Exetools

Exetools (https://forum.exetools.com/index.php)
-   General Discussion (https://forum.exetools.com/forumdisplay.php?f=2)
-   -   eBOOKS (POST ALL HERE) (https://forum.exetools.com/showthread.php?t=3440)

mm10121991 09-01-2011 07:59

A quite old book but still could be useful
windows nt 2000 native api reference
http://www.4shared.com/file/oJfD0s9K/Windows_NT-2000_Native_API_Ref.html

NimDa2k 09-13-2011 11:42

USB Complete: The Developer's Guide 4th Edition
 
Author's Web Site: http://www.lvr.com/usb.htm#books
Quote:

Jan Axelson | June 2009 | ISBN: 1931448086 | PDF | 529 pages | English | 7 MB

This updated edition of the best-selling developer's guide to the Universal Serial Bus (USB) interface covers all aspects of project development, including hardware design, device firmware, and host application software.

Topics include how to choose a device controller chip, how to write device firmware for USB communications, how to cut development time by using USB device classes, and how to write software to access devices that perform vendor-specific functions. Also discussed are hardware interfacing, using bus power, wireless technologies, and USB On-The-Go.

The book presents example code for accessing USB devices using Visual Basic .NET and Visual C# .NET. The example code shows how to detect device arrival and removal and how to transfer vendor-defined data using the human interface device class and MicrosoftˇŻs WinUSB driver. Also covered is how to write device firmware to communicate with the USB host.

The Fourth Edition covers USB 3.0 and SuperSpeed and has new information on controller chips, USB classes, power use, and MicrosoftˇŻs WinUSB driver.
Code:

download:
http://rapidshare.com/files/244012192/U326576464.rar


2late 09-16-2011 19:22

Flash Security
 
Chapter 11 "Flash Security" of "AdvancED Flex 4" by S. Tiwari and E. Elrom

Code:

http://www.amazon.com/AdvancED-Flex-4-Shashank-Tiwari/dp/1430224835/ref=ntt_at_ep_dpt_3
Discusses some of the vulnerabilities, showing examples of how an attacker can abuse Flash or Flex applications.

Code:

http://www.multiupload.com/64NYA5SW6P

jakkal 10-27-2011 08:24

Professional C++, 2nd Edition
 
epub format

Code:

http://www.wupload.com/file/1187776881/Wrox.Professional.CPP.2nd.Edition.Oct.2011.epub
J.

appsuse 11-18-2011 15:00

Start Here! Learn Microsoft Visual C# 2010 (Developer)
 
Learn the fundamentals of modern programming with Visual C# 2010ˇŞand begin building your first apps for the desktop and web. If you have absolutely no previous experience, no problemˇŞsimply start here! This book introduces must-know concepts and techniques through easy-to-follow explanations, examples, and exercises.
  • HereˇŻs where you start learning Visual C#
  • Learn how an application performs tasks by tracing its code
  • Query and manipulate application data with LINQ
  • Access web services with REST and SOAP
  • Build simple apps with Windows® Presentation Foundation
  • Explore rich Internet apps with Microsoft Silverlight®
  • Find and fix errors by debugging your applications
  • Put it all together by creating your first programs
Download

http://www.filesonic.in/file/3270838624/0735657726.pdf

mr.slooz 11-22-2011 23:50

The D Programming Language
hxxp://www.filesonic.com/file/3151830595/0321635361.rar

BackTrack 5 Wireless Penetration Testing
hxxp://www.filesonic.com/file/2898368915/BackTrack_5_Wireless_Penetration_Testing.rar

ontryit 12-02-2011 23:18

Another GREAT e-books resources with HIGH QUALITY:
http://www.wowebook.com/

Regards

jakkal 01-22-2012 23:59

Pro iOS 5 Augmented Reality
 
Book Description
ISBN-10: 1430239123 | ISBN-13: 978-1430239123 | Publication Date: December 14, 2011 | Edition: 1

Augmented reality takes the real world and through the use of graphics, sound and other effects allows you to enhance the environment. It makes a game more real. Your social media app puts you where want to be or go.

Pro iOS 5 Augmented Reality walks you through the foundations of building an augmented reality application for the iPhone or iPad. From using MapKit, to the accelerometer and magnetometer, to integrating facial recognition and Facebook data, you'll learn the building blocks of creating augmented reality applications. Case studies are included in this one-of-a-kind book and you'll learn how to create augmented reality apps that unleash the full potential of the on-board sensors and camera. This book complements other iOS game or social media apps development books available from Apress.

