Home
skip to main
|
skip to sidebar
Kislay Bhardwaj
If you have talent then it's God's gift to you and How to use it, is your gift to God.
Home
Tuesday, September 27, 2011
E-Books on Computer Security
Unknown
-
9:59 AM
As I love reading books and studying the books on security, so today I am posting some links of E-books.
E-book 1
password: flaifle
E-book 2
E-book 3
E-Book 4
E-Book 5
E-Book 6
E-Book 7
Newer Post
Older Post
Home
Labels
Advertising
(1)
Android
(2)
ASP.net
(2)
Bluetooth
(2)
Bot
(3)
Botnet
(3)
Buffer Overflow
(2)
Bypass xss filter
(1)
Cheatsheet
(4)
Cloning
(1)
Denial of Service
(3)
Downloads
(8)
Firewall
(2)
Framework
(6)
GSM
(1)
Introduction
(1)
Intrusion Detection System
(2)
Linux
(7)
Malware
(1)
Metasploit
(13)
Mobile
(2)
Networking
(2)
NeXpose
(2)
Nmap
(2)
Penetration Testing
(15)
Phishing
(1)
Port Scanning
(2)
Reverse shell
(13)
Security
(7)
Sniffing
(3)
Spamming
(1)
Website Hacking
(4)
Wireless
(1)
XSS
(4)
About Me
Priyanshu Sahay
Unknown
Popular Posts
XSSF in Metasploit (XSS Attack by Metasploit)
Hello guys and gals, I was unable to update my site because of lack of time. But I am back with some Metasploit stuff. Here is the XSSF (Cro...
Examples of XSSer
Recently I posted about XSSer, an automated tool for XSS, here are some examples of xsser for those who can't get it on. Firstly Downl...
First Post of my life.
Hello folks, this is my first website and I'm gonna use it in a better way (lolz.) Now what should I post about? Of course Computer Se...
Metasploit Unleashed
I won't explain anything, following are the various attacks by Metasploit. Only metasploit users can understand this, so don't both...
Aggressive Mode VPN -- IKE-Scan, PSK-Crack, and Cain
In IKE Aggressive mode the authentication hash based on a preshared key (PSK) is transmitted as response to the initial packet of a vpn cl...
Home
Followers
About
Feedjit Live Blog Stats
Blogger templates
Follow this blog
Home
The Hacker News
Important Links
Ethical Mohit
Hacker's Online Club
The Hacker News