Hacking E-books and Videos:
1> Collection of Cracking Tutorials by Lena (A must for newbies)
Olly + assembler + patching a basic reverseme
Keyfiling the reverseme + assembler
Basic nag removal + header problems
Basic + aesthetic patching
Comparing on changes in cond jumps, animate over/in, breakpoints
"The plain stupid patching method", searching for textstrings
Intermediate level patching, Kanal in PEiD
Debugging with W32Dasm, RVA, VA and offset, using LordPE as a hexeditor
Explaining the Visual Basic concept, introduction to SmartCheck and configuration
Continued reversing techniques in VB, use of decompilers and a basic anti-anti-trick
Intermediate patching using Olly's "pane window"
Guiding a program by multiple patching.
The use of API's in software, avoiding doublechecking tricks
More difficult schemes and an introduction to inline patching
How to study behaviour in the code, continued inlining using a pointer
Reversing using resources
Insights and practice in basic (self)keygenning
Diversion code, encryption/decryption, selfmodifying code and polymorphism
Debugger detected and anti-anti-techniques
Packers and protectors : an introduction
Imports rebuilding
API Redirection
Stolen bytes
Patching at runtime using loaders from lena151 original
Continued patching at runtime & unpacking armadillo standard protection
Machine specific loaders, unpacking & debugging armadillo
tElock + advanced patching
Bypassing & killing server checks
Killing & inlining a more difficult server check
SFX, Run Trace & more advanced string searching
Delphi in Olly & DeDe
Author tricks, HIEW & approaches in inline patching
The FPU, integrity checks & loader versus patcher
Reversing techniques in packed software & a S&R loader for ASProtect
Inlining inside polymorphic code
Keygenning
In-depth unpacking & anti-anti-debugging a combination packer / protector
Unpacking continued & debugger detection by DLL's and TLS
Inlining a blowfish scheme in a packed & CRC protected dll + unpacking Asprotect SKE 2.2
Obfuscation and algorithm hiding
Owner : Made by Lena, uploaded by FellowHacker
CODE
http://rapidshare.com/files/75998360/Lena_sTutsUppedByFH.part1.rar
http://rapidshare.com/files/76000022/Lena_sTutsUppedByFH.part2.rar
Online Mirror
CODE
http://mathijs.info/inc/stuff.php?stuff=cracktut
Password for the rar files :
QUOTE
Password : FellowHacker@Forum.astalavista.ms
2> huge hacking tutorials 2008
CODE
http://rapidshare.com/files/131156742/1000HackerTutorials2008-williwacker-www.softarchive.net.rar
mirror
CODE
http://depositfiles.com/en/files/6678884
3> Hack Attacks Testing: How to Conduct Your Own Security Audit
Hack Attacks Testing: How to Conduct Your Own Security Audit (Paperback) [ebook][PDF]
Product Description
Learn how to conduct thorough security examinations via illustrations and virtual simulations
A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the vulnerabilities and close the holes before someone gets in. Written by veteran author and security expert John Chirillo, Hack Attacks Testing explains how to perform your own security audits.
Download:
CODE
http://rapidshare.com/files/129556097/14.07.2008_bigteam.c.la_Hack_Attacks_Testing.rar
4> Google Hacks
Google Hacks is a collection of industrial-strength, real-world, tested solutions to practical problems. This concise book offers a variety of interesting ways for power users to mine the enormous amount of information that Google has access to, and helps you have fun while doing it. You'll learn clever and powerful methods for using the advanced search interface and the new Google API, including how to build and modify scripts that can become custom business applications based on Google. Google Hacks contains 100 tips, tricks and scripts that you can use to become instantly more effective in your research. Each hack can be read in just a few minutes, but can save hours of searching for the right answers.
Rapidshare download Link:
CODE
http://rapidshare.com/files/128910764/Google_Hacks_-_100_Industrial-Strength_Tips___Tools.rar
5> Harry Potter Collection, Harry Potter is a series of seven fantasy novels by English author J.
