Exetools

Exetools (https://forum.exetools.com/index.php)
-   General Discussion (https://forum.exetools.com/forumdisplay.php?f=2)
-   -   eBOOKS (POST ALL HERE) (https://forum.exetools.com/showthread.php?t=3440)

gokilaravee 04-22-2016 00:12

linux troubleshooting books
 
Hi,

pls share someone has following books

Red Hat Enterprise Linux Troubleshooting Guide by Benjamin Cane

http://www.amazon.com/Red-Enterprise-Linux-Troubleshooting-Guide/dp/1785283553/ref=sr_1_1?ie=UTF8&qid=1461254380&sr=8-1&keywords=linux+troubleshooting

Linux Troubleshooting Bible 1st Edition by Christopher Negus (Author), Thomas Weeks (Author)
http://www.amazon.com/Linux-Troubleshooting-Bible-Christopher-Negus/dp/076456997X/ref=sr_1_3?ie=UTF8&qid=1461254380&sr=8-3&keywords=linux+troubleshooting

Linux Troubleshooting for System Administrators and Power Users 1st Edition
by James Kirkland (Author), David Carmichael (Author), Christopher L. Tinker (Author), Gregory L. Tinker (Author)

http://www.amazon.com/Linux-Troubleshooting-System-Administrators-Power/dp/0131855158/ref=sr_1_4?ie=UTF8&qid=1461254380&sr=8-4&keywords=linux+troubleshooting

Debugger 04-22-2016 20:23

Quote:

Originally Posted by gokilaravee (Post 104987)
Hi,

pls share someone has following books

Red Hat Enterprise Linux Troubleshooting Guide by Benjamin Cane

http://www.amazon.com/Red-Enterprise-Linux-Troubleshooting-Guide/dp/1785283553/ref=sr_1_1?ie=UTF8&qid=1461254380&sr=8-1&keywords=linux+troubleshooting

Linux Troubleshooting Bible 1st Edition by Christopher Negus (Author), Thomas Weeks (Author)
http://www.amazon.com/Linux-Troubleshooting-Bible-Christopher-Negus/dp/076456997X/ref=sr_1_3?ie=UTF8&qid=1461254380&sr=8-3&keywords=linux+troubleshooting

Linux Troubleshooting for System Administrators and Power Users 1st Edition
by James Kirkland (Author), David Carmichael (Author), Christopher L. Tinker (Author), Gregory L. Tinker (Author)

http://www.amazon.com/Linux-Troubleshooting-System-Administrators-Power/dp/0131855158/ref=sr_1_4?ie=UTF8&qid=1461254380&sr=8-4&keywords=linux+troubleshooting

Linux Troubleshooting Bible
Quote:

http://gen.lib.rus.ec/get.php?md5=AC1F8812B297654F1B0620253215F1F2

Linux Troubleshooting for System Administrators and Power Users 1st Edition
Quote:

http://gen.lib.rus.ec/get.php?md5=D4B8566CE01AFA7DC2C7FD57AE52E727

Found two of three. Link are above.

Regards,
DB

gokilaravee 04-23-2016 12:13

thanks, pls share if you have pdf links.

nanobit 04-23-2016 16:50

Future Crimes
 
Future Crimes is a book about vast and various methods that hackers deploy to penetrate systems (not technical). This book is based on real life encounters of the author (Marc Goodman) himself working as a cyber crime investigator in FBI.

Quote:

Originally Posted by amazon
NEW YORK TIMES and WALL STREET JOURNAL BESTSELLER

Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side: our technology can be turned against us. And just over the horizon is a tidal wave of scientific progress that will leave our heads spinning—from implantable medical devices to drones and 3-D printers, all of which can be hacked, with disastrous consequences.

With explosive insights based on a career in law enforcement and counterterrorism, leading authority on global security Marc Goodman takes readers on a vivid journey through the darkest recesses of the Internet. He explores how bad actors are primed to hijack the technologies of tomorrow. Provocative, thrilling, and ultimately empowering, Future Crimes will serve as an urgent call to action that shows how we can take back control of our own devices and harness technology¡¯s tremendous power for the betterment of humanity—before it¡¯s too late.

