Exetools  

Go Back   Exetools > General > General Discussion

Notices

Reply
 
Thread Tools Display Modes
  #616  
Old 04-17-2013, 01:35
acoustics
 
Posts: n/a
I hope somebody could share ebook about: Memory forensics and Anti memory forensics technique. Thank you very much
Reply With Quote
  #617  
Old 04-19-2013, 22:42
nikkapedd nikkapedd is offline
VIP
 
Join Date: Mar 2011
Location: ::Bratva::
Posts: 275
Rept. Given: 275
Rept. Rcvd 151 Times in 65 Posts
Thanks Given: 202
Thanks Rcvd at 275 Times in 112 Posts
nikkapedd Reputation: 100-199 nikkapedd Reputation: 100-199
Wiley Beginning SharePoint.2013 Development 2013
Code:
http://www72.zippyshare.com/v/96605361/file.html
Wiley Beginning SharePoint 2013
Code:
http://www68.zippyshare.com/v/82556306/file.html
Wiley Professional SharePoint 2013 Development 2013
Code:
http://www58.zippyshare.com/v/45645995/file.html
Code:
for all pass if necessary: rl-team.net
Reply With Quote
The Following User Gave Reputation+1 to nikkapedd For This Useful Post:
unn4m3D_BR (05-09-2013)
  #618  
Old 04-22-2013, 00:07
kienmanowar's Avatar
kienmanowar kienmanowar is offline
Friend
 
Join Date: Jan 2006
Location: VN
Posts: 98
Rept. Given: 37
Rept. Rcvd 17 Times in 10 Posts
Thanks Given: 161
Thanks Rcvd at 72 Times in 35 Posts
kienmanowar Reputation: 17
Hakin9 2012 Collection
http://www.4shared.com/rar/feWLKn9O/...2012_issue.htm

Regards,
Reply With Quote
The Following 2 Users Gave Reputation+1 to kienmanowar For This Useful Post:
TechLord (04-23-2013), Vivaldi (05-16-2013)
  #619  
Old 04-28-2013, 03:51
typedef
 
Posts: n/a
Violent Python

http://www.amazon.co.uk/Violent-Python-TJ-OConnor/dp/1597499579/ref=sr_1_1?ie=UTF8&qid=1367092319&sr=8-1&keywords=violent+python

"Violent Python" shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.

http://www.sendspace.com/file/3i4hip
Reply With Quote
  #620  
Old 04-28-2013, 04:53
wilson bibe wilson bibe is offline
VIP
 
Join Date: Nov 2012
Posts: 492
Rept. Given: 489
Rept. Rcvd 439 Times in 180 Posts
Thanks Given: 853
Thanks Rcvd at 176 Times in 112 Posts
wilson bibe Reputation: 400-499 wilson bibe Reputation: 400-499 wilson bibe Reputation: 400-499 wilson bibe Reputation: 400-499 wilson bibe Reputation: 400-499
For users of windows XP

A lot of tricks for this system OS, in this book help
Link:http://rghost.net/download/45605240/e5a45cebe951f67711f357e31832553d9e6afe29/WXP.rar
Pass:exetools
Reply With Quote
The Following 2 Users Gave Reputation+1 to wilson bibe For This Useful Post:
Dreamer (04-28-2013), nikkapedd (05-01-2013)
  #621  
Old 04-28-2013, 06:45
Dreamer's Avatar
Dreamer Dreamer is offline
Family
 
Join Date: May 2012
Posts: 604
Rept. Given: 613
Rept. Rcvd 659 Times in 257 Posts
Thanks Given: 117
Thanks Rcvd at 170 Times in 128 Posts
Dreamer Reputation: 38
Tweaking Experience Registry Guide 4.0

Reply With Quote
The Following 2 Users Gave Reputation+1 to Dreamer For This Useful Post:
chessgod101 (04-28-2013), wilson bibe (04-28-2013)
  #622  
Old 05-11-2013, 18:28
Rusty
 
Posts: n/a
Client-Side Attacks and Defense

Individuals wishing to attack a company's network have found a new path of least resistance-the end user. A client- side attack is one that uses the inexperience of the end user to create a foothold in the user's machine and therefore the network. Client-side attacks are everywhere and hidden in plain sight. Common hiding places are malicious Web sites and spam. A simple click of a link will allow the attacker to enter. This book presents a framework for defending your network against these attacks in an environment where it might seem impossible.