CODE
http://rapidshare.com/files/21874543/J._20K._20Rowling_20-_20Harry_20Potter_20and_20the_20Sorcerer_27s_20Stone.pdf
http://rapidshare.com/files/35979594/Book_2_-_Harry_Potter_and_the_Chamber_of_Secrets.pdf
http://rapidshare.com/files/35979950/Book_3_-_Harry_Potter_and_the_Prisoner_of_Azkaban.pdf
http://rapidshare.com/files/35979950/Book_3_-_Harry_Potter_and_the_Prisoner_of_Azkaban.pdf
http://rapidshare.com/files/35979950/Book_3_-_Harry_Potter_and_the_Prisoner_of_Azkaban.pdf
http://rapidshare.com/files/21874252/Rowling__20J._20K._20-_206_20-_20Harry_20Potter_20and_20The_20Half-Blood_20Prince.pdf
6> REVERSE ENGINEERING
Anybody need an e-book on reverse engineering here it is:
CODE
http://rs44.rapidshare.com/files/10724737/Reversing-Secrets.of.Reverse.Engineering.with.SOURCE-0764574817.rar
7> 200 Hacking Tutorials must see!!
CODE
http://rapidshare.com/files/58388700/200_Hacking_Tutorials.rar
Password : WwW.TheBianryZone.Com
8> Programming books
############### C++ #################
Name: C++ How to Program, Fifth Edition (2005)
Description: You won't find a more detailed book filled with examples about C++.
http://rapidshare.com/files/113266277/C___...dition.rar
Name: Ivor Horton's Beginning Visual C++ 2005 (2006)
Description: This e-book is very detailed and goes into quite the depth about C++, aimed for experienced users. (Has about 50 pages about GUI)
http://rapidshare.com/files/113269931/Ivor...C___2005__2006_ .pdf
############### C# #################
Name: Visual C Sharp 2005 - How To Program, 2nd Edition (2005)
Description: You won't find a more detailed book filled with examples about C#.
http://rapidshare.com/files/113269031/Visu...gram__2nd_Editi on.rar
############### Java #################
Name: Killer Game Programming in Java (2005):
Description: Makes learning Java programming fun! (It's great for beginners)
http://rapidshare.com/files/113231480/Kill...__2005_.chm
Name: Java - How To Program 6th Edition (2004).rar
Description: You won't find a more detailed book filled with examples about Java.
http://rapidshare.com/files/113234791/Java...tion__2004_.rar
############### PHP #################
Name: Wiley - PHP5 and MySQL Bible (2004)
Description: A lot of detailed information about PHP & MySQL.
http://rapidshare.com/files/113274213/Wile...ible__2004_.pdf
Name: Wiley - PHP & MySQL for Dummies (2004)
Description: Good book for beginners on PHP & MySQL.
http://rapidshare.com/files/113276383/PHP_...Wiley_2004_.pdf
9> hacking techniques
Practical Hacking Techniques and Countermeasures examines computer security from the hacker's perspective, demonstrating how a computer system can be successfully attacked and compromised. This book shows how an attack is conceptualized, formulated and performed. With the VMware® Workstation software package available on the accompanying CD, it uses virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It offers examples of attacks on Windows and Linux. It also covers such topics as footprinting, scanning, sniffing, passwords, and other attack tools. This text provides valuable information for constructing a system to defend against attacks.
Product Details
* Hardcover: 737 pages
* Publisher: AUERBACH; Har/Cdr edition (November 2, 2006)
* Language: English
* ISBN-10: 0849370574
* ISBN-13: 978-0849370571
Download: 69.9 MB
CODE
http://rapidshare.com/files/27633312/Practical_Hacking_Techniques_and_Countermeasures.rar
10>hacking exposed
CODE
http://rapidshare.com/files/27443800/McGraw-Hill_-_HaCkInG_ExPoSeD_Web_Applications.zip
11>reventing web attack
Apache can be hacked. As companies have improved perimeter security, hackers have increasingly focused on attacking Apache Web servers and Web applications. Firewalls and SSL won’t protect you: you must systematically harden your Web application environment. Preventing Web Attacks with Apache brings together all the information you’ll need to do that: step-by-step guidance, hands-on examples, and tested configuration files.