Book (epub):
Code:

http://www12.zippyshare.com/v/HObD2EH1/file.html
http://hugefiles.net/dwjhil001lpz
https://1fichier.com/?8dunlmjzc5

Audio:
Code:

https://1fichier.com/?b48ph7gzc9
http://hugefiles.net/h71fahq3nv0q


gokilaravee 05-01-2016 21:48

Hi,

pls share someone has following book.

Red Hat Enterprise Linux Troubleshooting Guide by Benjamin Cane

http://www.amazon.com/Red-Enterprise-Linux-Troubleshooting-Guide/dp/1785283553/ref=sr_1_1?ie=UTF8&qid=1461254380&sr=8-1&keywords=linux+troubleshooting

mr.slooz 05-03-2016 14:47

High Performance Parallelism Pearls Volume One: Multicore and Many-core Programming Approaches

hxxp://www22.zippyshare.com/v/12bicRu6/file.html

beachsun 05-15-2016 03:33

Quote:

Originally Posted by gokilaravee (Post 105080)
Hi,

pls share someone has following book.

Red Hat Enterprise Linux Troubleshooting Guide by Benjamin Cane

http://www.amazon.com/Red-Enterprise-Linux-Troubleshooting-Guide/dp/1785283553/ref=sr_1_1?ie=UTF8&qid=1461254380&sr=8-1&keywords=linux+troubleshooting

Here you have.
It was not easy :D

Code:

hxxp://www.mirrorcreator.com/files/1J3HYRWY/RHELTG-BC.zip_links
or
hxxp://mir.cr/1J3HYRWY

Hope it's allright.

Regards

Edit : What i've seen... great book!! Tnx.

NeOXOeN 05-19-2016 18:46

Does anyone know where i can get

The Mathematics of Encryption: An Elementary Introduction (Mathematical World) by Margaret Cozzens (2013-09-05) Paperback – 1821
by Margaret Cozzens;Steven J. Miller (Author)

https://www.amazon.ca/Mathematics-Encryption-Elementary-Introduction-Mathematical/dp/B01FIYGKQK/ref=sr_1_1?s=books&ie=UTF8&qid=1463654531&sr=1-1&keywords=The+Mathematics+of+Encryption%3A+An+Elementary+Introduction


bye N

beachsun 05-21-2016 18:38

Noiseless Steganography: The Key to Covert Communications (2012)
 
Noiseless Steganography: The Key to Covert Communications (2012)

Author : Dr. Abdelrahman Desoky
Pages : 298
Publisher: Auerbach Publications; 1 edition (February 16, 2012)
Language: English
ISBN-10: 1439846219
ISBN-13: 978-1439846216

Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind:

The first to comprehensively cover Linguistic Steganography

The first to comprehensively cover Graph Steganography

The first to comprehensively cover Game Steganography

Although the goal of steganography is to prevent adversaries from suspecting the existence of covert communications, most books on the subject present outdated steganography approaches that are detectable by human and/or machine examinations. These approaches often fail because they camouflage data as a detectable noise by altering digital images, audio files, text, etc. However, such alteration raises suspicion and makes the message discernible by detecting its noise.

