Exetools

Exetools (https://forum.exetools.com/index.php)
-   General Discussion (https://forum.exetools.com/forumdisplay.php?f=2)
-   -   eBOOKS (POST ALL HERE) (https://forum.exetools.com/showthread.php?t=3440)

*RemedY* 01-24-2013 18:28

Hi fellows,

here is a site full of any kind of IT books.
It offers even fast, unlimited direct downloads from the site, thus no shared host hassle.

Code:

http://it-ebooks.info/
Enjoy.

Regards
*RemedY*

Dreamer 01-26-2013 02:36

mega tutorials
 
this one found by my friend khonel_00




bilbo 01-28-2013 01:22

Gentoomen Library
 
3616 files and 35 GB covering everything from Algorithms to XML.

You can get them one by one too, but only via Torrent.
HERE is the list, and HERE is the unique torrent link

Best regards, bilbo

mr.slooz 02-05-2013 23:56

Ross Anderson - Security Engineering, second edition for free

hxxp://www.cl.cam.ac.uk/~rja14/book.html

nikkapedd 02-19-2013 02:52

Professional Visual Studio 2012
Publisher: Wrox | 2012 | EPUB + PDF | ISBN: 1118337700 | 1104 pages | 16.9 + 45.4 Mb
Code:

pdf
http://uploaded.net/file/xxu86em4/19022013_03_PDF_Sheva370.rar

epub
http://uploaded.net/file/7vhpivb7/19022013_03_EPUB_Sheva370.rar


rangga 02-21-2013 20:12

I hope somebody could share this one -- "Real Digital Forensics: Computer Security and Incident Response". ---Thx.

*RemedY* 03-04-2013 09:25

List of all books
 
1 Attachment(s)
Hi there,

some weeks ago I've posted a link to it-ebooks.info. A site with direct ebooks downloads. One shortcoming of this site is the lack of a browsable index. This makes it hard to look for a certain topic and in general it's just inconvenient.
To overcome this issue I've created a tiny Python script that creates the index - consisting of title, second title (if there is any), description, and clickable download link. I hope you'll find it useful.
I have also put the script itself in the .rar file so you can adjust it if you want the index to be different.

Best regards
*RemedY*

nguoidocsach 03-08-2013 12:23

1 Attachment(s)
Stuxnet: The True Story Of Hunt And Evolution
Publication Date: February 18, 2013
http://d188rgcu4zozwl.cloudfront.net/content/B00BJ6KPLS/images/cover.jpg

This book is about a notorious computer virus Stuxnet. You might be wondering: there are so many computer viruses, why Stuxnet? What is so special about the Stuxnet computer worm? Stuxnet never managed to become the biggest, the scariest, or the most sophisticated malware. At the same time, because of some unexpected twists of fate, Stuxnet had become much more than just a computer worm. Stuxnet brought from shadows into spotlight some very serious issues with the Internet security ranging from stolen digital certificates and defenselessness of industrial computers to an existence of ¡°gray¡± market of pre-written software vulnerabilities for sale. Overall, the story of Stuxnet is a story of its evolution from an ordinary malware to a cyber-weapon that was followed by its major transformation into a successful long-term propaganda-weapon.

The appearance of Stuxnet that was loaded with two digital certificates and four previously unknown breaches in Window¡¯s defense raised some painful questions. Who was behind Stuxnet? For how long was this cyber-war going on? Are secure Internet transactions really secure? Can we trust digital certificates? Who is in the business of creating and selling malware to penetrate Internet browsers¡¯ security? The story of the computer worm Stuxnet is full of surprises and unexpected twists that might change your opinion about the present and future of the Internet and the World Wide Web.

Dreamer 03-22-2013 04:30

Sams - Covert Java Techniques for Decompiling, Patching,and Reverse Engineering
 
2 Attachment(s)
Description:
The book gives some practical methods of how to overcome the many problems:
Decompile, and confusion;
Decipher the private variables and methods;
Alternative and patch application class;
Eavesdropping technology simplifies troubleshooting and performance tuning;
The interception control flow and control class loading;

Description:
The book gives some practical methods of how to overcome the many problems:
Decompile, and confusion;
Decipher the private variables and methods;
Alternative and patch application class;
Eavesdropping technology simplifies troubleshooting and performance tuning;
The interception control flow and control class loading;
Understand and adjust bytecode;
Change the third-party application logic;
Decipher the behavior of the JVM;
To protect the commercial software from decipher;
Some of the tips mentioned in this book can help you save time and improve efficiency. Each chapter focusing on the kind of technology to solve a class of problems overview of where the problem lies, given the solution of the problem, and then give other idea to test the program.

