Free E-books (and my collection)

Here is my E-book collection- https://github.com/RootAndroid58/E-books


https://gbhackers.com/raspberry-pi-and-kali-linux/ #Best books for hacking!!

1.Hacking: How to Hack Computers, Basic Security and Penetration Testing Ebook


Download Link : https://drive.google.com/file/d/0B4CdA3JV_23OSW5BTVlNU1RlaW8/view

2.Master the Kali Linux - From Noob to Expert Hacking - 8 Ebooks
Download Link : http://www.mediafire.com/file/wv4sun24cwoow17/Kali+tutorial.rar

3.Grey Hat Hacking - The Ethical Hacker's Handbook Ebook
Download Link : https://drive.google.com/file/d/0Bw1xURlCeiXiQXphUzlLTV8xWmM/view

4.Hacking The Art of Exploitation Ebook
Download Link : http://www.mediafire.com/file/ht5dy5dwmf4h0j7/hacking-the-art-of-exploitation.pdf

5.The Hacker's Underground Hand Book.
Download Link : http://www.mediafire.com/file/kb94m3pa9zahrv9/The-Hackers-Underground-Handbook.pdf


Here are few links ( Ebooks) that you guys might be interested.


1. The Hacker Playbook : Practical Guide To Penetration Testing
Link : http://www.allitebooks.com/the-hacker-playbook-practical-guide-to-penetration-testing/

2.The Hacker Playbook 2: Practical Guide To Penetration Testing
Link : http://www.allitebooks.com/the-hacker-playbook-2-practical-guide-to-penetration-testing/

3. Android Hacker's Handbook
Link : http://www.allitebooks.com/android-hackers-handbook/

4. BackTrack 5 Wireless Penetration Testing Beginner's Guide
Link : http://www.allitebooks.com/backtrack-5-wireless-penetration-testing-beginners-guide/

5. Black Hat Python
Link : http://www.allitebooks.com/black-hat-python/


HACKING:

https://drive.google.com/file/d/0B9-SOas-c41Vcmo5b29hWWhWTUE/view?usp=drive_web

HACKING CON KALI 2.0:
https://drive.google.com/file/d/0B9-SOas-c41VNEpZOFJ6OThCck0/view?usp=drive_web

HACKING CON FOCA:
https://drive.google.com/file/d/0B9-SOas-c41VQ2E5WkstMko4X1U/view?usp=drive_web

Advanced Cross Site Scripting:
https://drive.google.com/file/d/0B9-SOas-c41VZXkxQWpzQ2lMNGM/view?usp=drive_web

Analisis forense:
https://drive.google.com/file/d/0B9-SOas-c41VX3RhZ2gzNzZ3Zzg/view?usp=drive_web

Ataques a BB.DD.:
https://drive.google.com/file/d/0B9-SOas-c41VT0p1VS1NYUhGaFk/view?usp=drive_web

Complete Cross-site Scripting Walkthrough:
https://drive.google.com/file/d/0B9-SOas-c41Vd2NuOXEtZ2dOSG8/view?usp=drive_web

Cracking sin secretos:
https://drive.google.com/file/d/0B9-SOas-c41VaGx1ckRydW44XzA/view?usp=drive_web

Curso de nmap:
https://drive.google.com/file/d/0B9-SOas-c41VQU5ZY1BhVkUxZVE/view?usp=drive_web

Deep web for hackers:
https://drive.google.com/file/d/0B9-SOas-c41VWmNwME5IVktHQW8/view?usp=drive_web

El arte del engaño:
https://drive.google.com/file/d/0B9-SOas-c41VakNnOXVFejRfaFE/view?usp=drive_web

El internet de las cosas:
https://drive.google.com/file/d/0B9-SOas-c41VN0dwMEc4N25YMnM/view?usp=drive_web

Escaneos con snort:
https://drive.google.com/file/d/0B9-SOas-c41VLTZuRVZjZ0tnZFE/view?usp=drive_web

Ethical hacking 2.0:
https://drive.google.com/file/d/0B9-SOas-c41VZU5KNF9QdWNxX3M/view?usp=drive_web

Exiftool:
https://drive.google.com/file/d/0B9-SOas-c41VbEZBNG15NE9paTQ/view?usp=drive_web

