A Smarter Way to Learn Python - Learn it faster. Remember it longer. by Mark Myers.pdf
Advanced Penetration Testing - Hacking the World_s Most Secure Networks by Wil Allsopp.pdf
Android Hacker_s Handbook by Joshua J. Drake, Zach Lanier, Collin Mulliner, Pau Oliva Fora, Stephen A. Ridley and Georg Wicherski.pdf
Automate the Boring Stuff with Python - Practical Programming for Total Beginners by Al Sweigart.pdf
Black Hat Python - Python Programming for Hackers and Pentesters by Justin Seitz.pdf
CEH Certified Ethical Hacker All-in-One Exam Guide, Fourth Edition by Matt Walker.pdf
CEH v10 Certified Ethical Hacker Study Guide by Ric Messier.pdf
Cellular location tracking attacks using signalling protocols by Aalto University.pdf
Certified Ethical Hacker (CEH) Foundation Guide by Sagar Ajay Rahalkar.pdf
Cybersecurity Illustrated_ Just - Peter Kim.pdf
Cybersecurity for Executives A Practical Guide.pdf
Cybersecurity_ Managing Systems, Conducting Testing, and Investigating Intrusions - Thomas J. Mowbray.pdf
Ethical Hacking With Kali Linux - Learn Fast How To Hack Like A Pro by HUGO HOFFMAN.pdf
Ghost in the Wires - My Adventures as the World_s Most Wanted Hacker by Kevin Mitnick.pdf
Google Hacks - 100 Industrial-Strength Tips _ Tools 1st Edition by Tara Calishain and Rael Dornfest.pdf
Hackers Beware - The Ultimate Guide to Network Security by Eric Cole.pdf
Hacking - Beginner to Expert Guide to Computer Hacking, Basic Security, and Penetration Testing (Computer Science Series) by James Patterson.pdf
Hacking - Networking and Security (2 Books in 1 - Hacking with Kali Linux _ Networking for Beginners) by John Medicine.pdf
Hacking - The Art of Exploitation, 2nd Edition by Jon Erickson.pdf
Hacking Exposed - Network Security Secrets _ Solutions, Third Edition (Hacking Exposed) by Joel Scambray, Stuart McClure and George Kurtz.pdf
Hacking Exposed Cisco Networks - Cisco Security Secrets _ Solutions by Andrew Vladimirov, Konstantin Gavrilenko and Andrei Mikhailovsky.pdf
Hacking Gmail by Ben Hammersley.pdf
Hacking VoIP Exposed by David Endler, TippingPoint, Mark Collier and SecureLogix.pdf
Hacking With Kali Linux - The Practical Beginner_s Guide to Learn How To Hack With Kali Linux in One Day Step-by-Step (#2020 Updated Version) by Steve Tudor.pdf
Hacking mobile network via SS7 - interception, shadowing and more by Dmitry Kurbatov.pdf
Hacking, The Next Generation.pdf
IRC Hacks by Paul Mutton.pdf
Kali Linux Revealed - Mastering the Penetration Testing Distribution by Jim O_Gorman, Mati Aharoni, and Raphael Hertzog.pdf
Kevin D. Mitnick & William L. Simon - The Art Of Deception.pdf
Kurose J.F., Ross K.W. - Computer Networking A Top Down Approach 6th Edition - 2012.pdf
Linux Basics for Hackers - Getting Started with Networking, Scripting, and Security in Kali by OccupyTheWeb.pdf
Mastering Kali Linux for Advanced Penetration Testing by Robert W. Beggs.pdf
Metasploit - The Penetration Tester_s Guide by David Kennedy.pdf
Mobile Application Penetration Testing by Vijay Kumar Velu.pdf
Nmap Cookbook - The Fat-free Guide to Network Scanning by Nicholas Marsh.pdf
Penetration Testing - 3 Manuscripts—Wireless Hacking, Tor and the Dark Net, and Powershell by Logan Styles.pdf
Penetration Testing A Hands-On Introduction to Hacking by Georgia Weidman.pdf
Practical Anti-virus Evasion by Daniel Sauder.pdf
Practical Lock Picking - A Physical Penetration Tester_s Training Guide by Deviant Ollam.pdf
Python Crash Course, 2nd Edition - A Hands-On, Project-Based Introduction to Programming by Eric Matthes.pdf
Python for Offensive PenTest - A practical guide to ethical hacking and penetration testing using Python by Hussam Khrais .pdf
RTFM - Red Team Field Manual [PDF] [01QLT].pdf
RTFM - Red Team Field Manual v3.pdf
Radware_s DDoS Handbook - The Ultimate Guide to Everything You Need to Know about DDoS Attacks by Radware.pdf
Real-World Bug Hunting - A Field Guide to Web Hacking by Peter Yaworski.pdf
Red Team - How to Succeed by Thinking Like the Enemy by Micah Zenko.pdf
Rtfm - Red Team Field Manual 1.0 Edition by Ben Clark.pdf
SCTPscan - Finding entry points to SS7 Networks _ Telecommunications Backbones by Philippe Langlois.pdf
SIGNALING SYSTEM 7 (SS7) - SECURITY REPORT.pdf
SS7 - Locate. Track. Manipulate. by Tobias Engel.pdf
Signaling System 7 (SS7).pdf
Stealthy SS7 Attacks by Sergey Puzankov.pdf
Telecommunications Infrastructure - Security SS7 Signalling Security by Philippe Langlois.pdf
The Basics of Hacking and Penetration Testing - Ethical Hacking and Penetration Testing Made Easy by Patrick Engebretson.pdf
The Browser Hacker_s Handbook by Wade Alcorn, Christian Frichot and Michele Orru.pdf
The Database Hacker_s Handbook - Defending Database Servers by David Litchfield, Chris Anley, John Heasman and Bill Grindlay.pdf
The Hacker Playbook 3 - Practical Guide To Penetration Testing by Peter Kim.pdf
The IoT Hacker_s Handbook - A Practical Guide to Hacking the Internet of Things by Aditya Gupta.pdf
The Mac Hacker_s Handbook by Charlie Miller and Dino Dai Zovi.pdf
The Mobile Application Hacker_s Handbook by Dominic Chell, Tyrone Erasmus, Shaun Colley and Ollie Whitehouse.pdf
The Shellcoder_s Handbook - Discovering and Exploiting Security Holes by Chris Anley, John Heasman, Felix Lindner and Gerardo Richarte.pdf
The Web Application Hacker_s Handbook - Finding and Exploiting Security Flaws, 2nd Edition by Dafydd Stuttard, Marcus Pinto.pdf
Violent Python - A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers by TJ O_Connor.pdf
Vulnerabilities of signaling system number 7 (SS7) to cyber attacks and how to mitigate against these vulnerabilities. by Bob Kamwendo.pdf
iOS Hacker_s Handbook by Charlie Miller, Dion Blazakis, Dino DaiZovi, Stefan Esser, Vincenzo Iozzo and Ralf-Philipp Weinmann.pdf
You can’t perform that action at this time.