[Contents]
Chapter 1 Getting Started Guide
1.1 Summary - time and purpose of using the various methods
1.2 use of document management to improve the efficiency of program development
1.2.1 FAR 和 Total Commander
1.2.2 Java IDE
1.3 the function and structure of the sample application
1.4 quick test
1.5 Summary
Chapter 2 decompiled class
2.1 determine when to decompile
2.2 understand the best anti-compiler
2.3 decompiled class
2.4 decompile feasible elements
2.5 decompiled code potential problems
2.6 quick test
2.7 Summary
Chapter 3 of confusion classes
3.1 protection code behind the idea
3.2 Confusion - kind of intellectual property protection
3.3 the transformation of the program executed by the confusion
3.3.1 remove debugging information
3.3.2 The name of the processing
3.3.3 coding Java string
3.3.4 change control flow
3.3.5 insert the correct code
3.3.6 remove unused code (compression)
3.3.7 optimized bytecode
3.4 understand the confusion
The 3.5 potential problems and common solutions
3.5.1 Dynamic Class Loading
3.5.2 reflection
3.5.3 serialization
3.5.4 violate naming conventions
3.5.5 maintenance problems
3.6 è¿ç”¨ Zelix KlassMaster æ··æ·† 一个 Chat 应用 程åº
3.7 to crack the code of confusion
3.8 quick test
3.9 Summary
Chapter 4 decipher non-public methods and variables
4.1 package
4.2 access package and a member of the protected class
4.3 access private class members
4.4 quick test
4.5 Summary
Chapter 5 replacement and repair applications
5.1 After various attempts have failed should do
5.2 to find the class must be patched
5.2.1 common method
5.2.2 Search text string
5.2.3 obfuscated code processing
5.3 an example of a need to repair
5.3.1 using the class name
5.3.2 Search text string
5.3.3 use the call stack search program logic
5.4 patched classes to provide new logic
5.5 refactoring applications to load and use the repair class
5.6 patch package package
5.7 quick test
5.8 Summary
Chapter 6 uses tracking technology
Chapter 7 Java security
Chapter 8 spy runtime environment
Chapter 9 decipher coded informal debugger
Chapter 10, the use of performance analysis tools to analyze applications running
Chapter 11, the use of positioning and correction of the load test scalability problem
Chapter 12 Application of Reverse Engineering
Chapter 13 eavesdropping technology
Chapter 14 of the control class loading
Chapter 15 alternative and patch core Java classes
Chapter 16 interception control flow
Chapter 17 to understand and adjust bytecode
Chapter 18, the use of native code patching method for total control
Chapter 19 protection commercial program from crack to
Appendix A commercial software license
Appendix B Resources
Appendix C Test Questions

Ps: downloaded from Unppack.cn


Attachment 6711

Attachment 6712

Dreamer 04-02-2013 01:35

lot of books




smo 04-05-2013 02:43

Does anyone have an ebook about Kerberos?

nikre 04-05-2013 05:02

what book for Kerberos?
this just api monitor bro

Dreamer 04-05-2013 15:07

here is what google say



typedef 04-16-2013 21:31

Anyone know where I can get this book?

http://www.amazon.com/gp/product/0321578899?ie=UTF8&tag=advancenetdeb-20&linkCode=as2&camp=1789&creative=390957&creativeASIN=0321578899

I can't find it on the forum. I've search, but there's nothing. It looks awesome.

arnix 04-17-2013 01:18

Quote:

Originally Posted by typedef (Post 84163)
Anyone know where I can get this book?

http://www.amazon.com/gp/product/0321578899

I can't find it on the forum. I've search, but there's nothing. It looks awesome.

hxxp://rghost.net/45337823

password: the result of 12345678 xor 87654321


All times are GMT +8. The time now is 17:38.

Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2024, vBulletin Solutions, Inc.
Always Your Best Friend: Aaron, JMI, ahmadmansoor, ZeNiX