Hackers al descubierto:
https://drive.google.com/file/d/0B9-SOas-c41VWi1xNXd5b0VCbnc/view?usp=drive_web

Hacking web technology:
https://drive.google.com/file/d/0B9-SOas-c41VREU3dl9haWpRaVU/view?usp=drive_web

La biblia de footprinting:
https://drive.google.com/file/d/0B9-SOas-c41VZWZhNWE3Q0wxdDg/view?usp=drive_web

Nessus:
https://drive.google.com/file/d/0B9-SOas-c41VVF9pR0h5VnNhRVU/view?usp=drive_web

Offensive security:
https://drive.google.com/file/d/0B9-SOas-c41VUlROMUo2OUdyNGs/view?usp=drive_web

Sqlmap manual:
https://drive.google.com/file/d/0B9-SOas-c41VVzFQemwxVTFJOE0/view?usp=drive_web

Sqlmap tutorial:
https://drive.google.com/file/d/0B9-SOas-c41VTmJNdlROMzhvd1k/view?usp=drive_web

Tecnicas de sql injection:
https://drive.google.com/file/d/0B9-SOas-c41Vd3BFTVZsRURmQjg/view?usp=drive_web

W3af user guide:
https://drive.google.com/file/d/0B9-SOas-c41VSnZIM2trRlRDSTA/view?usp=drive_web

XSS a fondo:
https://drive.google.com/file/d/0B9-SOas-c41VWHRaeFZGN09KTEU/view?usp=drive_web

XSS con javascript:
https://drive.google.com/file/d/0B9-SOas-c41VaHpwc3dOVmI0MFE/view?usp=drive_web

XSS tunneling:
https://drive.google.com/file/d/0B9-SOas-c41VeWs5bWRYM1kzckU/view?usp=drive_web

XSS hacking tutorial:
https://drive.google.com/file/d/0B9-SOas-c41VdVBoMEpZa2RKR00/view?usp=drive_web

XSS street fight:
https://drive.google.com/file/d/0B9-SOas-c41VMFh4Tl9EdjhqNlk/view?usp=drive_web

XSS attacks:
https://drive.google.com/file/d/0B9-SOas-c41VOXpkUWFCcEdwaFU/view?usp=drive_web

XSS mas alla del alert:
https://drive.google.com/file/d/0B9-SOas-c41VdXFtUXdDd21zZEk/view?usp=drive_web

SEC660 Links

Day 2:

https://blog.skullsecurity.org/2012/everything-you-need-to-know-about-hash-length-extension-attacks
http://fish2.com/ipmi/
https://community.rapid7.com/community/metasploit/blog/2013/07/02/a-penetration-testers-guide-to-ipmi
http://www.reversemode.com/index.php?option=com_content&task=view&id=77&Itemid=1
http://www.scriptjunkie.us/2011/08/network-nightmare/
http://blog.piotrbania.com/2012/07/old-vmware-cloudburst-exploit.html
http://blog.xen.org/index.php/2012/06/13/the-intel-sysret-privilege-escalation/
http://conference.hitb.org/hitbsecconf2012kul/materials/D2T1%20-%20Ollie%20Whitehouse%20-%20Finding%20the%20Weak%20Link%20in%20Binaries.pdf
http://hype-free.blogspot.com/2009/01/loading-meterpreter-in-dll.html
http://blog.didierstevens.com/2008/06/25/bpmtk-bypassing-srp-with-dll-restrictions/
http://blog.didierstevens.com/2010/02/16/memoryloadlibrary-from-c-program-to-shellcode/
http://blog.didierstevens.com/2010/02/08/excel-with-cmd-dll-regedit-dll/
http://blog.didierstevens.com/programs/shellcode/#ShellCodeMemoryModule
http://blog.didierstevens.com/2009/05/06/shellcode-2-vbscript/
http://blog.didierstevens.com/2011/01/24/circumventing-srp-and-applocker-by-design/

