Impresionante recopilatorio con el top 100 de libros de hacking del blog de Raj Chandel:
- Kali Linux – Assuring Security by Penetration Testing
- Network Analysis Using Wireshark Cookbook
- Computer Security Handbook, 6th Edition
- iPad and iPhone Kung Fu: Tips, Tricks, Hints, and Hacks for iOS 7
- Android Security Cookbook
- Penetration Testing with BackBox
- Kali Linux Social Engineering
- Computer Forensics with FTK
- Android Hacker’s Handbook
- Practical Reverse Engineering
- Malware Forensics Field Guide for Linux Systems
- Learning Pentesting for Android
- The Hacker Playbook: Practical Guide To Penetration Testing
- Learning Metasploit Exploitation and Development
- Web Penetration Testing with Kali Linux
- Metasploit Penetration Testing Cookbook Combo Pack (1st+2nd Edition)
- Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions
- The Browser Hacker’s Handbook 2014
- Hacking Politics
- The Basics of Web Hacking Tools and Techniques to Attack the Web
- Investigative Computer Forensics The Practical Guide for Lawyers, Accountants, Investigators, and Business Executives
- The Basics of Hacking and Penetration Testing, Second Edition
- Professional Penetration Testing
- The State of the Art in Intrusion Prevention and Detection
- Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners (Second Edition)
- Hacking with Kali: Practical Penetration Testing Techniques
- Wireshark 101: Essential Skills for Network Analysis
- Hacking Raspberry Pi 2013
- Blackhatonomics: An Inside Look at the Economics of Cybercrime
- Hacking and Securing iOS Applications
- iOS Hacker’s Handbook
- Windows Forensics Analysis Toolkit
- Linux Server Hacks
- Violent Python – A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
- Instant Penetration Testing: Setting Up a Test Lab How-to
- Coding Freedom: The Ethics and Aesthetics of Hacking
- The Basics of Hacking and Penetration Testing
- The Unrevealed Secrets of Hacking and Cracking
- Wireshark Network Analysis – Second Edition
- The Basics of Information Security
- Secrets of Network Cartography
- Seven Deadliest Network Attacks
- Metaprogramming Ruby: Program Like the Ruby Pros
- Next-Generation Firewalls for Dummies
- The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
- Hacking Exposed 7: Network Security Secrets & Solutions, Seventh Edition
- Reversing: Secrets of Reverse Engineering
- Unauthorised Access – Physical Penetration Testing For IT Security Teams
- Advanced Penetration Testing for Highly-Secured Environments
- Gray Hat Python: Python Programming for Hackers and Reverse Engineers
- Network Forensics Tracking Hackers through Cyberspace
- Hackin9 Guide to BackTrack
- Coding For Penetration Testers
- Practical Malware Analysis
- Exploiting Software: How to Break Code
- Hacker’s Delight
- Hackers Heroes of the Computer Revolution
- Facebook Hacking E-Book (Free Download)
- Hacking The Next Generation
- 24 Deadly Sins of Software Security
- The Crypter Blue Print
- Google Hacking for Penetration Tester
- Wireless Kungfu Networking & Hacking
- Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
- Dark Market- CyberThieves CyberCrime and you
- Policing Cyber Crime
- Metasploit (The Penetration Tester’s Guide)
- The Art of Deception
- Ghost in the Wires (Free Download)
- BackTrack 5 Wireless Penetration Testin
- Windows 7 Tweaks (Best Book for Windows 7 Lovers)
- Free Download Hacker Highschool (13 Books)
- Hacking Beware
- Batch File Programming
- Windows 7 Bible
- Two Beginner Guide of Hacking
- Evolution of Cyber Crime
- Buffer Overflow Attacks
- Hacking for Dummies
- The CEH Prep Guide
- SQL Injection Attack and Defense
- Guide to Computer Forensics and Investigation
- Stealing the Network (E-Book)
- Cyber Forensics (E-Book)
- Gmail Hacking (New Hacking E-Book)
- Hacking Computer forensics Exposed
- You Tube Hacking (My New E-Book)
- Footprinting (My New Hacking E-Book)
- Hacking Exposed (E-Book)
- Forensic Computer Crime Invsestigation
- Window Based Command Line Tools (E Book)
- Hacking GPS (E- Book)
- Window Based GUI Tools (E Book)
- Hacker Cracker
- Penetration Testing Procedures & Methodologies
- CEH V8 Course + Lab Manual
- Secure Network Infrastructures by EC-Council
- Penetration Testing Communication Media Testing
- Computer Forensics Investigating Wireless Networks and Devices
- Computer Forensics – Investigating Data and Image Files
=O !!!!!!
ResponderEliminarPeazo recopilación¡¡¡ se agradeze...
ResponderEliminarsoy el unico al que los zip, les pide password? :-/
ResponderEliminarAlgunos tienen contraseña:
EliminarPassword: www.hackingarticles.in
Muchas Gracias!!! (Y)
EliminarSi estuvieran en español fuera mejor, pero igual gracias por el aporte :)
ResponderEliminarsi supieras ingles, estaría mejor, cachorro.
EliminarFalta el de Pentesting con FOCA, alguien que pase el link!!!
ResponderEliminarCreo que no hay en pdf ningun libro de 0xworld :(
Eliminar!! Como te pille Chema Alonso te va a crujir el ojete chaval !!
Eliminarvamos que tiene que haber alguien que se lo haya descargado, compartir la url.
Eliminarporfa, si alguien lo tiene que lo comparta.
Eliminarcompartir no es robar
porfa, si alguien lo tiene que lo comparta.
Eliminarcompartir no es robar
file:///C:/Users/PC1U/Downloads/Pentesting%20con%20FOCA.html
Eliminarfile:///C:/Users/PC1U/Downloads/Pentesting%20con%20FOCA.html
Eliminarmira si sirve
Eliminarentren a mi nuevo blog contiene informacion de todo tipo, desde computacion asta quimica y fisica.
ResponderEliminarhttp://ccenteras.blogspot.com/
Este comentario ha sido eliminado por el autor.
ResponderEliminartengan mucha cautela por que los que dicen sql y wireless son archivos .exe pasados a archivos .rar pa montar paja. chinga con esos cagones ps como que les gusta lo caliente. tan buscando gente mejor que su nivel y de paso descomprimi el archivo .rar del sql ni me lo pille solo que me decia la pass 123 lo extrai y al tope un archivo .exe y de paso autoejecutable ni pa pasarlo a virustotal buehh el que tenga nivel que se meta hay a ver
ResponderEliminarY EL ZIP CON LOS 100 MANUALES?
ResponderEliminarURL DE PENTESTING CON FOCA PLS
ResponderEliminardame un email y te lo envio
Eliminar