项目作者: ORCA666

项目描述 :
the only place u can acquire knowledge
高级语言:
项目地址: git://github.com/ORCA666/Hacking-P-B.git
创建时间: 2020-10-21T10:00:18Z
项目社区:https://github.com/ORCA666/Hacking-P-B

开源协议:

下载


1. How to Hack Like a GHOST_1647945878569.pdf
2. How to hack like a Pornstar_1647945879030.pdf
2_5451678486475312244_1647945879658.pdf
3. How to Hack Like a GOD_1647945880511.pdf
4. How to Hack Like a Legend_1647945880913.pdf
5. How to Investigate Like a Rockstar_1647945881100.pdf
Black Hat Go Go Programming for Hackers and Pentesters by Dan Kottmann (z-lib.org)_1647945881492.pdf
Black Hat Python Python Programming for Hackers and Pentesters by Justin Seitz (z-lib.org)_1647945881761.pdf
Kali Linux - An Ethical Hackers Cookbook 2nd Edition - Himanshu Sharma by F3thinker (z-lib.org)_1647945882460.pdf
Launching_Exploits_One_Small_Vulnerability_For_A_Company,_One_Giant_1647945883692.pdf
Learn to Program with C_ Learn to Program using the Popular C Programming Language ( PDFDrive )_1647945884542.pdf
Linux Basics for Hackers Getting Started with Networking, Scripting, and Security in Kali by OccupyTheWeb (z-lib.org)_1647945885067.pdf
Mastering Metasploit Write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach by Nipun Jaswal (z-lib.org)_1647945885939.pdf
Programming Windows ( PDFDrive )_1647945888227.pdf
Social Engineering The Art of Human Hacking by Christopher Hadnagy (z-lib.org)_1647945888643.pdf
The Hacker Playbook 3 Practical Guide To Penetration Testing by Peter Kim (z-lib.org).epub_1647945889313.pdf
The web application hacker’s handbook finding and exploiting security flaws by Dafydd Stuttard, Marcus Pinto (z-lib.org).epub_1647945889913.pdf
Threat_Hunting,_Hacking,_and_Intrusion_Detection_SCADA,_Dark_Web_1647945890670.pdf
Windows Internals Part 2 7Ed_1647945891403.pdf
[3]Assembly Language for x86 processors [pdf]_1647945891706.pdf
[4]Reversing-Secrets of Reverse Engineering [print]_1647945892465.pdf
[5]Open Source Fuzzing Tools [print]_1647945892956.pdf
[6]Hacking_ the art of exploitation [print]_1647945893443.pdf
[7]Penetration Testing Shellcode. Detect, exploit, and secure network-level and operating system vulnerabilities_1647945894093.pdf
[8]Buffer Overflow Attacks_ Detect, Exploit, Prevent [print]_1647945894657.pdf
[9]Antivirus hackers handbook[print]_1647945894921.pdf
[A]Windows System Programming_1647945895603.pdf
intel IA 32 _ 64 arch complete manual_1647945896329.pdf
memory manegment --- msdn-documentation_1647945896825.pdf