Skip to content
okread

hacking

Home » hacking
  • View:
  • 12
  • 24
  • All
  • Black Hat Python: Python Programming for Hackers and Pentesters 1st Edition Quick View
    • Black Hat Python: Python Programming for Hackers and Pentesters 1st Edition Quick View
    • hacking, Python (Computer program language)
    • Black Hat Python: Python Programming for Hackers and Pentesters 1st Edition

    • $0.00
    • When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen? In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you’ll explore the darker side of Python’s capabilities—writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and…
    • Read now
  • Botnets- The Killer Web App Quick View
    • Botnets- The Killer Web App Quick View
    • hacking
    • Botnets- The Killer Web App

    • $0.00
    • The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them.…
    • Read now
  • Certified Ethical Hacker Exam Guide Quick View
    • Certified Ethical Hacker Exam Guide Quick View
    • hacking
    • Certified Ethical Hacker Exam Guide

    • $0.00
    • Copyright © 2017 by McGraw-Hill Education. All rights reserved. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher
    • Read now
  • code obfuscation php shells Quick View
    • code obfuscation php shells Quick View
    • hacking
    • code obfuscation php shells

    • $0.00
    • Read now
  • DNS Cache Poisoning Quick View
    • DNS Cache Poisoning Quick View
    • hacking
    • DNS Cache Poisoning

    • $0.00
    • Read now
  • Google Hacking 101 June 2005 Quick View
    • Google Hacking 101 June 2005 Quick View
    • hacking
    • Google Hacking 101 June 2005

    • $0.00
    • troop23 writes "A web worm that identifies potential victims by searching Google is spreading among online bulletin boards using a vulnerable version of the program phpBB, security professionals said on Tuesday. Almost 40,000 sites may have already been infected. In an odd twist if you use Microsoft's Search engine to scan for the phrase 'NeverEverNoSanity'-- part of the defacement text…
    • Read now
  • Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali Quick View
    • Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali Quick View
    • hacking
    • Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali

    • $20.99
    • If you're getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you'll learn the basics of using the Linux operating system and acquire the tools and techniques you'll need to take control of a Linux environment. First, you'll learn how to…
    • Buy Book
  • Malware Fighting Malicious Code Quick View
    • Malware Fighting Malicious Code Quick View
    • hacking
    • Malware Fighting Malicious Code

    • $0.00
    • You might have read the last chapter on backdoors and thought to yourself, “I’d never run a program named Netcat or VNC on my machine, so I’m safe!” Unfortunately, it isn’t that easy. Attackers with any modest level of skill will disguise the nasty backdoors we covered in the last chapter or hide them inside of other programs. That’s the…
    • Read now
  • Metasploit The Penetration Tester’s Guide Quick View
    • Metasploit The Penetration Tester’s Guide Quick View
    • hacking, Linux
    • Metasploit The Penetration Tester’s Guide

    • $0.00
    • The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors. Once you've built your foundation…
    • Read now
  • Modern Cookie Stuffing Quick View
    • Modern Cookie Stuffing Quick View
    • hacking
    • Modern Cookie Stuffing

    • $0.00
    • Before you begin to read this, please be aware that this e-book is not for the lazy internet marketer. There is no “get rich plan” - or - “I made $100k in my sleep and you can too!”. I am so tired of reading that junk, because in reality there is no “get rich plan”....of course unless you want to…
    • Read now
  • Password Cracking Brute Force Tools 08 Quick View
    • Password Cracking Brute Force Tools 08 Quick View
    • hacking
    • Password Cracking Brute Force Tools 08

    • $0.00
    • Asmile, a house key, a password. Whether you’re trying to get into a nightclub, your house, or your computer, you will need something that only you possess. On a computer network, users’ passwords have to be strong enough so that Dwayne can’t guess Norm’s password and Norm can’t steal Dwayne’s password (since Dwayne might have written it on the bottom…
    • Read now
  • PDF Attack A Journey from the Exploit Kit to the Shellcode Quick View
    • PDF Attack A Journey from the Exploit Kit to the Shellcode Quick View
    • hacking
    • PDF Attack A Journey from the Exploit Kit to the Shellcode

    • $0.00
    • Read now
  • 1
  • 2
  • Home
  • Arts & Photography Books 11 product
  • Biographies & Memoirs 2727 products
  • Cloud computing 1818 products
  • computer 99 products
  • Fantasy 1515 products
  • Fantasy Manga 11 product
  • Finance 33 products
  • hacking 1919 products
  • Happiness 11 product
  • History 11 product
  • Humor & Entertainment 44 products
  • Linux 55 products
  • Literature & Fiction 1515 products
  • mythology 11 product
  • Politics & Social Sciences 11 product
  • Programming Language 33 products
  • Python (Computer program language) 55 products
  • Reverse Engineering 1010 products
  • Romance 66 products
  • Romance Manga 88 products
  • Social Aspects 11 product
  • Teacher & Student Mentoring 22 products
  • Tips And Tricks 22 products
  • Travel 11 product
×
×

Cart