After reading Pro iOS 5 Augmented Reality, you'll be able to build augmented reality rich media apps or integrate all the best augmented reality techniques and tools into your existing apps.


What youˇŻll learn

The differences in hardware sensors, cameras and more between the iPhone 4 and iPhone 4S, iPod touch, iPad and iPad 2
How to use MapKit and integrate it into your app
How to play and record sound within an augmented reality app
How to use the iPhone or iPad camera and video
How to program against the accelerometer and gyroscope to detect movement and the orientation of the iPhone or iPad
How to access and use the information from the magnetometer (compass)
How to use cocos2D to overlay a heads-up display on the camera view
How to integrate facial recognition into your app
How to build augmented reality feature-rich enterprise game and Facebook apps


Code:

http://filepost.com/files/d8fce384/1430239123.rar

huntersun 02-07-2012 12:05

Oh. Thanks for sharing. But the first link not live...!

JMI 02-07-2012 14:05

How about using a little personal initiative and put:

Pro_iOS_5_Augmented_Reality.pdf

or

Pro_iOS_5_Augmented_Reality.epub

in your favorite search engine and YOU download the file. I have easily found both.

;)

WilliamElts 02-11-2012 23:49

After searching for Practical Cryptography (Bruce Schneier) ebook, I cannot find the download link. At last, I realized that in the second version, it's name has been changed to Cryptography Engineering. Hope it help anyone who keep searching for this book.
The download link:
Code:

hxxp://crocko.com/1915815804/0470474246.djvu

Git 02-12-2012 01:12

Nice find. Is there also a PDF of this please?. AVS fails to convert it to PDF.

Git

JMI 02-12-2012 02:48

[Hint] Perhaps you should try google with Practical Cryptography (Bruce Schneier) [Hint].

It shows numerous sources for the PDF version. :o

Regards,

Git 02-12-2012 03:13

Quite a few for "Cryptography Engineering" pdf too, but they are all the same djvu when you visit them.

Git

chessgod101 02-12-2012 04:37

This online converter seems to convert the file effectively:
Code:

http://www.djvu-pdf.com/

JMI 02-12-2012 05:39

I have downloaded two which are very different. The first is:

Cryptography - Practical Cryptography

Which had 222 pages, (which is 40 pages in the PDF).

(Edit: Just looked at this one more closely and noticed it starts with Chapter 11. Duh)

The second is:


Applied Cryptography, Second Edition: Protocols, Algorthms, and Source
Code in C (cloth)
(Publisher: John Wiley & Sons, Inc.)
Author(s): Bruce Schneier
ISBN: 0471128457
Publication Date: 01/01/96

Which has 1028 PDF pages, with lots of code and examples.

I do realize the Titles are different. Just thought you might also be interested in the second one.

Does this help?

Git 02-12-2012 06:05

I've found 2nd edition of AP now, thanks, and also a good collection of crypto books by torent. I've fallen for that chapter 11 trial too.

Git

wild 03-06-2012 05:58

some technical books (about 400)
 
Some technical books: http://www.techmeet.in/books/index.html

Shub-Nigurrath 03-08-2012 18:31

does anyone have the book of Russinowich, Zero Day ??

nathan 03-08-2012 19:23

1 Attachment(s)
Quote:

Originally Posted by Shub-Nigurrath (Post 77803)
does anyone have the book of Russinowich, Zero Day ??

I have one copy in epub format...

uranus64 03-08-2012 19:56

1 Attachment(s)
This is in PDF format. (converted .epub)

mesagio 05-07-2012 21:33

Operating System Concepts
 
Operating System Concepts, 8th Edition

http://filepost.com/files/md83c8ed/0470128720_OperSyst.pdf/

mesagio 05-11-2012 03:51

Automatic Parallelization An Overview of Fundamental Compiler Techniques

http://filepost.com/files/9124am5c

redbull 05-16-2012 19:32

I saw this on Reditt today. Course notes and lecture handouts

Collection of Malware Analysis courseware

CS 6V81--005: System Security and Malicious Code Analysis
http://www.utdallas.edu/~zhiqiang.lin/spring2012.html
last updated Tue May 15 22:32:14 2012

Course Overview

CS-6V81 is a graduate level, research oriented, system and software security course.

The goal of this course is to explain the low-level system details from compiler, linker, loader, to OS kernel and computer architectures, examine the weakest link in each system component, explore the left bits and bytes after all these transformations, and study the state-of-the-art offenses and defenses.