Addressing such shortcomings, Noiseless Steganography: The Key to Covert Communications introduces a novel Noiseless Steganography Paradigm (Nostega). Rather than hiding data in noise or producing noise, Nostega camouflages messages as well as their transmission in the form of unquestionable data in the generated steganographic cover. The book explains how to use Nostega to determine suitable domains capable of generating unsuspicious steganographic cover in which messages are embedded in the form of innocent data that is compatible with the chosen domain. It presents a number of Nostega-based methodologies, including but not limited to:

A novel cover type that enables data to be hidden in plotted graphs

A novel methodology that pursues popular games such as chess, checkers, crosswords, and dominoes to conceal messages

Comprehensive coverage of linguistic steganography

Several novel linguistic steganography methodologies based on Natural Language Processing and Computational Linguistic techniques such as: Education-Centric-Based, Summarization-Based, Natural Language Generation Based, Random-Series-Based, Email Headers Based, Automatic Joke Generation Based, List-Based, and Automatic Notes Generation Based


The first book to provide comprehensive coverage of Linguistic Steganography, Graph Steganography, and Game Steganography, it discusses the implementation and steganalysis validation of ten Nostega-based methodologies. It describes how to establish covert channels by employing the selected domain to serve as justification for the interaction and delivery of the cover among the communicating parties. Instead of using contemporary steganography approaches to camouflage your data as noise that is assumed to look innocent, the text provides you with the tools to prevent your adversaries from suspecting the existence of covert communications altogether.


About the Author

Dr. Abdelrahman Desoky is a scientist and an ambitious Computer Engineering Doctorate with over twenty years of experience in the computer field. He is an experienced educator at both the graduate and undergraduate levels. Furthermore, he has industrial expertise in developing full life cycle systems such as software, hardware, security, and telecommunications/networks. Dr. Desoky received a Doctoral Degree (Ph.D.) from The University of Maryland, Baltimore County (UMBC) and a Master of Science (M.Sc.) from the George Washington University; both degrees are in Computer Engineering. His Doctoral Dissertation is entitled "Nostega: A Novel Noiseless Steganography Paradigm." The paradigm explores the topic of noiseless steganography, which refers to the science and art of covert communications. Nostega provides a way to secure information in static stage and during data transmission to a legitimate recipient. His M.Sc. degree concentrated on Computer Architecture and Networks. His research is entitled "Security Architecture for Computers and Networks". Currently, he is The Academia Planet, CEO.

Code:

hxxp://www.mirrorcreator.com/files/1N40TFLA/NS_TKtCC.pdf_links
=== or ===
hxxp://mir.cr/1N40TFLA


beachsun 05-21-2016 23:20

Assembly Language for x86 Processors (7th Edition)
 
Assembly Language for x86 Processors (7th Edition)

Autor : Kip Irvine
Pages: 720
Publisher: Pearson; 7 edition (March 21, 2014)
Language: English
ISBN-10: 0133769402
ISBN-13: 978-0133769401

Assembly Language for x86 Processors, 7e is intended for use in undergraduate courses in assembly language programming and introductory courses in computer systems and computer architecture. This title is also suitable for embedded systems programmers and engineers, communication specialists, game programmers, and graphics programmers. Proficiency in one other programming language, preferably Java, C, or C++, is recommended.

Written specifically for 32- and 64-bit Intel/Windows platform, this complete and fullyupdated study of assembly language teaches students to write and debug programs at the machine level. This text simplifies and demystifies concepts that students need to grasp before they can go on to more advanced computer architecture and operating systems courses. Students put theory into practice through writing software at the machine level, creating a memorable experience that gives them the confidence to work in any OS/machine-oriented environment.

Additional learning and teaching tools are available on the author¡¯s web site at http://asmirvine.com/ where both instructors and students can access chapter objectives, debugging tools, supplemental files, a Getting Started with MASM and Visual Studio 2012 tutorial, and more.

Teaching and Learning Experience
This program presents a better teaching and learning experience¡ªfor you and your students. It will help:

Teach Effective Design Techniques: Top-down program design demonstration and explanation allows studentsto apply techniques to multiple programming courses.
Put Theory into Practice: Students will write software at the machine level, preparing them to work in any OS/machine-oriented environment.
Tailor the Text to Fit your Course: Instructors can cover optional chapter topics in varying order and depth.
Support Instructors and Students: Visit the author's web site http://asmirvine.com/ for chapter objectives, debugging tools, supplemental files, a Getting Started with MASM and Visual Studio 2012 tutorial, and more.

