Index of /books
I'm just gonna leave this here... Some very nice books though, found some on Linux and banned conspiracy theories and stuffInteresting. Download at your own risk, may be Copyright Infringement
---------- Post added at 02:44 PM ---------- Previous post was at 02:42 PM ----------
Just found a sweet index of hacking booksYay. I might share, not sure yet. Here are a few of the titles:
Actually, thats all of the books xDCode:[ ] arp_spoofing_intro.pdf 30-May-2005 18:09 29K [ ] arp_spoofing_slides.pdf 30-May-2005 18:10 124K [ ] atstake_etherleak_report.pdf 30-May-2005 18:10 282K [ ] atstake_gprs_security.pdf 30-May-2005 18:10 132K [ ] atstake_war_nibbling.pdf 30-May-2005 18:12 668K [ ] buffer_overruns.pdf 30-May-2005 18:13 663K [ ] cd_lifetime_study_nist.pdf 30-May-2005 18:14 654K [ ] cheating_chap.pdf 30-May-2005 18:14 477K [ ] coca-cola_evs2_programming.pdf 30-May-2005 18:15 76K [ ] ddos_attacks_info.pdf 30-May-2005 18:15 98K [ ] ddos_attacks_surviving.pdf 30-May-2005 18:15 90K [ ] defeating_encryption.pdf 30-May-2005 18:16 491K [ ] disclosure_helps_security.pdf 30-May-2005 18:17 511K [ ] disk_sanitization_practices.pdf 30-May-2005 18:19 882K [ ] dns_cache_snooping.pdf 30-May-2005 18:17 127K [ ] dos_via_algorithmic_complexity_attack.pdf 30-May-2005 18:17 263K [ ] encryption_flaws_no_risk.pdf 30-May-2005 18:17 27K [ ] ethereal_guide.pdf 30-May-2005 18:26 2.5M [ ] fbi_codis.pdf 30-May-2005 18:26 2.5M [ ] fiber_optic_taps.pdf 30-May-2005 18:20 327K [ ] finding_hidden_cameras.pdf 30-May-2005 18:21 258K [ ] forensic_guide_to_linux.pdf 30-May-2005 18:31 2.7M [ ] google_file_system.pdf 30-May-2005 18:26 269K [ ] hacking_coke_machines.pdf 30-May-2005 18:26 8.0K [ ] how_to_own_the_internet.pdf 30-May-2005 18:27 313K [ ] iis_security_countermeasures.pdf 30-May-2005 18:39 4.3M [ ] im_cultural_divide.pdf 30-May-2005 18:29 704K [ ] information_warfare_book.pdf 30-May-2005 18:34 1.9M [ ] internet_chatroom_surveillance.pdf 30-May-2005 18:31 161K [ ] intro_to_shellcoding.pdf 30-May-2005 18:32 253K [ ] ip_v5_cookbook.pdf 30-May-2005 18:36 1.1M [ ] lamo_charges.pdf 30-May-2005 18:36 333K [ ] layer2sniffing.pdf 30-May-2005 18:36 121K [ ] liberty_disappeared_from_cyberspace.pdf 30-May-2005 18:37 174K [ ] linux_userguide.pdf 30-May-2005 18:48 4.5M [ ] magstripe_interfacing.pdf 30-May-2005 18:37 66K [ ] md5_cryptographics_weakness.pdf 30-May-2005 18:37 56K [ ] microsoft_security_poster1.pdf 30-May-2005 18:39 401K [ ] microsoft_security_poster2.pdf 30-May-2005 18:40 433K [ ] microsoft_security_poster3.pdf 30-May-2005 18:40 323K [ ] mitm_bluetooth_attack.pdf 30-May-2005 18:41 73K [ ] msoffice_encryption_insecure.pdf 30-May-2005 18:41 143K [ ] ngs_passive_information_gathering.pdf 30-May-2005 18:46 1.6M [ ] nhtcu_computer_evidence_guide.pdf 30-May-2005 18:43 431K [ ] nist_info-sec.pdf 30-May-2005 18:44 282K [ ] nist_macosx_secuity_guide.pdf 30-May-2005 18:51 3.1M [ ] nist_pda_forensics.pdf 30-May-2005 