The learning outcome is students shall be able to understand how an attack is launched (e.g., how an expoit is created), and how to do the defense (e.g., developing OS patches, analyzing the binary code, and detecting intrusions)

In particular, we will cover

Memory exploits. We will investigate the unsafe but widely used system programming language C, cover typical vulnerabilities such as buffer overflows, format strings, integer overflows, etc. How to create robust shell code using such as ROP, HeapSpray.

OS Kernel Internals. What's the behavior when a program is running on top of OS. Why we use paging. How virtual to physical address translation is performed. How MMU (e.g., TLB) helps this. How OS manage files, and disks. How can we model the program behavior when sitting at OS layer. We will use both Linux and Windows as working kernel.

Linker and Loader Internals. How a program can be dynamically linked, and what an attacker can do to cheat the system and meanwhile what we can do to protect the system.

Kernel-level Defense, how can we defend against the common exploits, techniques including such as ASR, and DEP, NX-bits.

User-level Defense. Safe library, Compiler extension, Binary Transformation/Rewriting, Runtime Verification.

Binary code reverse engineering. Static binary code analysis. Dynamic Binary code instrumentation. Data flow analysis, and control flow analysis. Malware packing and unpacking.

The class will also have a heavy-hands on project. Students could choose either to perform research (will work on a semester-long research topic of their choosing), or perform an engineering project.

deepzero 05-17-2012 01:40

"site does not exist" :(

chessgod101 05-17-2012 03:09

deepzero, are you referring to the link provided by redbull? It loads perfectly on my computer. Seeing how the University of Dallas is located in the United States, perhaps the site is restricted to US ip addresses. Try loading the site via a US proxy and see if that fixes the issue. ;)

uranus64 05-17-2012 12:27

Quote:

Originally Posted by chessgod101 (Post 78958)
.... perhaps the site is restricted to US ip addresses.

It isn't restricted. I access it from Europe without problems.

deepzero 05-17-2012 12:30

tried several, page still not found :(
can we mirror the material? :S

in the mean time, maybe this is of interest to some...

Engineering a Compiler 2nd ed - K. Cooper, L. Torczon (Morgan Kaufman, 2012) BBS.pdf
Quote:

http://rghost.net/38127421

uranus64 05-17-2012 13:14

HERE is a browsable copy of the entire site with original directory structure (141MB). You need to refer "spring2012.html" for "CS 6V81--005: System Security and Malicious Code Analysis". You have also "CS 6V81--005: Advanced Digital Forensics and Data Reverse Engineering" - need to refer file "fall2011.html". HTML files are located in ~zhiqiang.lin folder.

WilliamElts 05-22-2012 08:03

Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding
 
The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:

1. Coding - The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL.

2. Sockets - The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same - communication over TCP and UDP, sockets are implemented differently in nearly ever language.

3. Shellcode - Shellcode, commonly defined as bytecode converted from Assembly, is utilized to execute commands on remote systems via direct memory access.

4. Porting - Due to the differences between operating platforms and language implementations on those platforms, it is a common practice to modify an original body of code to work on a different platforms. This technique is known as porting and is incredible useful in the real world environments since it allows you to not "recreate the wheel.”

5. Coding Tools - The culmination of the previous four sections, coding tools brings all of the techniques that you have learned to the forefront. With the background technologies and techniques you will now be able to code quick utilities that will not only make you more productive, they will arm you with an extremely valuable skill that will remain with you as long as you make the proper time and effort dedications.

*Contains never before seen chapters on writing and automating exploits on windows systems with all-new exploits.

*Perform zero-day exploit forensics by reverse engineering malicious code.

*Provides working code and scripts in all of the most common programming languages for readers to use TODAY to defend their networks.


link download:
Code:

htp://hotfile.com/dl/152255592/439a586/Sockets_Shellcode_Porting__Coding_RE_www.box4dl.com.rar.html

Shub-Nigurrath 05-23-2012 21:28

Does anyone have a copy of the C++ Without Fear: A Beginner's Guide That Makes You Feel Smart, second edition?

thanks

WilliamElts 05-23-2012 22:02

Here it is:
Quote:

www.eazyupload.net/download/d1OBfch6/0132673266.zip.htm

sHadOw 06-14-2012 03:26

PC Assembly Language eBook [PDF]
 
1 Attachment(s)
Hi guys here is my first post i hope you guys like this ebook is really nice :)

Code:

Attached file.