The most current attacks are discussed along with their delivery methods, such as browser exploitation, use of rich Internet applications, and file format vulnerabilities. The severity of these attacks is examined along with defences against them, including antivirus and anti-spyware, intrusion detection systems, and end-user education.
  • Design and implement your own attack, and test methodologies derived from the approach and framework presented by the authors
  • Learn how to strengthen your network's host- and network-based defense against attackers' number one remote exploit-the client-side attack
  • Defend your network against attacks that target your company's most vulnerable asset-the end user


Quote:
http://ul.to/wili58t5
Reply With Quote
The Following User Gave Reputation+1 to For This Useful Post:
p4r4d0x (06-03-2013)
  #623  
Old 05-11-2013, 18:30
Rusty
 
Posts: n/a
The Hacker's Guide to OS X: Exploiting OS X from the Root Up

Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers

As a resource to the reader, the companion website will provide links from the authors, commentary and updates.
  • *Provides relevant information including some of the latest OS X threats
  • *Easily accessible to those without any prior OS X experience
  • *Useful tips and strategies for exploiting and compromising OS X systems
  • *Includes discussion of defensive and countermeasure applications and how to use them
  • *Covers mobile IOS vulnerabilities

Code:
http://ul.to/ppcs3n1i
Reply With Quote
The Following User Gave Reputation+1 to For This Useful Post:
  #624  
Old 05-13-2013, 12:34
Rigel Rigel is offline
Friend
 
Join Date: Nov 2009
Location: Orion
Posts: 42
Rept. Given: 2
Rept. Rcvd 14 Times in 7 Posts
Thanks Given: 1
Thanks Rcvd at 4 Times in 2 Posts
Rigel Reputation: 14
thanks, some goodbooks to read.
Reply With Quote
  #625  
Old 05-25-2013, 03:10
nikkapedd nikkapedd is offline
VIP
 
Join Date: Mar 2011
Location: ::Bratva::
Posts: 275
Rept. Given: 275
Rept. Rcvd 151 Times in 65 Posts
Thanks Given: 202
Thanks Rcvd at 275 Times in 112 Posts
nikkapedd Reputation: 100-199 nikkapedd Reputation: 100-199
Understanding And Using C Pointers
| 2013 | OReilly
Code:
http://www10.zippyshare.com/v/26911736/file.html
Windows Server 2012 Automation with PowerShell Cookbook
| 2013 | Packt
Code:
http://www39.zippyshare.com/v/58911474/file.html
Code:
pass if necessary: rl-team.net
Reply With Quote
The Following User Gave Reputation+1 to nikkapedd For This Useful Post:
  #626  
Old 06-02-2013, 23:01
nikkapedd nikkapedd is offline
VIP
 
Join Date: Mar 2011
Location: ::Bratva::
Posts: 275
Rept. Given: 275
Rept. Rcvd 151 Times in 65 Posts
Thanks Given: 202
Thanks Rcvd at 275 Times in 112 Posts
nikkapedd Reputation: 100-199 nikkapedd Reputation: 100-199
A rich list of new useful ebooks here..
Code:
http://rl-team.net/1146671214-0day-pack-01062013.html
enjoy....
Reply With Quote
  #627  
Old 06-03-2013, 02:31
Dreamer's Avatar
Dreamer Dreamer is offline
Family
 
Join Date: May 2012
Posts: 604
Rept. Given: 613
Rept. Rcvd 659 Times in 257 Posts
Thanks Given: 117
Thanks Rcvd at 170 Times in 128 Posts
Dreamer Reputation: 38
interesting stuff on programing


Reply With Quote
  #628  
Old 06-04-2013, 03:14
Dreamer's Avatar
Dreamer Dreamer is offline
Family
 
Join Date: May 2012
Posts: 604
Rept. Given: 613
Rept. Rcvd 659 Times in 257 Posts
Thanks Given: 117
Thanks Rcvd at 170 Times in 128 Posts
Dreamer Reputation: 38
Wrox - Visual Studio 2010 and .NET 4 Six-in-One

password : exetools
Reply With Quote
The Following 3 Users Gave Reputation+1 to Dreamer For This Useful Post:
nikkapedd (06-04-2013), wilson bibe (06-04-2013), XorRanger (06-19-2013)
  #629  
Old 06-18-2013, 18:03
Dreamer's Avatar
Dreamer Dreamer is offline
Family
 
Join Date: May 2012
Posts: 604
Rept. Given: 613
Rept. Rcvd 659 Times in 257 Posts
Thanks Given: 117
Thanks Rcvd at 170 Times in 128 Posts
Dreamer Reputation: 38
The Art of Unpacking - Part1

The Art of Unpacking - Part1.part1.rar

The Art of Unpacking - Part1.part2.rar
Reply With Quote
The Following 5 Users Gave Reputation+1 to Dreamer For This Useful Post:
Git (06-18-2013), TechLord (06-21-2013), Vivaldi (06-20-2013), XorRanger (06-19-2013)
  #630  
Old 06-30-2013, 10:34
NeOXOeN NeOXOeN is offline
Friend
 
Join Date: Jan 2005
Posts: 273
Rept. Given: 2
Rept. Rcvd 0 Times in 0 Posts
Thanks Given: 2
Thanks Rcvd at 18 Times in 18 Posts
NeOXOeN Reputation: 3
does anyone have Dr. Dobb's Developer Library DVD Release 6 ??

bye THX
Reply With Quote
Reply

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off


Similar Threads
Thread Thread Starter Forum Replies Last Post
ebooks conan981 General Discussion 0 07-07-2006 22:36
some ebooks fulone General Discussion 1 05-20-2004 21:22


All times are GMT +8. The time now is 08:26.


Always Your Best Friend: Aaron, JMI, ahmadmansoor, ZeNiX, chessgod101
( 1998 - 2024 )