About the Author
Kip Irvine has written five computer programming textbooks, for Intel Assembly Language, C++, Visual Basic (beginning and advanced), and COBOL. His book Assembly Language for Intel-Based Computers has been translated into six languages. His first college degrees (B.M., M.M., and doctorate) were in Music Composition, at University of Hawaii and University of Miami. He began programming computers for music synthesis around 1982 and taught programming at Miami-Dade Community College for 17 years. Kip earned an M.S. degree in Computer Science from the University of Miami, and he has been a full-time member of the faculty in the School of Computing and Information Sciences at Florida International University since 2000.

Code:

hxxp://www.mirrorcreator.com/files/0COPNMGH/ALFX86P.pdf_links
=== or ===
hxxp://mir.cr/0COPNMGH


beachsun 05-21-2016 23:35

Applied Cryptography: Protocols, Algorithms and Source Code in C
 
Applied Cryptography: Protocols, Algorithms and Source Code in C

Autor: Bruce Schneier
Pages: 784
Publisher: Wiley; 1 edition (March 30, 2015)
Language: English
ISBN-10: 1119096723
ISBN-13: 978-1119096726


From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Applied Cryptography, the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real-world cryptographic algorithms including the Data Encryption Standard and RSA public-key cryptosystems. The book includes source-code listings and extensive advice on the practical aspects of cryptography implementation, such as the importance of generating truly random numbers and of keeping keys secure.

". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine

". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal

". . .easily ranks as one of the most authoritative in its field." -PC Magazine

The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. The book shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems.

With a new Introduction by the author, this premium edition will be a keepsake for all those committed to computer and cyber security.


Written by the world's most renowned security technologist this special Anniversary Edition celebrates 20 years for the most definitive reference on cryptography ever published, Applied Cryptography, Protocols, Algorithms, and Source Code in C. Inside security enthusiasts will find a compelling introduction by author Bruce Schneider written specifically for this keepsake edition.

Included in this edition:

Exclusive forward by Bruce Schneier
Ways to defeat the key escrow mechanism
Encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher
Protocols for digital signatures, authentication, secure elections, digital cash, and more
Detailed information on key management and cryptographic implementations

About the Author
Bruce Schneier is an internationally renowned security technologist, called a "security guru" by The Economist. He is the author of twelve books¡ªincluding his seminal work, Applied Cryptography: Protocols, Algorithms, and Source Code in C, and Secrets & Lies: Digital Security in a Networked World as well as hundreds of articles, essays, and academic papers. His influential newsletter "Crypto-Gram" and blog "Schneier on Security" are read by over 250,000 people. Schneier is a fellow at the Berkman Center for Internet and Society at Harvard Law School, a program fellow at the New America Foundation's Open Technology Institute, a board member of the Electronic Frontier Foundation, and an Advisory Board member of the Electronic Privacy Information Center. He is also the Chief Technology Officer of Resilient Systems, Inc. You can read his blog, essays, andacademic papers at www.schneier.com. He tweets at @schneierblog.

Code:

hxxp://hugefiles.net/lhfps1mntau4

gokilaravee 06-06-2016 16:02

Troubleshooting OpenStack
 
Hi,

Pls share following book if someone has,

Troubleshooting OpenStack by Tony Campbell

HTML Code:

http://www.amazon.com/Troubleshooting-OpenStack-Tony-Campbell/dp/1783986883/ref=sr_1_11?s=books&ie=UTF8&qid=1465113504&sr=1-11&keywords=openstack
Thanks in advance.

niculaita 06-06-2016 23:14

a backup for this hugefiles.net/lhfps1mntau4 ?

gokilaravee 06-13-2016 23:38

@niculaita:

Thanks. But File not found.
Please upload to some other site.

bolzano_1989 06-14-2016 09:23

Quote:

Originally Posted by gokilaravee (Post 105748)
@niculaita:

Thanks. But File not found.
Please upload to some other site.

https://www.bigfile.to/file/4GTVR6ZNpAAm/jdsv7.Applied.Cryptography..Protocols.Algorithms.and.Source.Code.in.C.by.Bruce.Schneier.pdf

gokilaravee 06-15-2016 00:54

@bolzano_1989:

Thanks for the link. I thought he uploaded "Troubleshooting OpenStackby Tony" Campbell", SO I asked to upload to other site.