Isaaaac 08-06-2012 14:06

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
By Michael Sikorski, Andrew Honig
Publisher: No Starch Press
800 Pages
ISBN: 1593272901
PDF | 9 MB
Download link :
hxxp://filepost.com/files/7am8a85c/Practical_Malware_Analysis.pdf
files:
hxxp://sourceforge.net/projects/pmalabs/

Isaaaac 08-09-2012 20:38

680 Malware EBook Collection
File Size: 624 MB
Ebook list : hxxp://note.shell32dll.info/download-ebook-680-malware-ebook-collection-2011

Download links :
hxxp://www.mediafire.com/?ebsnetqqx8encbf
hxxp://www.mediafire.com/?smmwcf42z53z7bp
hxxp://www.mediafire.com/?hbzo8fy8d2zk93w
hxxp://www.mediafire.com/?8wd4ca54dmjpo6b
hxxp://www.mediafire.com/?qab6eahfmaxvdsq
hxxp://www.mediafire.com/?v0cyic11flmlp0j

mm10121991 08-16-2012 05:53

CODE - The Hidden Language of Computer Hardware and Software
 
PHP Code:

Preface iv 
Chapter One Best Friends 3 
Chapter Two Codes 
and Combinations 9 
Chapter Three Braille 
and Binary Codes 15 
Chapter Four Anatomy of a Flashlight 22 
Chapter Five Seeing Around Corners 32 
Chapter Six Telegraphs 
and Relays 40 
Chapter Seven Our Ten Digits 47 
Chapter Eight Alternatives to Ten 54 
Chapter Nine Bit by Bit by Bit 69 
Chapter Ten Logic 
and Switches 86 
Chapter Eleven Gates 
(Not Bill102 
Chapter Twelve A Binary Adding Machine 131 
Chapter Thirteen But What About Subtraction
143 
Chapter Fourteen Feedback 
and Flip-Flops 155 
Chapter Fifteen Bytes 
and Hex 180 
Chapter Sixteen An Assemblage of Memory 190 
Chapter Seventeen Automation 206 
Chapter Eighteen From Abaci to Chips 238 
Chapter Nineteen Two Classic Microprocessors 260 
Chapter Twenty ASCII 
and a Cast of Characters 286 
Chapter Twenty
-One Get on the Bus 301 
Chapter Twenty
-Two The Operating System 320 
Chapter Twenty
-Three Fixed PointFloating Point 335 
Chapter Twenty
-Four Languages High and Low 349 
Chapter Twenty
-Five The Graphical Revolution 364 
Acknowledgments 383 
Index 385 

PHP Code:

http://dump.udderweb.com/CODE.pdf 

:)

Anticode 08-20-2012 21:17

Charles Petzold - Programming Windows 6th Edition
 
Code:

http://filepost.com/files/md44a6f9/Programming.Windows.6th.Edition.pdf

thesweetdevilguy 08-21-2012 00:18

Quote:

Originally Posted by WilliamElts (Post 79019)
The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:

1. Coding - The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL.

2. Sockets - The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same - communication over TCP and UDP, sockets are implemented differently in nearly ever language.

3. Shellcode - Shellcode, commonly defined as bytecode converted from Assembly, is utilized to execute commands on remote systems via direct memory access.

4. Porting - Due to the differences between operating platforms and language implementations on those platforms, it is a common practice to modify an original body of code to work on a different platforms. This technique is known as porting and is incredible useful in the real world environments since it allows you to not "recreate the wheel.”

5. Coding Tools - The culmination of the previous four sections, coding tools brings all of the techniques that you have learned to the forefront. With the background technologies and techniques you will now be able to code quick utilities that will not only make you more productive, they will arm you with an extremely valuable skill that will remain with you as long as you make the proper time and effort dedications.

*Contains never before seen chapters on writing and automating exploits on windows systems with all-new exploits.

*Perform zero-day exploit forensics by reverse engineering malicious code.

*Provides working code and scripts in all of the most common programming languages for readers to use TODAY to defend their networks.


link download:
Code:

htp://hotfile.com/dl/152255592/439a586/Sockets_Shellcode_Porting__Coding_RE_www.box4dl.com.rar.html

i found the above link dead so please find the link below

Code:

http://www.4shared.com/get/noZJs9it/Sockets_Shellcode_Porting_And_.html

eARth 09-14-2012 18:30

The C++ Standard Library, 2nd Edition
 
The Best-Selling C++ Resource. Now Updated for C++11

The C++ standard library provides a set of common classes and interfaces that greatly extend the core C++ language. The library, however, is not self-explanatory. To make full use of its components¨Cand to benefit from their power¨Cyou need a resource that does far more than list the classes and their functions.

