PDFs Collecting Computer Security, Hacking and PenTest.

PDFs Collecting Computer Security, Hacking and PenTest Making a housekeeping on my computer I found many texts, manuals, PDF tutorials on Hacking, Exploits, PenTest, GNU / Linux, Metasploit, SQLi, etc. … The ordered categories according thought was best and leave all in one. Zip file. The file is quite heavy (619.0 MB) and contains many PDFs, this led me to consider downloading each file one by one separately according to their tastes and needs, so I ended up creating Blackploit Library, which is nothing more than a repository where I go hanging all PDFs that are of interest. The files are sorted by date of upload, so adding PDFs that will go to the top of the list. If you have some PDF to contribute or know of one that is missing, please me know by mail contact or may send the link using the form collaborations. Needless to say I leave you with the link to download the *. Zip with PDFs, password, a list containing texts and finally the link to Library [Blackploit]: Documentos_PenTest_ (www.blackploit.com). Zip (MEGA) Weight: 619.0 MB Password. * Zip: http://www.blackploit.com Table of contents: + — Carding | Carding.pdf | + — Cell | Applications + iPhone + and + iPad + for + Principiantes.pdf | Android Programming Manual [sgoliver.net] v2.0.pdf | + — Cheat Sheets | BGP.pdf | Cisco IOS Versions.pdf | Commands-for-Configuration-of-Routers-and-Switchs.pdf | Common ports.pdf | EIGRP.pdf | First Hop Redundancy.pdf | Frame Mode MPLS.pdf | IEEE 802.11 WLAN.pdf | IEEE 802.1X.pdf | IOS IPv4 Access Lists.pdf | IPsec.pdf | IPv4 Multicast.pdf | IPv4 Subnetting.pdf | IPv6.pdf | IS-IS.pdf | Linux.pdf | Markdown.pdf | MediaWiki.pdf | NAT.pdf | Nmap5 v1.pdf esp cheatsheet | OSPF.pdf | Physical terminations.pdf | PPP.pdf | QoS.pdf | Reverse_Shell_OL_Cheat-Sheet-v.1.0.pdf | RIP.pdf | Scapy.pdf | Spanning Tree.pdf | Subnetting.pdf | Tcpdump.pdf | VLANs.pdf | VOIP Basics.pdf | Wireshark Display Filters.pdf | Wireshark-Display-Filters.pdf | + — Web Development | 105.desarrollo-rest-with-rails.pdf | Addison.Wesley.Ruby.on.Rails.Tutorial.2nd.Edition.Jul.2012-2.pdf | CodeIgniter_Guia_Usuario_2.1.2.pdf | As-program-for-Ruby-on-Rails.pdf | Packt.Twitter.Bootstrap.Web.Development.How-To.2012.RETAIL.eBook-ELOHiM.pdf | Paper PHP.pdf | MySQL Replication Workshop – STR Systems – October 2012.pdf | + — Exploits | Exploits Creating DEP with ROP Uniting 10 – The Rubik’s Cube [TM] by corelanc0d3r translated by Ivinson_CLS.pdf | Exploits Creating Heap Spraying 11 Desmitidficado by corelanc0d3r translated by Ivinson.pdf | Creating corelanc0d3r Exploits 2 translated by Ivinson.pdf | Creating the 3rd Exploits corelanc0d3r SEH part 3 translated by Ivinson.pdf | Exploits Creating 3b SEH by corelanc0d3r translated by Ivinson.pdf | Creating 4 From Exploit Exploits to Metasploit by corelanc0d3r translated by Ivinson.pdf | Creating Exploits May Accelerate the Process with plugins and modules for corelanc0d3r translated by Ivinson.pdf | 5.2 Exploits Exploits Creating Avoiding SEHOP for IT Security Services Sysdream translated by Ivinson.pdf | Creating Stack Cookies Exploits 6 SafeSEH SEHOP HW DEP and ASLR by corelanc0d3r translated by Ivinson.pdf | Creating Unicode Exploits 7 From the Calc 0ž00410041 translated by Ivinson.pdf corelanc0d3r | Exploits Creating 8 Win32 Egg Hunting translated by Ivinson.pdf corelanc0d3r | Creating Exploits 9 Introduction to Win32 corelanc0d3r Shellcoding translated by Ivinson.pdf | Creating Exploits ¢ n 1 corelanc0d3r translated by Ivinson.pdf | STACK OVERFLOW AS IF IN primero.pdf | + — GNU-Linux | MANAGEMENT UNIX.pdf | Administration GNU Final.pdf | Backtrack 5 Operating Traducido.pdf | Bash Pocket Reference.pdf | Creating a distribution personalizada.pdf | Advanced Routing and control of trafficking in Linux.pdf tr | Expert Shell Scripting.pdf | Grub to fondo.pdf | Hungry Minds – Red Hat Linux 7.2 Bible Unlimited Ed.pdf | Linux Servers Implementation JULY 2009.pdf | Linux Command Line and Shell Scripting Bible (2008). Pdf | Linux M maximum Seguridad.pdf | Pro Bash Programming – Scripting the GNU-Linux.pdf | Programacion_avanzada_en_shell.pdf | Samurai-WTF Course slides.pdf | Ubuntu4WindowsUsers_0.pdf | + — Hacking | Backdoor-via-Injection-2.pdf | Backdooring with PHP.pdf | BeEF Exploitation.pdf Fake Browser Update | Breaking80211-by-Aetsu.pdf | Buffer_Overflow_Windows_por_Ikary.pdf | Looking Vulnerabilities in Windows [Tenable Nessus]. Pdf | Clustering.pdf | Compilation and interpretation of Exploits (PHP, Perl, Python, C & C + +). Pdf | Cracking WPA2-PSK WPA-BY ANTRAX.pdf | Cracking Wifi to completo.pdf | Cross Site Painting.pdf | FileInclusion.pdf | Fingerprinting-linux-unix-privesccheck-120709174848-phpapp02.pdf | Hackingwireless-windows.pdf | Hashcat Usuario.pdf Manual | INTRODUCTION TO HACKING v2.0 (2001). Pdf | IP Hijacking.pdf | JPGFileInclusion.pdf | Playing with Cryptcat I.pdf | Playing with Cryptcat II.pdf | La_Biblia_del_Footprinting.pdf | With phpinfo Assistance.pdf LFI | The old that are still Bits.pdf By Zero | Basic Hacking Manual by taskkill #. Pdf | Manual_Brutus_AET2.pdf | Man_in_the_middle_07.pdf | Offensive Security-7561-pwb.pdf | Phishing.pdf | PHP_LFI_rfc1867_temporary_files.pdf | Remote Code Execution.pdf | Remotefileincluision.pdf | Reverse_DNS.pdf | Sabuesos.pdf | Shell_linux.pdf | Sniffing.pdf | Tcpdump-Tutorial.pdf | The.Rootkit.Arsenal.pdf | Tutors sslstrip.pdf | WEP_WPA-WPA2_Cracking.pdf | Wireless Network Security [Spanish]. Pdf | XSS-to-background-by-trew.pdf | Xssjavascript.pdf | XSS_a_fondo.pdf | XSS_Street_Fight-Ryan_Barnett-BlackhatDC-2011.pdf | + — History | The-Art-of-the-intrusion.pdf | The-Path-Of-Hacker.pdf | A forensic carried juicio.pdf | A journey through the history of hacking.pdf | One-A-Day-v2.0.pdf | + — Malware | How to make a Trojan in Visual Basic 6.pdf | Creating a keylogger on Vb60.pdf | Creating a Trojan Vb60.pdf | Worms Creating VB by Hendrix.pdf | Reversing and Malware Analysis Training Articles.pdf | + — Metasploit | CursoMetasploit [ES]. Pdf | Generating Framework.pdf Metasploit malicious script | Post Exploitation Using Metasploit Installation MeterpreterApple TV.pdf | Manual Metasploit Unleashed offcial.pdf offensive-security | Metasploit Framework – Introduction – Offensive Security.pdf | Metasploit The Penetration Testers Guide.pdf | Metasploit Toolkit for Penetration Testing Exploit Development and Vulnerability research.pdf | Metasploit Unleashed (Espa ¤ ol). Pdf | Metasploit Unleashed.pdf | Metasploit.Penetration.Testing.Cookbook.pdf | Metasploit_The_Penetration_Testers_Guide.pdf | Offensive-security-labs.pdf | Post Exploitation Using Meterpreter.pdf | TallerMetasploit2012.pdf | Windows [Meterpreter] less Post Exploitation.pdf | + — Other | Cocon_paper.pdf | Defcon-17-joseph_mccray-adv_sql_injection.pdf | D to International Security Information Last ¢ n.pdf | Empirical-webfwks.pdf | The 1000 & 1 way to crack a software.pdf | Owning Mafia Bad Guys {&} with JavaScript Botnets.pdf | Protocol-Level Evasion of Web Application Firewalls (Ivan Ristic, Qualys, Black Hat USA 2012) slides.pdf | Inform System Safety ticos.pdf | Shellcode05b_JeimyCano.pdf | SSRF-ONSEC-ZN12-121 120 080 849-phpapp02.pdf | Troyano_policia.pdf | + — Pentest | Analysis-forensic-of-systems-informaticos.pdf | Cert_inf_seguridad_information_gathering.pdf | Cert_inf_software_exploitation.pdf | Detecting System Intrusions.pdf | OWASP.pdf TEST GUIDE | Ethical Hacking – Carlos Tori.pdf | Tool-of-support-for-forensic-analysis-of-computadoras.pdf | Introduction-to-the-computer-forensics-in-Windows.pdf | Data Recovery Manual Disk Duros.pdf | OWASP Top 10-2010 FINAL.pdf | Penetration Testing.pdf | Professional Penetration Testing_ Creating and Operating a Formal Hacking Lab.pdf | SOFTWARE EXPLOITATION.pdf | Practical Workshop Audit and Pentest.pdf | The Basics of Hacking and Penetration Testing.pdf | The.Ethical.Hackers.Handbook.pdf | University Hacker.pdf | Wp-recent-advances-web-app-Security.pdf | + — Python | Introduction to Programming with Python ¢ n – Andr, s Marzal and Isabel Gracia.pdf | Python for hackers.pdf | Python todos.pdf | Python Tutorial – Guido van Rossum.pdf | Violent Python.pdf | + — Magazines | Dhackers_revista_01.pdf | Ezine_LeVeL-23.com.pdf | Hacking Exposed – Computer Forensics.pdf | Hacking Exposed – Web Applications 3.pdf | Hacking Exposed – Web Applications.pdf | HITB-Ezine-Issue-007.pdf | Mhm005.pdf | Mhm006.pdf | Mhm01.pdf | Mhm02.pdf | Mhm03.pdf | Mhm04.pdf | Mhm07.pdf | Pentest-magazine-116828617-AA.pdf | World-Intrusion-.pdf | + — Security | Anonymous – El Manual Super-Secreto – 0.2.0 – ES.pdf | Anonymous Security Handbook.pdf | An ¢ spellings on the Web Part (alezx). Pdf | An ¢ spellings on the Web Part (alezx). Pdf | Guia_sobre_el_uso_de_las_cookies1.pdf | Manual.de.desobediencia.a.la.Ley.Sinde.por.Hacktivistas.pdf | Ultimate Guide for Anonymous and Secure Internet Usage.pdf | + — SQLi |-SQL Injection-Modes of Attack, Defence, and Why It Matters.pdf | An introduction to MySQL injection.pdf | BlackHat Europe 09 – Advanced SQL injection whitepaper.pdf | Blind MySQL Injection – T, injection techniques for blind na ¢ MySQL.pdf | Blind MySQL Injection.pdf | Blind SQL Injection.pdf | Blind-sqli-regexp-attack.pdf | BlindSQLInjection-Practico.pdf | Binary Search Applied to Blind SQL.pdf | Deep Blind SQL Injection.pdf | Hack_x_Crack_SQLinjection.pdf | Hunting Flaws in SQL server.pdf | My-SQL.pdf | MySQL Injection – T, n ¢ techniques of injection in MySQL.pdf | MySQL Injection Ultimate Tutorial-By BaKo.pdf | MySqlBfTool – Making the Most of Blind Injections Sql.pdf | ¢ n Optimisation SQL Union Injection MYSQL.pdf | SFX-SQLi-Paper-en.pdf | SQL Injection Attacks and Defense.pdf | Introduction SQL Injection ¢ n to m, all the error.pdf | SQL Injection Pocket Reference.pdf | SQL Injection Tutorial.pdf | SQL Injection White Paper.pdf | SQL Smuggling.pdf | SQLi Bypasseando the firewall and passing the examination by arthusu.pdf | SQL_Inyection.pdf | SQL Injection Techniques A Repaso.pdf | Time-Based Blind SQL Injection using Heavy Queries.pdf | T, techniques of injection ¢ n in MySQL.pdf | \ — Windows Batch File Programming.pdf Batch.pdf Curso_Batch_Pro (pass jetli). Pdf Batch Cuso for newbies By HolyKnight.pdf batch.pdf Manual Microsoft_Press_eBook_Programming_Windows_8_Apps_with_HTML_CSS_and_JavaScript_PDF.pdf tutorial_para_crear_virus_en_batch.pdf tutrorial batch-to hackxcrak.pdf Windows Sysinternals Administrators Reference.pdf.

For More information follow this link please and Thanks.

http://www.blackploit.com/2013/07/recopilacion-de-pdfs-sobre-seguridad.html?m=1

20131106-235106.jpg

Anuncios

Responder

Introduce tus datos o haz clic en un icono para iniciar sesión:

Logo de WordPress.com

Estás comentando usando tu cuenta de WordPress.com. Cerrar sesión / Cambiar )

Imagen de Twitter

Estás comentando usando tu cuenta de Twitter. Cerrar sesión / Cambiar )

Foto de Facebook

Estás comentando usando tu cuenta de Facebook. Cerrar sesión / Cambiar )

Google+ photo

Estás comentando usando tu cuenta de Google+. Cerrar sesión / Cambiar )

Conectando a %s