18:51 2.4M [ ] nist_security_metrics_guide.pdf 30-May-2005 18:49 569K [ ] nist_voip_security.pdf 30-May-2005 18:52 1.2M [ ] nmap_host_discovery.pdf 30-May-2005 18:51 110K [ ] nsa_interview.pdf 30-May-2005 18:51 87K [ ] opensource_security_testing.pdf 30-May-2005 18:56 2.1M [ ] optical_tempest_crt.pdf 30-May-2005 18:52 400K [ ] optical_tempest_optical.pdf 30-May-2005 18:52 374K [ ] organisations_communication_structure.pdf 30-May-2005 18:53 269K [ ] owasp_guide.pdf 30-May-2005 18:54 950K [ ] paper_dtmf.pdf 30-May-2005 18:53 185K [ ] php_security.pdf 30-May-2005 18:54 249K [ ] physical_device_fingerprinting.pdf 30-May-2005 19:13 9.9M [ ] physical_security.pdf 30-May-2005 18:55 529K [ ] rfid_analysis.pdf 30-May-2005 18:56 274K [ ] safelocks_for_compscientist.pdf 30-May-2005 19:01 2.6M [ ] sanctuminc_http_attacks.pdf 30-May-2005 18:56 159K [ ] sans_attacking_dns_protocol.pdf 30-May-2005 18:57 322K [ ] securing_your_laptop.pdf 30-May-2005 18:58 345K [ ] security_first_responders_guide.pdf 30-May-2005 19:00 874K [ ] security_through_obscurity.pdf 30-May-2005 19:00 64K [ ] session_fixation.pdf 30-May-2005 19:01 356K [ ] sessionid_brute_force.pdf 30-May-2005 19:01 483K [ ] shatter_attack.pdf 30-May-2005 19:01 179K [ ] shatter_attack_redux.pdf 30-May-2005 19:03 716K [ ] skype_protocol.pdf 30-May-2005 19:02 279K [ ] snort_install_guide_fedora2.pdf 30-May-2005 19:03 345K [ ] ssh_timing_attack.pdf 30-May-2005 19:04 362K [ ] surveillance_nation1.pdf 30-May-2005 19:04 755K [ ] surveillance_nation2.pdf 30-May-2005 19:05 513K [ ] underground_book.pdf 30-May-2005 19:07 1.2M [ ] unix_rootkits_overview.pdf 30-May-2005 19:06 403K [ ] us_frequency_chart.pdf 30-May-2005 19:07 102K [ ] usdoj_forensics_guide.pdf 30-May-2005 19:07 678K [ ] wep_analysis.pdf 30-May-2005 19:07 148K [ ] wlan_ids.pdf 30-May-2005 19:07 38K [ ] wlan_macspooof_detection.pdf 30-May-2005 19:07 79K [ ] worm_propogation.pdf 30-May-2005 19:08 254K [ ] xss_anatomy.pdf
EDIT: Skype protocol, Securing a windows laptop, these books are pretty cool o.O
EDIT: JUST FOUND ANOTHER 2-300 ON HACKING. After I download some more, I'll post them on here for download
---------- Post added at 03:22 PM ---------- Previous post was at 02:44 PM ----------
OMG
Inside WikiLeaks
The US Government's Plans to take down WikiLeaks
FBI Gun Codes
All classified and available from searching on googleI NEED MOAR HDD SPACE
EIDT: HOLEY S**T WHAT DID I JUST FIND?!
Did a google search forjust because I was bored, and I found the index of one of the FBI .gov websites o.O Thats only a little freakyCode:intitle: "index of" fbi
EDIT: Found the entire C|EH v6 Modulehttp://www.hackerzvoice.net/ceh/
Results 1 to 2 of 2
Threaded View
- 02 Aug. 2011 03:22pm #1
- Join Date
- Apr. 2010
- Location
- When freedom is outlawed only outlaws will be free
- Posts
- 5,113
- Reputation
- 195
- LCash
- 0.25
Some nice books. That are free - Kind of.
Last edited by 323; 02 Aug. 2011 at 03:50pm.