The C++ Standard Library: A Tutorial and Reference, Second Edition, describes this library as now incorporated into the new ANSI/ISO C++ language standard (C++11). The book provides comprehensive documentation of each library component, including an introduction to its purpose and design; clearly written explanations of complex concepts; the practical programming details needed for effective use; traps and pitfalls; the exact signature and definition of the most important classes and functions; and numerous examples of working code. The book focuses in particular on the Standard Template Library (STL), examining containers, iterators, function objects, and STL algorithms.

The book covers all the new C++11 library components, including

Concurrency
Fractional arithmetic
Clocks and timers
Tuples
New STL containers
New STL algorithms
New smart pointers
New locale facets
Random numbers and distributions
Type traits and utilities
Regular expressions
The book also examines the new C++ programming style and its effect on the standard library, including lambdas, range-based for loops, move semantics, and variadic templates.

An accompanying Web site, including source code, can be found at www.cppstdlib.com.

Table of Contents
Chapter 1. About This Book
Chapter 2. Introduction to C++ and the Standard Library
Chapter 4. General Concepts
Chapter 5. Utilities
Chapter 6. The Standard Template Library
Chapter 7. STL Containers
Chapter 8. STL Container Members in Detail
Chapter 9. STL Iterators
Chapter 10. STL Function Objects and Using Lambdas
Chapter 11. STL Algorithms
Chapter 12. Special Containers
Chapter 13. Strings
Chapter 14. Regular Expressions
Chapter 15. Input/Output Using Stream Classes
Chapter 16. Internationalization
Chapter 17. Numerics
Chapter 18. Concurrency
Chapter 19. Allocators

Code:

http://prefiles.com/jyuxloofr81a/Addison.Wesley.The.CPP.Standard.Library.2nd.Edition.Mar.2012.rar

Shub-Nigurrath 09-21-2012 17:13

a big book, but extremely complete!

C++ Primer, 5th Edition

http://www.freebookdownloader.com/public/images/ebook/c-primer.jpg

eBook Description

Quote:

Bestselling Programming Tutorial and Reference Completely Rewritten for the New C++11 Standard Fully updated and recast for the newly released C++11 standard, this authoritative and comprehensive introduction to C++ will help you to learn the language fast, and to use it in modern, highly effective ways. Highlighting today’s best practices, the authors show how to use both the core language and its standard library to write efficient, readable, and powerful code. C++ Primer, Fifth Edition, introduces the C++ standard library from the outset, drawing on its common functions and facilities to help you write useful programs without first having to master every language detail. The book’s many examples have been revised to use the new language features and demonstrate how to make the best use of them. This book is a proven tutorial for those new to C++, an authoritative discussion of core C++ concepts and techniques, and a valuable resource for experienced programmers, especially those eager to see C++11 enhancements illuminated. Start Fast and Achieve More Learn how to use the new C++11 language features and the standard library to build robust programs quickly, and get comfortable with high-level programming Learn through examples that illuminate today’s best coding styles and program design techniques Understand the “rationale behind the rules”: why C++11 works as it does Use the extensive crossreferences to help you connect related concepts and insights Benefit from up-to-date learning aids and exercises that emphasize key points, help you to avoid pitfalls, promote good practices, and reinforce what you’ve learned Access the source code for the extended examples from informit.com/title/0321714113 C++ Primer, Fifth Edition, features an enhanced, layflat binding, which allows the book to stay open more easily when placed on a flat surface. This special binding method—notable by a small space inside the spine—also increases durability.

Book Details
* Paperback: 912 pages
* Publisher: Addison-Wesley Professional
* Author(s): Stanley B. Lippman, Josée Lajoie, Barbara E. Moo
* Language: English
* ISBN-10: 0321714113
* ISBN-13: 9780321714114

http://www.freebookdownloader.com/public/images/torrent/free_download.png

Code:

http://ul.to/su2y1bic
http://www.4shared.com/rar/CBGmSojq/0321714113.html
http://filecloud.io/6jrizcxs

http://www.freebookdownloader.com/public/images/torrent/thanksu.png


All times are GMT +8. The time now is 19:03.

Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2024, vBulletin Solutions, Inc.
Always Your Best Friend: Aaron, JMI, ahmadmansoor, ZeNiX