Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



 2183

100+ HACKING AND SECURITY E-BOOKS MEGAPACK

by cartman8998 - 15 June, 2024 - 08:45 PM
This post is by a banned member (cartman8998) - Unhide
39
Posts
30
Threads
#1
[Image: hacking-and-security-ebooks-megapack-png.215627]

| 1. | Advanced Penetration Testing | 269 Pages |
| 2. | The Basics of Web Hacking | 179 Pages |
| 3. | The Basics of Hacking and Penetration Testing | 178 Pages |
| 4. | The Art of Deception by Kevin Mitnick | 577 Pages |
| 5. | SQL Injection Attacks and Defense | 761 Pages |
| 6. | Metasploit - The Penetration Tester’s Guide | 332 Pages |
| 7. | Ethical Hacking and Penetration Testing Guide | 523 Pages |
| 8. | Network Attacks and Exploitation - A Framework | 219 Pages |
| 9. | Python Web Penetration Testing Cookbook | 224 Pages |
| 10. | Wireshark for Security Professionals | 391 Pages |
| 11. | Mastering Modern Web Penetration Testing | 298 Pages |
| 12. | The Shellcoder’s Handbook | 745 Pages |
| 13. | The Little Black Book of Computer Viruses | 183 Pages |
| 14. | XSS Attacks - Cross Site Scripting Exploits and Defense | 482 Pages |
| 15. | The Web Application Hacker’s Handbook | 771 Pages |
| 16. | Ethical Hacking and Countermeasures | 239 Pages |
| 17. | Reversing - Secrets of Reverse Engineering | 619 Pages |
| 18. | Network Security Bible | 697 Pages |
| 19. | Hacking Web Applications - Hacking Exposed | 416 Pages |
| 20. | Hacking for Dummies | 387 Pages |
| 21. | Hacking Wireless Network for Dummies | 387 Pages |
| 22. | Ninja Hacking - Unconventional Penetration Testing Tacting and Techniques | 314 pages |
| 23. | Professional Penetration Testing | 525 Pages |
| 24. | Gray Hat Hacking - The Ethical Hacker’s Handbook | 577 Pages |
| 25. | Hack Attacks Testing | 561 Pages |
| 26. | Basic Security Testing with Kali Linux | 242 Pages |
| 27. | Mastering Kali Linux for Advanced Penetration Testing | 356 Pages |
| 28. | Kali Linux CTF Blueprints | 190 Pages |
| 29. | Kali Linux Cookbook | 261 Pages |
| 30. | Kali Linux - Assuring Security by Penetration Testing | 454 Pages |
| 31. | Information Security Management Handbook | 3206 Pages |
| 32. | Computer and Information Security Handbook | 877 Pages |
| 33. | CISSP - Certified Information Systems Security Professional | 804 Pages |
| 34. | Computer Security and Cryptography | 542 Pages |
| 35. | Python for Kids | 348 Pages |
| 36. | End to End Network Security - Defense-in-Depth | 469 Pages |
| 37. | A Guide to Computer Network Security | 483 Pages |
| 38. | Essential Computer Security | 321 Pages |
| 39. | Security in Wireless Mesh Networks | 548 Pages |
| 40. | Hacking Windows XP (OLD) | 379 Pages |
| 41. | Hacking Exposed - Windows Security, Secrets and Solutions | 482 Pages |
| 42. | Hacking Exposed - Network Security, Secrets and Solutions | 736 Pages |
| 43. | Information Security - Principles and Pratice | 413 Pages |
| 44. | Nessus, Snort and Ethereal Power Tools | 472 Pages |
| 45. | Active Defense - A Comprehensive Guide to Network Security | 374 Pages |
| 46. | Information Security Fundamentals | 262 Pages |
| 47. | Wireless Network Security | 422 Pages |
| 48. | Red Hat Linux Security and Optimization | 721 Pages |