I found link for this book in "novafile", but that site seems blocked , not able to open. I have tried with some proxies, but no success. please some can help me to download fro here

hxxp://novafile.com/u7pj4euiexer

Rikkie 07-02-2016 21:49

Windows Internals, Part 1 & Part II (6th Edition 2012)
by Mark E. Russinovich (Author), David A. Solomon (Author), Alex Ionescu (Author)
6/ed (2012) | English | PDF | 752 / 672 pages | ISBN-10: 0735648735 / 0735665877 | 25 / 22 Mb

Part I: http://www40.zippyshare.com/v/7rvcFlPV/file.html
Part II: http://www40.zippyshare.com/v/cLIjRKOi/file.html

(part II has been posted already, but link is dead)

zeytunak 07-06-2016 08:50

1 Attachment(s)
VX Ebooks Collections

hxxp://download.adamas.ai/dlbase/ebooks/VX_related/

All Download links in text files

bolzano_1989 07-22-2016 00:57

Quote:

Originally Posted by beachsun (Post 104785)
Wish your favorite PC game had a more informative heads up display? What if you could instantly collect all that loot from your latest epic battle? You don't need to be a sorcerer to transform a game you like into a game you love. Just make a bot to do the grunt work for you!

If you're familiar with Windows-based development and memory management, then Game Hacking, provides all the tools and knowledge you need to become a true game hacker. Let veteran game hacker Nick Cano teach you the basics, including reverse engineering, assembly code analysis, programmatic memory manipulation, and code injection. Throughout the book, you'll hone your new skills with hands-on labs, dig into practice binaries, and learn to write your own bot.

Level up your toolbox with hacking techniques:

Scan and modify memory with Cheat Engine
Explore program structure and execution flow with OllyDBG
Log processes and pinpoint useful data files with Process Monitor
Manipulate control flow through NOPing, hooking, and more
Locate and dissect common game memory structures
Discover the secrets behind common game bots, including:

Persistent hacks, such as a heads up display
Responsive hacks, such as auto healers and combo bots
Bots with artificial intelligence, such as cave walkers and automatic looters
Game hacking might seem like black magic, but that doesn't mean it's evil. When you know how bot makers create bots and why they do it, you'll be empowered to discourage and defend against bots in your own games!

Journey through the inner workings of PC games, and come away with a deeper understanding of both game design and computer security.

Code:

hxxp://www.mirrorcreator.com/files/1CHZJUGY/Game_Hacking_-_Developing_Autonomous_Bots_for_Online_Games_-_1st_Edition_(2016)_0.pdf_links
hxxp://mir.cr/1CHZJUGY


Developing Autonomous Bots for Online Games by Nick Cano is already out of Early Access.

SMH17 07-22-2016 22:29

Quote:

Originally Posted by zeytunak (Post 105997)
VX Ebooks Collections

hxxp://download.adamas.ai/dlbase/ebooks/VX_related/

All Download links in text files

WOW This list is HUGE. :eek:
What are the MUST read between all these ebooks?

gillie92 07-27-2016 10:23

Applied Mathematics For Reversers series
 
This is actually from http://reteam.org

Mirror:

Part 1: https://mega.nz/#!OYRRRDSB

Part 2: https://mega.nz/#!3URlUTKQ

Part 3: https://mega.nz/#!eNwmRSCJ

zzfeed 07-27-2016 22:59

Quote:

Originally Posted by gillie92 (Post 106308)

you forgot the decryption keys!!!:)

dreambuddy 08-03-2016 19:14

Quote:

Originally Posted by zzfeed (Post 106320)
you forgot the decryption keys!!!:)

Alternatively, you could access all the three documents from reteam's page here - hxxp://reteam.org/math.html :)

sh3dow 09-16-2016 08:10

I'm looking for these two books
1- What Makes It Page?: The Windows 7 (x64) Virtual Memory Manager
2- Windows NT File System Internals : OSR Classic Reprints (2006) --> not 1997 one

typedef 09-19-2016 03:11

I'm looking for:

https://sourcemaking.com/design_patterns

Quote:

Design Patterns eBook

The book explains classic 23 design patterns by Gang of Four + 3 extra patterns.

The book is written in clear, simple language that makes it easy to read and understand.

Available in PDF, EPUB and MOBI. All DRM-free.

runio 09-20-2016 14:08

Quote:

Originally Posted by typedef (Post 107153)
I'm looking for:

https://sourcemaking.com/design_patterns

Design Patterns Explained Simply

Code:

hxxp://www84.zippyshare.com/v/DLjsfWIr/file.html

pass:exetools


Stitch 10-05-2016 09:43

2 Attachment(s)
Website contains a lot books for free!
For members only.
I'll post more stuff later!

Stitch


Edit: Added second website.

zeytunak 10-26-2016 23:12

please share

LLVM Essentials
Suyog Sarda, Mayur Pandey

hxxps://www.packtpub.com/application-development/llvm-essentials

thanks

TechLord 10-27-2016 12:25

Quote:

Originally Posted by zeytunak (Post 107521)
please share

LLVM Essentials
Suyog Sarda, Mayur Pandey
....

Download it here :

Quote:

http://www119.zippyshare.com/v/jWiXtzqq/file.html
Enjoy :)

zeytunak 10-29-2016 23:39

Quote:

Originally Posted by TechLord (Post 107524)
Download it here :



Enjoy :)

Thanks a lot bro.

Can you share LLVM Cookbook by Mayur Pandey, Suyog Sarda ?

TechLord 10-30-2016 07:25

Quote:

Originally Posted by zeytunak (Post 107544)
Thanks a lot bro.

Can you share LLVM Cookbook by Mayur Pandey, Suyog Sarda ?

Here we go :D :

LLVM Cookbook by Mayur Pandey (2015) :

Quote:

PDF:
http://www98.zippyshare.com/v/ACuQ0dM7/file.html

ePub:
http://www98.zippyshare.com/v/6txkJXhR/file.html

**************************************************************************************************************************************

As a sidenote, LLVM combined with Symbolic Execution is an excellent technique in creation of deobfuscators/unpackers for VMProtect ... Takes time and tedious though ...

While we are on the topic of LLVM, you may want to go and read this :

Playing with the Tigress binary protection. Automatic deobfuscation using symbolic execution and LLVM and

Challenges HERE ...

TechLord 11-04-2016 10:55

Database Design for Mere Mortals 3rd Ed (2013) :

Download it here :

Quote:

http://www2.zippyshare.com/v/xERtguHx/file.html
*****************************************************************

Databases Demystified [PDF]:

Download it here :

Quote:

http://www34.zippyshare.com/v/PbLc1Bjh/file.html

computerline 11-11-2016 00:17

The Art of PCB Reverse Engineering
 
I'm looking for The Art of PCB Reverse Engineering by Ng Keng Tiong. Does anyone has a copy of it :)

sh3dow 11-13-2016 22:47

Troubleshooting with the Windows Sysinternals Tools, 2nd Edition
Paperback: 688 pages
Publisher: Microsoft Press; 2 edition (October 27, 2016)
PHP Code:

http://www38.zippyshare.com/v/xaGfI175/file.html 

:D

sh3dow 11-13-2016 22:51

Learning Linux Binary Analysis
Author: Ryan "elfmaster" O'Neill
Length: 282 pages
Publisher: Packt Publishing
Publication Date: 2016-02-29

