers.iso -- HBCD_PE_x64.iso -- MediaCreationTool1903.exe -- Parrot-kde-security-4.7_x64.iso -- pmagic_2018_03_27.iso -- Windows.iso - SysAdmin Tools -- Advanced Tokens Manager.exe -- Advanced_Port_Scanner_2.5.3869.exe -- DiskWarrior(MAC).zip -- DiskWipe.exe -- DriverGenius.exe -- netlimiter-4.0.50.0.exe -- rufus-3.6.exe -- Speccy Portable.zip -- Speccy.exe -- stopupdates10portable.zip -- SysinternalsSuite.zip -- TreeSizeFree.exe -- WiresharkPortable_3.0.3.paf.exe - VMSphere 6 -- m-vmvsp6.iso Важно: имейте в виду, что все бинарники могут быть клеены с чем-нибудь веселым. Не запускать на рабочих десктопах! Только виртуалки-дедики. Возможности хэшировать все и проверять у меня лично нет, раздача не моя. Полная раздача на Меге |
![]() |
![]() |