| 49. | Windows Forensics Analysis | 386 Pages |
| 50. | Mobile and Wireless Network Security and Privacy | 232 Pages |
| 51. | Firewalls and Internet Security | 456 Pages |
| 52. | An Introduction to Computer Security - The NIST Handbook | 290 Pages |
| 53. | Unauthorized Access - Physical Penetration Testing for IT Security Teams | 309 Pages |
| 54. | Testing Web Security | 297 Pages |
| 55. | Maximum Security - A Hacker’s Guide to Protecting Your Internet Site and Network | 670 Pages |
| 56. | Information Resource Guide - Computer, Internet and Network Systems Security | 325 Pages |
| 57. | The Hacker’s Underground Handbook | 116 Pages |
| 58. | Guide to SCADA and Industrial Control Systems Security | 164 Pages |
| 59. | The International Handbook of Computer Security | 274 Pages |
| 60. | The Code Book - How to Make It, Break It, Hack It, Crack It | 273 Pages |
| 61. | Linux 101 Hacks | 271 Pages |
| 62. | Introduction to Linux - A Hands on Guide | 223 Pages |
| 63. | Bluetooth Security | 222 Pages |
| 64. | IT Governance - A Manager’s Guide to Data Security and ISO 27001/27002 | 385 Pages |
| 65. | Batch File Programming | 155 Pages |
| 66. | Cracking the Coding Interview | 310 Pages |
| 67. | Dictionary of Networking | 465 Pages |
| 68. | Hacking Gmail | 310 Pages |
| 69. | Linux Complete Command Reference | 1528 Pages |
| 70. | Practical Hacking Techniques and Countermeasures | 752 Pages |
| 71. | The Art of Intrusion by Kevin Mitnick | 291 Pages |
| 72. | Hack Notes - Windows Security Portable Reference | 289 Pages |
| 73. | Hacking - The Next Generation | 298 Pages |
| 74. | Hacking the Cable Modem | 330 Pages |
| 75. | Hackers Beware - Defending Your Network From The Wiley Hacker | 817 Pages |
| 76. | Hack Proofing Your Network | 826 Pages |
| 77. | Hack Attacks Revealed | 837 Pages |
| 78. | Dissecting the Hack - The F0rb1dd3n Network | 441 Pages |
| 79. | TCP/IP Guide | 1671 Pages |
| 80. | Offensive Security - Wireless Attacks - WiFu | 385 Pages |
| 81. | Google Hacking - For Penetration Testers | 529 Pages |
| 82. | Computer Forensics Investigating Network Intrusions and Cyber Crime | 394 Pages |
| 83. | Hakin9 Bible | 207 Pages |
| 84. | Network Forensics - Tracking Hackers Through Cyberspace | 574 Pages |
| 85. | Computer Forensics - Investigating Data and Image Files | 227 Pages |
| 86. | Penetration Testing and Network Defense | 625 Pages |
| 87. | Hacking Exposed - Malware and Rootkits | 401 Pages |
| 88. | Malware Analyst’s Cookbook | 746 Pages |
| 89. | Mobile Malware - Attacks and Defense | 386 Pages |
| 90. | Java 2 Network Security | 702 Pages |
| 91. | A Bug Hunter’s Diary | 212 Pages |
| 92. | Viruses Revealed - Understand and Counter Malicious Software | 721 Pages |
| 93. | Figital Forensics With Open Source Tools | 289 Pages |
| 94. | SSH, The Secure Shell - The Definitive Guide | 438 Pages |
| 95. | Pro PHP Security | 369 Pages |
| 96. | Zero Day Exploit - Countdown to Darkness | 363 Pages |
| 97. | Metasploit Penetration Testing Cookbook | 269 Pages |
| 98. | 24 Deadly Sins of Software Securtiy | 433 Pages |
| 99. | Botnets - The Killer Web App | 482 Pages |
| 100. | Hacker Highschool - Hack School for Beginners (ZIP) | 12 Books |