Building on his groundbreaking SANS presentations on Apache security, Ryan C. Barnett reveals why your Web servers represent such a compelling target, how significant exploits are performed, and how they can be defended against. Exploits discussed include: buffer overflows, denial of service, attacks on vulnerable scripts and programs, credential sniffing and spoofing, client parameter manipulation, brute force attacks, web defacements, and mo
CODE
http://rapidshare.com/files/31906608/PrevWebAttackz.rar
12>Book on Yahoo Hacks...
Yahoo! Hacks: shows you how to use, expand, personalize, and tweak Yahoo! in ways you never dreamed possible. You will learn how to:
* Fine-tune search queries with keyword shortcuts and advanced syntax
* Manage and customize Yahoo! Mail, using it as your universal email client to access all your other accounts
* Explore your social networks with Yahoo! 360, blogging your life, keeping up with friends, and making new contacts
* Store, sort, blog, feed, track, and otherwise share photos with Flickr and RSS
* Make My Yahoo! your Yahoo!, and personalize Yahoo!’s many properties
* Roll your own Yahoo! applications with Yahoo! new Web Services API and Perl, PHP, Java, Python, Ruby, or the programming language of your choice
* Visualize search results and topics, mash up images from around the Web, and remix other web content
* List (or hide) your site with Yahoo!, and integrate Yahoo! Groups, Messenger, contextual search (Y!Q), or other Yahoo! features
CODE
http://rapidshare.com/files/97760770/OReilly__Yahoo_Hacks.rar
13>E-Books on various topics
http://rapidshare.com/users/LT84AQ
http://rapidshare.com/users/JI4BSD
14>A Buffer Overflow Study - Attacks and Defenses (2002).pdf
15>Addison Wesley - 2004 - Wi-Foo The Secrets of Wireless Hacking.chm
16>Advanced SQL Injection In SQL Server Applications.pdf
17>Amazon Hacks - (O'reilly-August 2003).chm
18>Anti-Hacker Tool Kit, Second Edition.chm
19>Bypassing Firewalls Tools and Techniques.pdf
20>Certified Ethical Hacker Exam Prep.chm
21>Computer Vulnerability(March 9 2000).pdf
22>Crackproof Your Software(No Starch-2002).pdf
23>Credit Card Visa Hack(Cambridge Lab-2003).pdf
24>Cyber Terrorism - Political And Economic Implications.pdf
25> DDOS Attack Tools.pdf
26> Ethical Hacking & Countermeasures.pdf
27> Ethical Hacking and Countermeasures EC Council Exam 312 50 (OSB- 2004).chm
28> Firefox Hacks.chm
29> Firewalking - A Traceroute-Like Analysis of IP Packet Responses to Determine Gateway Accessing.pdf
30> Google A Hacker's Best Friend.pdf
31> Google Hacking for Penetration Tester (Syngress-2005).pdf
32> Google Hacking for Penetration Testers.pdf
33> Google Secrets - How To Get A Top 10Ranking.pdf
34>GoogleSpamguide.pdf
35>Guide To Using Google Discover Google's Buried Treasure.pdf
36>Hack Attacks Revealed A Complete Reference With Custom Security Hacking Toolkit.chm
37>Hack Attacks Revealed- A Complete Reference with Custom Security Hacking Toolkit (Wiley-2001).pdf
38>Hack I.T. - Security Through Penetration Testing.chm
39>Hack IT Security Through Penetration Testing (Addison Wesley-2002).chm
40>Hack Proofing Linux.pdf
41>Hack Proofing Your Identity in the Information Age (Syngress-2002).pdf
42>Hack Proofing Your Network - Internet Tradecraft (Syngress-2000).pdf
43>Hacker Disassembling Uncovered (A List- 2003).chm
44>Hacker Disassembling Uncovered.chm
45>Hacker Web Exploitation Uncovered.chm
46>Hacker'sDelight.chm