Day 3:
http://www.cigital.com/papers/download/bsi4-testing.pdf
http://www.brighthub.com/computing/smb-security/articles/9956.aspx
http://dl.packetstormsecurity.net/papers/general/blackmagic.txt
http://www.packetlevel.ch/html/scapy/scapyipv6.html
http://retrogod.altervista.org/9sg_foxit_overflow.htm
http://fuzzing.org/
https://media.techtarget.com/searchSecurity/downloads/Fuzzing_-_Ch._21.pdf
http://www.symantec.com/connect/articles/beginners-guide-wireless-auditing
https://www.dc414.org/download/confs/defcon15/Speakers/Devarajan/Presentation/dc-15-devarajan.pdf
http://www.fuzzing.org/wp-content/SulleyEpyDoc/public/sulley-module.html
http://fuzzing.org/wp-content/SulleyManual.pdf
https://www.informit.com/articles/article.aspx?p=768663
http://pentest.cryptocity.net/files/fuzzing/sulley/introducing_sulley.pdf

Day 4:
http://www.phrack.org/issues.html?issue=57&id=9
http://cseweb.ucsd.edu/~hovav/dist/noret.pdf
http://packetstormsecurity.com/papers/bypass/aslr-bypass.txt
https://www.ethicalhacker.net/columns/heffner/smashing-the-modern-stack-for-fun-and-profit
http://css.csail.mit.edu/6.858/2012/readings/return-to-libc.pdf
http://packetstorm.interhost.co.il/papers/bypass/smackthestack.txt

Day 5:
http://www.uninformed.org/?v=5&a=2&t=txt
http://packetstorm.interhost.co.il/papers/general/sehop_en.pdf
https://www.blackhat.com/presentations/bh-dc-07/Whitehouse/Presentation/bh-dc-07-Whitehouse.pdf
http://www.microsoft.com/msj/0197/Exception/Exception.aspx
https://www.blackhat.com/presentations/bh-asia-03/bh-asia-03-litchfield.pdf
http://exploit-db.com/wp-content/themes/exploit/docs/187.pdf
https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/
http://www.vnsecurity.net/2010/08/ropeme-rop-exploit-made-easy/
https://trailofbits.files.wordpress.com/2010/04/practical-rop.pdf
https://www.corelan.be/index.php/2011/07/03/universal-depaslr-bypass-with-msvcr71-dll-and-mona-py/
http://vulnfactory.org/blog/2011/09/21/defeating-windows-8-rop-mitigation/
http://pentest.cryptocity.net/files/exploitation/winasm-1.0.1.pdf
http://hick.org/code/skape/papers/win32-shellcode.pdf

 idn-protect-chrome

Chrome extension to alert and possibly block IDN/Unicode websites
https://github.com/phishai/idn-protect-chrome

DiskShadow: The Return of VSS Evasion, Persistence, and Active Directory Database Extraction
https://bohops.com/2018/03/26/diskshadow-the-return-of-vss-evasion-persistence-and-active-directory-database-extraction/

Top Five Ways the Red Team breached the External Perimeter
https://medium.com/@adam.toscher/top-five-ways-the-red-team-breached-the-external-perimeter-262f99dc9d17

Portable Executable File Corruption Preventing Malware From Running
https://toddcullumresearch.com/2017/07/16/portable-executable-file-corruption/

From hacked client to 0day discovery
https://security.infoteam.ch/en/blog/posts/from-hacked-client-to-0day-discovery.html

The Transport Layer Security (TLS) Protocol Version 1.3' to Proposed Standard
https://www.ietf.org/mail-archive/web/ietf-announce/current/msg17592.html

Web Application Penetration Testing Cheat Sheet
https://jdow.io/blog/2018/03/18/web-application-penetration-testing-methodology/
radamsa

a general-purpose fuzzer
https://github.com/aoh/radamsa
arpag

Otomatik exploit aracı
https://github.com/anilbaranyelken/arpag

EE |  Zero to OSCP in 292 Days... or How I Accidentally the Whole Thing - Part 2 | https://blog.mallardlabs.com/zero-to-oscp-in-292-days-or-how-i-accidentally-the-whole-thing-part-2/

Hacking books:-
https://drive.google.com/drive/mobile/folders/0B5rqWHARHFcVNUpNamdoMlRqRm8

Credits:-
@rpranshu and ME

Comments

  1. I know this web page presents quality based content and extra information, is there any other web page which provides these things in quality?

    ReplyDelete

Post a Comment

Popular posts from this blog

How to Enable Windows 10’s Ubuntu Bash Shell