Hidden Content
You must register or login to view this content.

[Image: Cpuo8kp.gif]
This post is by a banned member (mabamire) - Unhide
mabamire  
Registered
19
Posts
0
Threads
1 Year of service
#2
wp
This post is by a banned member (sufi420) - Unhide
This post is by a banned member (Plouff12) - Unhide
Plouff12  
Registered
19
Posts
0
Threads
#4
(15 June, 2024 - 08:45 PM)RefundGod Wrote: Show More
[Image: hacking-and-security-ebooks-megapack-png.215627]

| 1. | Advanced Penetration Testing | 269 Pages |
| 2. | The Basics of Web Hacking | 179 Pages |
| 3. | The Basics of Hacking and Penetration Testing | 178 Pages |
| 4. | The Art of Deception by Kevin Mitnick | 577 Pages |
| 5. | SQL Injection Attacks and Defense | 761 Pages |
| 6. | Metasploit - The Penetration Tester’s Guide | 332 Pages |
| 7. | Ethical Hacking and Penetration Testing Guide | 523 Pages |
| 8. | Network Attacks and Exploitation - A Framework | 219 Pages |
| 9. | Python Web Penetration Testing Cookbook | 224 Pages |
| 10. | Wireshark for Security Professionals | 391 Pages |
| 11. | Mastering Modern Web Penetration Testing | 298 Pages |
| 12. | The Shellcoder’s Handbook | 745 Pages |
| 13. | The Little Black Book of Computer Viruses | 183 Pages |
| 14. | XSS Attacks - Cross Site Scripting Exploits and Defense | 482 Pages |
| 15. | The Web Application Hacker’s Handbook | 771 Pages |
| 16. | Ethical Hacking and Countermeasures | 239 Pages |
| 17. | Reversing - Secrets of Reverse Engineering | 619 Pages |
| 18. | Network Security Bible | 697 Pages |
| 19. | Hacking Web Applications - Hacking Exposed | 416 Pages |
| 20. | Hacking for Dummies | 387 Pages |
| 21. | Hacking Wireless Network for Dummies | 387 Pages |
| 22. | Ninja Hacking - Unconventional Penetration Testing Tacting and Techniques | 314 pages |
| 23. | Professional Penetration Testing | 525 Pages |
| 24. | Gray Hat Hacking - The Ethical Hacker’s Handbook | 577 Pages |
| 25. | Hack Attacks Testing | 561 Pages |
| 26. | Basic Security Testing with Kali Linux | 242 Pages |
| 27. | Mastering Kali Linux for Advanced Penetration Testing | 356 Pages |
| 28. | Kali Linux CTF Blueprints | 190 Pages |
| 29. | Kali Linux Cookbook | 261 Pages |
| 30. | Kali Linux - Assuring Security by Penetration Testing | 454 Pages |
| 31. | Information Security Management Handbook | 3206 Pages |
| 32. | Computer and Information Security Handbook | 877 Pages |
| 33. | CISSP - Certified Information Systems Security Professional | 804 Pages |
| 34. | Computer Security and Cryptography | 542 Pages |
| 35. | Python for Kids | 348 Pages |
| 36. | End to End Network Security - Defense-in-Depth | 469 Pages |
| 37. | A Guide to Computer Network Security | 483 Pages |
| 38. | Essential Computer Security | 321 Pages |
| 39. | Security in Wireless Mesh Networks | 548 Pages |
| 40. | Hacking Windows XP (OLD) | 379 Pages |
| 41. | Hacking Exposed - Windows Security, Secrets and Solutions | 482 Pages |
| 42. | Hacking Exposed - Network Security, Secrets and Solutions | 736 Pages |
| 43. | Information Security - Principles and Pratice | 413 Pages |
| 44. | Nessus, Snort and Ethereal Power Tools | 472 Pages |
| 45. | Active Defense - A Comprehensive Guide to Network Security | 374 Pages |
| 46. | Information Security Fundamentals | 262 Pages |
| 47. | Wireless Network Security | 422 Pages |
| 48. | Red Hat Linux Security and Optimization | 721 Pages |
| 49. | Windows Forensics Analysis | 386 Pages |
| 50. | Mobile and Wireless Network Security and Privacy | 232 Pages |
| 51. | Firewalls and Internet Security | 456 Pages |
| 52. | An Introduction to Computer Security - The NIST Handbook | 290 Pages |
| 53. | Unauthorized Access - Physical Penetration Testing for IT Security Teams | 309 Pages |
| 54. | Testing Web Security | 297 Pages |
| 55. | Maximum Security - A Hacker’s Guide to Protecting Your Internet Site and Network | 670 Pages |
| 56. | Information Resource Guide - Computer, Internet and Network Systems Security | 325 Pages |
| 57. | The Hacker’s Underground Handbook | 116 Pages |
| 58. | Guide to SCADA and Industrial Control Systems Security | 164 Pages |
| 59. | The International Handbook of Computer Security | 274 Pages |
| 60. | The Code Book - How to Make It, Break It, Hack It, Crack It | 273 Pages |
| 61. | Linux 101 Hacks | 271 Pages |
| 62. | Introduction to Linux - A Hands on Guide | 223 Pages |
| 63. | Bluetooth Security | 222 Pages |
| 64. | IT Governance - A Manager’s Guide to Data Security and ISO 27001/27002 | 385 Pages |
| 65. | Batch File Programming | 155 Pages |
| 66. | Cracking the Coding Interview | 310 Pages |
| 67. | Dictionary of Networking | 465 Pages |
| 68. | Hacking Gmail | 310 Pages |
| 69. | Linux Complete Command Reference | 1528 Pages |
| 70. | Practical Hacking Techniques and Countermeasures | 752 Pages |
| 71. | The Art of Intrusion by Kevin Mitnick | 291 Pages |
| 72. | Hack Notes - Windows Security Portable Reference | 289 Pages |
| 73. | Hacking - The Next Generation | 298 Pages |
| 74. | Hacking the Cable Modem | 330 Pages |
| 75. | Hackers Beware - Defending Your Network From The Wiley Hacker | 817 Pages |
| 76. | Hack Proofing Your Network | 826 Pages |
| 77. | Hack Attacks Revealed | 837 Pages |
| 78. | Dissecting the Hack - The F0rb1dd3n Network | 441 Pages |
| 79. | TCP/IP Guide | 1671 Pages |
| 80. | Offensive Security - Wireless Attacks - WiFu | 385 Pages |
| 81. | Google Hacking - For Penetration Testers | 529 Pages |
| 82. | Computer Forensics Investigating Network Intrusions and Cyber Crime | 394 Pages |
| 83. | Hakin9 Bible | 207 Pages |
| 84. | Network Forensics - Tracking Hackers Through Cyberspace | 574 Pages |
| 85. | Computer Forensics - Investigating Data and Image Files | 227 Pages |
| 86. | Penetration Testing and Network Defense | 625 Pages |
| 87. | Hacking Exposed - Malware and Rootkits | 401 Pages |
| 88. | Malware Analyst’s Cookbook | 746 Pages |
| 89. | Mobile Malware - Attacks and Defense | 386 Pages |
| 90. | Java 2 Network Security | 702 Pages |
| 91. | A Bug Hunter’s Diary | 212 Pages |
| 92. | Viruses Revealed - Understand and Counter Malicious Software | 721 Pages |
| 93. | Figital Forensics With Open Source Tools | 289 Pages |
| 94. | SSH, The Secure Shell - The Definitive Guide | 438 Pages |
| 95. | Pro PHP Security | 369 Pages |
| 96. | Zero Day Exploit - Countdown to Darkness | 363 Pages |
| 97. | Metasploit Penetration Testing Cookbook | 269 Pages |
| 98. | 24 Deadly Sins of Software Securtiy | 433 Pages |
| 99. | Botnets - The Killer Web App | 482 Pages |
| 100. | Hacker Highschool - Hack School for Beginners (ZIP) | 12 Books |

gg
This post is by a banned member (WaqasHaneef) - Unhide
125
Posts
0
Threads
#5
bnm,oiuf
This post is by a banned member (gettexik) - Unhide
gettexik  
Registered
149
Posts
2
Threads
#6
Ty
This post is by a banned member (Jorge348) - Unhide
Jorge348  
Registered
137
Posts
0
Threads
#7
Thx
This post is by a banned member (Riskthat) - Unhide
Riskthat  
Registered
15
Posts
0
Threads
#8
Thx

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 13 Guest(s)