Create an account

Very important

  • To access the important data of the forums, you must be active in each forum and especially in the leaks and database leaks section, send data and after sending the data and activity, data and important content will be opened and visible for you.
  • You will only see chat messages from people who are at or below your level.
  • More than 500,000 database leaks and millions of account leaks are waiting for you, so access and view with more activity.
  • Many important data are inactive and inaccessible for you, so open them with activity. (This will be done automatically)


Thread Rating:
  • 532 Vote(s) - 3.35 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Cybersecurity ebooks (humblebundle)

#1
So I just bought this pack of cybersecurity books on humble bundle, and thought I'd share it with you guys.

I'm not sure if I should provide virus scan as well, but if so, would it just be scans of the url? Since the dvd is too big to upload to virustotal.

Anyways, the list is as follows:

  • Advanced Penetration Testing -

    [To see links please register here]

    |

    [To see links please register here]

  • Applied Cryptography: Protocols, Algorithms and Source Code in C, 20th Anniversary Edition -

    [To see links please register here]

    |

    [To see links please register here]

  • The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory -

    [To see links please register here]

    |

    [To see links please register here]

  • Cryptography Engineering: Design Principles and Practical Applications -

    [To see links please register here]

    |

    [To see links please register here]

  • Investigating Cryptocurrencies -

    [To see links please register here]

    |

    [To see links please register here]

  • Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code (book only) -

    [To see links please register here]

    |

    [To see links please register here]

  • Malware Analyst's Cookbook DVD (book and dvd) -

    [To see links please register here]

  • Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation -

    [To see links please register here]

    |

    [To see links please register here]

  • Reversing: Secrets of Reverse Engineering -

    [To see links please register here]

    |

    [To see links please register here]

  • Secrets and Lies: Digital Security in a Networked World, 15th Anniversary Edition -

    [To see links please register here]

  • Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd Edition -

    [To see links please register here]

    |

    [To see links please register here]

  • The Shellcoder's Handbook: Discovering and Exploiting Security Holes, 2nd Edition -

    [To see links please register here]

    |

    [To see links please register here]

  • Threat Modeling: Designing for Security -

    [To see links please register here]

    |

    [To see links please register here]

  • The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, 2nd Edition -

    [To see links please register here]

    |

    [To see links please register here]

  • Wireshark for Security Professionals -

    [To see links please register here]

    |

    [To see links please register here]



I think there's some good ones in there, especially the last 4 on the list.

Hope you guys can use it.
Reply

#2
Thanks for sharing within the community. Keep bring more out
Reply

#3
Nice compilation.

Also appreciate the direct links.
Reply

#4
I'm glad you can use it. No problem with the virus scan missing? Is it only for executables?
Reply

#5
Quote:(07-31-2018, 07:37 PM)Suiziide Wrote:

[To see links please register here]

No problem with the virus scan missing? Is it only for executables?

Due to the nature of executable files, an online virus scan report must be provided.

We do require a virus scan will all files personally uploaded, referenced and contributed. However, a handful of your contributions are too large. Given the number of Individual links, a single archive containing each file (within the capacity of the virus scan) will suffice.
Reply

#6
I just packed all the books in 3 archives and uploaded it, only things not tested is pdf of applied cryptography and the dvd.

[To see links please register here]


[To see links please register here]


This one ^^ is the one with shellcode book in it, so I suppose something written in the book triggers something..

[To see links please register here]

Reply

#7
Thanks for the share. This is a nice collection of books!
Reply

#8
thanks bro imma download all of em
Reply

#9
Added to my drive thanks for sharing :smile:
btw currently i'm learning CEH v9
Reply

#10
Quote:(08-24-2018, 10:25 AM)CyberGhost Wrote:

[To see links please register here]

Added to my drive thanks for sharing :smile:
btw currently i'm learning CEH v9 :smile:

If you're Interested In this sector and have the time, The Web Application Hacker's Handbook Is definitely a good read.

The Art of Memory Forensics Is also worthy of reading. It's quite In depth and details beyond conventional analytical methods.
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

©0Day  2016 - 2023 | All Rights Reserved.  Made with    for the community. Connected through