Table of Contents
Chapter 1. The Linux Environment and Its Tools
Chapter 2. The ELF Binary Format
Chapter 3. Linux Process Tracing
Chapter 4. ELF Virus Technology ¨C Linux/Unix Viruses
Chapter 5. Linux Binary Protection
Chapter 6. ELF Binary Forensics in Linux
Chapter 7. Process Memory Forensics
Chapter 8. ECFS ¨C Extended Core File Snapshot Technology
Chapter 9. Linux /proc/kcore Analysis
PHP Code:

http://www53.zippyshare.com/v/ZmAt84Xs/file.html 


sh3dow 11-18-2016 19:38

Stack Frames: A Look From Inside
Paperback: 171 pages
Publisher: Apress; 1st ed. edition (September 29, 2016)

Table of Contents
Chapter 1: Hardware and Software
Chapter 2: GNU/Linux Distributions
Chapter 3: Base 2, 8, and 16 Notations
Chapter 4: Executables and Libraries
Chapter 5: Stack Frames

---
extremely helpful for exploit developer or anyone need to understand how stack frames work.
PHP Code:

http://www40.zippyshare.com/v/0znC7ppt/file.html 


cybercoder 01-02-2017 06:35

Some nice resources....
http://www.mediafire.com/folder/i6fvhtsfqaat9/mohnageib
Don't leak this or I will no longer share these type of things.. :)

mesagio 01-06-2017 02:24

Samsung ARTIK Reference The Definitive Developers Guide
 
Samsung ARTIK Reference The Definitive Developers Guide
hxxp://nitroflare.com/view/EE7C1039C39DFEE/1484223217.epub

nanobit 01-26-2017 03:21

The Art of Debugging
 
Quote:

Debugging is crucial to successful software development, but even many experienced programmers find it challenging. Sophisticated debugging tools are available, yet it may be difficult to determine which features are useful in which situations. The Art of Debugging is your guide to making the debugging process more efficient and effective.
more at goodreads

Code:

http://sendfile.su/1302322

TechLord 03-01-2017 06:59

Car Hacker's Handbook
 
Car Hacker's Handbook :

Description from the Website :

Quote:

Download the book for free!

Below you can download the book in several different formats. The license of the books is under a Creative Commons Attribution-Noncommercial-ShareAlike license, which lets you share it, remix it, and share your remixes, provided that you do so on a noncommercial basis.

Modern cars are more computerized than ever. Infotainment and navigation systems, Wi-Fi, automatic software updates, and other innovations aim to make driving more ­convenient. But vehicle technologies haven't kept pace with today's more hostile security environment, leaving ­millions vulnerable to attack.

The Car Hacker's Handbook will give you a deeper understanding of the computer systems and embedded software in modern vehicles. It begins by examining vulnerabilities and providing detailed explanations of communications over the CAN bus and ­between devices and systems.

Then, once you have an understanding of a ­vehicle's communication network, you'll learn how to ­intercept data and perform specific hacks to track vehicles, unlock doors, glitch engines, flood communication, and more. With a focus on low-cost, open source hacking tools such as Metasploit, Wireshark, Kayak, can-utils, and ­ChipWhisperer, The Car Hacker's Handbook will show you how to:

Build an accurate threat model for your vehicle
Reverse engineer the CAN bus to fake engine signals
Exploit vulnerabilities in diagnostic and data-logging systems
Hack the ECU and other firmware and embedded systems
Feed exploits through infotainment and vehicle-to-vehicle communication systems
Override factory settings with performance-tuning techniques
Build physical and virtual test benches to try out exploits safely
Get it here :

Direct Download :
Code:

https://drive.google.com/file/d/0B9fLHoDsdVNhWTB0d2hyQkhvNlE/view?usp=sharing
Original Page here.


All times are GMT +8. The time now is 08:01.

Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2024, vBulletin Solutions, Inc.
Always Your Best Friend: Aaron, JMI, ahmadmansoor, ZeNiX