47>Hacker's Desk Reference.pdf
48>Hackers Beware (NewRiders -2002).pdf
49>HackersBeware.pdf
50>Hackers Delight( Addison Wesley- 2003 ).chm
51>Hacking -TheArtofExploitation.chm
52>HackingExposedWebApplications.pdf
53>Hacking Exposed- Network Security Secrets and Solutions (MCGraw-Hill-2001).pdf
54>Hacking Exposed- Web Applications (MCGraw-Hill-2002).pdf
55>Hacking Exposed- Windows 2003 Chapter 5.pdf
56>Hacking Firefox - More Than 150 Hacks, Mods, and Customizations.pdf
57>Hacking GPS.pdf
58>Hacking Guide v3.1[www.netz.ru].pdf
59>Hacking Windows XP.pdf
60>Hacking Wireless Networks For Dummies.pdf
61>Hacking a Terror Network.pdf
62>Hacking for Dummies (John Wiley-2004).pdf
63>Hacking for Dummies-Access to Other Peoples Systems Made Simple.pdf
64>Hacking-The Art of Exploitation(No Starch-2003).chm
65>How Thieves Targeted eBay Users but Got Stopped Instead(Interhack-June 2003).pdf
66>How To Build A Freebsd-Stable Firewall With Ipfilter.pdf
67>How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure.pdf
68>Introduction To Algorithms 2nd Edition Solutions (Instructors.Manual).pdf
69>Malware - Fighting Malicious Code (Prentice Hall-November 21 2003).chm
70>Maximum Security, 3rd Edition(Sams-April 2001).chm
71>Maximum Security_-A Hackers Guide to Protect Your Internet .chm
72>Methods of Hacking - Social Engineering.pdf
73>Network Security Tools (OReilly- Apr 2005).chm
74>PC Hacks(Oct 2004).chm
75>PDF Hack(Aug 2004).chm
76>Placing Backdoors Through Firewalls.pdf
77>Practical Study Remote Access (Cisco-December 22, 2003).chm
78>Reversing - Secrets of Reverse Engineering.pdf
79>Reversing Secrets of Reverse Engineering (Apr 2005).pdf
80>SQL Injection, Are Your Web Applications Vulnerable.pdf
81>Skype Hacks.chm
82>Special Ops - Host and Network Security for Microsoft, UNIX, and Oracle.pdf
83>Spidering Hacks(O'Reilly- October 2003).chm
84>Steal This Computer Book 3 What They Won't Tell You About the Internet(No Starch Press © 2003 ).chm
85>Stealing the Network; How to Own the Box ( Syngress-2003).pdf
86>Switching to VoIP.chm
87>The Art of Deception by Kevin Mitnick.pdf
88>The Art of Intrusion-The Real Stories Behind the Exploits of Hackers Intruders and Deceivers (Wiley- Feb 2005).pdf
89>The Complete History of Hacking.pdf
90>The Database Hacker's Handbook - Defending Database Servers.chm
91>The Ethical Hack - A Framework for Business Value Penetration Testing.pdf
92>The Extreme Searchers Internet Handbook A Guide for the Serious Searcher (Feb 2004).pdf
93>The Hacker Ethic.pdf
94>Tricks of the Internet Gurus (April 1999).pdf
95>Underground Hacking Madness & Obsession on the Electronic Frontier (Suelette Dreyfus & Julian Assange-2001).pdf
96>Web Hacking- Attacks and Defence (Pearson Education-August 08, 2002).chm
97>WebJacking.pdf
98>Website Secrets Unleash the Power of, Google, Amazon, eBay & more.pdf
99>Well Known Trojans and Their Ports.pdf
100>Wi-Foo - The Secrets of Wireless Hacking.chm
101>Windows Server Hack(O'Reilly - March 2004).chm
102>Windows XP Hacks (O'reilly- Auguest 2003).chm
103>Wireless Hacking - The Invisible Network.pdf
104>Wireless Hacks.chm
105> Telnet Basics:
http://www.esnips.com/doc/42eea4d6-0941-43b9-93e1-6ae99ef7d2a3/Telnet-hacking
106> Bypass Intenet Blocking:
http://www.esnips.com/doc/b0d10ace-b85e-44bb-8413-6de5f0646283/Bypass-Internet-blocking
url:http://sanjaypatel.weebly.com/hacking-e-books.html
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment