Skip to content

Commit

Permalink
Removed non-working links
Browse files Browse the repository at this point in the history
  • Loading branch information
Chan9390 committed May 9, 2017
1 parent fce4565 commit 7a255fc
Showing 1 changed file with 1 addition and 133 deletions.
134 changes: 1 addition & 133 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -25,200 +25,68 @@ The topics include:
- [Wireless Network Pentesting](#wireless-network-pentesting)
- [Misc](#misc)


----------

### Android & iOS
- **Android**
- [Android Hacker's Handbook](http://it-ebooks.info/book/3767/)
- [Android Security Internals](http://it-ebooks.info/book/4713/)
- [Learning Pentesting for Android Devices](http://it-ebooks.info/book/3359/)
- **iOS**
- [Learning iOS Security](http://it-ebooks.info/book/4873/)


----------

### Cloud Security
- [Resource Optimization and Security for Cloud Services](http://it-ebooks.info/book/6971/)


----------

### Defensive Security
- [Cyber Operations - Building, Defending, and Attacking Modern Computer Networks](http://it-ebooks.info/book/6441/)
- [Cyber-Physical Attack Recovery Procedures](http://it-ebooks.info/book/1466085423/)
- [Cyber Threat!](http://it-ebooks.info/book/3636/)
- [Cyber Security](http://it-ebooks.info/book/6360/)
- [Cyber Security Policy Guidebook](http://it-ebooks.info/book/2375/)
- [Essential Cybersecurity Science](http://it-ebooks.info/book/6557/)
- [Holistic Info-Sec for Web Developers (Fascicle 0)](https://leanpub.com/holistic-infosec-for-web-developers)
- [Holistic Info-Sec for Web Developers (Fascicle 1)](https://leanpub.com/holistic-infosec-for-web-developers-fascicle1-vps-network-cloud-webapplications)
- [Identity and Data Security for Web Development : Best Practices](http://it-ebooks.info/book/1462886769/)
- [Identity, Authentication, and Access Management in OpenStack](http://it-ebooks.info/book/6554/)
- [OWASP Hacking Tutorials and Web App Protection](https://www.owasp.org/images/d/d0/Web_Services_Hacking_and_Hardening.pdf)
- [Pattern and Security Requirements](http://it-ebooks.info/book/6359/)
- [Practical Intrusion Analysis](http://it-ebooks.info/book/2303/)
- [Security for Web Developers](http://it-ebooks.info/book/6453/)
- [Threat Modeling - Designing for Security](https://news.asis.io/sites/default/files/Threat%20Modeling.pdf)

----------

### IoT
- [Abusing the Internet of Things](http://it-ebooks.info/book/6419/)


----------

### Malware Analysis & Forensics
- [Mastering Python Forensics](http://it-ebooks.info/book/6646/)
- [Big Data Forensics: Learning Hadoop Investigations](http://it-ebooks.info/book/6282/)
- [Windows Malware Analysis Essentials](http://it-ebooks.info/book/6280/)
- [Cuckoo Malware Analysis](http://it-ebooks.info/book/3201/)
- [Practical Malware Analysis](http://it-ebooks.info/book/2227/)
- [Hacking Exposed Computer Forensics, 2nd Edition](http://it-ebooks.info/book/1097/)
- [Learning iOS Forensics](http://it-ebooks.info/book/5771/)


----------

### Network Pentesting
- [Network Attacks and Exploitation](http://it-ebooks.info/book/6972/)
- [Nmap Essentials](http://it-ebooks.info/book/6170/)
- [The Book of PF, 2nd Edition](http://it-ebooks.info/book/1719/)
- [Wireshark Essentials](http://it-ebooks.info/book/6316/)
- [Wireshark Starter](http://it-ebooks.info/book/1783/)


----------

### Offensive Security
- **Antivirus Evasion**
- [The Antivirus Hacker's Handbook](http://it-ebooks.info/book/6295/)

- **Backtrack**
- [BackTrack 4: Assuring Security by Penetration Testing](http://it-ebooks.info/book/1989/)
- [Backtrack: Advance Hacking tutorials](http://www.binary-zone.com/course/BZ-Backtrack.usage.pdf)
- [Hack your Friend using Backtrack](http://hackerspace.cs.rutgers.edu/library/bt5tutorials/HackYourFriend.pdf)
- **Browser Hacking**
- [The Browser Hacker's Handbook](http://it-ebooks.info/book/3768/)
- **Embedded Devices**
- [Penetration Testing with Raspberry Pi](http://it-ebooks.info/book/4908/)
- **Hacking**
- [Advanced Penetration Testing for Highly-Secured Environments](http://it-ebooks.info/book/2313/)
- [Advanced SQL Injection Hacking and Guide](https://defcon.org/images/defcon-17/dc-17-presentations/defcon-17-joseph_mccray-adv_sql_injection.pdf)
- [A Beginners Guide To Hacking Computer Systems](http://www.mediafire.com/download/dyewn6f3r3olnuw/A+Beginners+Guide+To+Hacking+Computer+Systems.zip)
- [Blind SQL Injection Discovery & Exploitation](http://blueinfy.com/wp/blindsql.pdf)
- [CEH – Hacking Database Secrets and Exploit](http://repo.hackerzvoice.net/depot_cehv6/)
- [Ethical Hacking Complete E-book for Beginners](http://pdf.textfiles.com/security/palmer.pdf)
- [Gray Hat Hacking, 3rd Edition](http://it-ebooks.info/book/1917/)
- [Hackers High School 13 Complete Hacking Ebooks](http://www.mediafire.com/download/u2akquvibe6ia13/Hackers+High+School+13+Complete+Hacking+E-books.rar)
- [Hacking : The Art of Exploitation, 2nd Edition](http://it-ebooks.info/book/2624/)
- [Hacking attacks and Examples Test](http://www.mediafire.com/download/dpysbzboord42lo/Hacking+attacks+and+Examples+Test.zip)
- [Hacking into Computer Systems](http://www.academia.edu/1153769/Hacking_into_computer_systems_-_a_beginners_guide)
- [Hackers' Secrets](http://www.onlinepot.org/security/HackersSecrets.pdf)
- [The Hackers Underground Handbook](https://decryptedmatrix.com/wp-content/uploads/2012/06/The-Hackers-Underground-Handbook.pdf)
- [Metasploit Penetration Testing Cookbook](http://it-ebooks.info/book/4299/)
- **Operating Systems**
- **Linux**
- [Designing BSD Rootkits](http://it-ebooks.info/book/1463046356/)
- [Hacking Exposed Linux, 3rd Edition](http://it-ebooks.info/book/1095/)
- **Windows**
- [Hacking Exposed Windows, 3rd Edition](http://it-ebooks.info/book/1093/)
- [Modern Windows Exploit Development](https://userscloud.com/9ifscj08wllu)
- **Web & WebApp**
- [501 Website Hacking Secrets](http://www.mediafire.com/download/da8nhq8oh5iddae/501+Website+Hacking+Secrets.zip)
- [Cross Site Scripting and Hacking Websites](http://www.objectif-securite.ch/research/xss_security_days.pdf)
- [Dangerous Google Hacking Database and Attacks](http://www.mediafire.com/download/s3535s2yg1w26u7/Dangerours+Google+Hacking+Database+and+Attacks.zip)
- [Hack any Website, Complete Web App Hacking](https://www.defcon.org/images/defcon-11/dc-11-presentations/dc-11-Gentil/dc-11-gentil.pdf)
- [Hacking Exposed Web 2.0](http://it-ebooks.info/book/1094/)
- [Hacking Exposed Web Applications, 3rd Edition](http://it-ebooks.info/book/1100/)
- [Hacking Website Database and owning systems](http://www.blackhat.com/presentations/bh-europe-07/Cerrudo/Whitepaper/bh-eu-07-cerrudo-WP-up.pdf)
- [Internet Advanced Denial of Service (DDOS) Attack](http://www.mediafire.com/download/b4jmyl022rh48c0/Internet+Advanced+Denial+of+Service+%28DDOS%29+Attack.zip)
- [Internet Security Technology and Hacking](http://www.mediafire.com/download/7tk860o8n777iqa/Internet+Security+Technology+and+Hacking.zip)
- [The Web Application Hacker's Handbook](https://leaksource.files.wordpress.com/2014/08/the-web-application-hackers-handbook.pdf)
- [Vulnerability Exploit & website Hacking for Dummies](http://www.mediafire.com/download/j8cvosmvcb4vpw9/Vulnerability+Exploitation+%26+website+Hacking+for+Dummies.rar)
- [Web App Hacking (Hackers Handbook)](http://www.mediafire.com/download/c7b18vtpc77sysi/Web+App+Hacking+%28Hackers+Handbook%29.zip)
- [Web Penetration Testing with Kali Linux](http://it-ebooks.info/book/3000/)
- [Web Penetration Testing with Kali Linux, 2nd Edition](http://it-ebooks.info/book/6565/)
- [XSS, Vulnerability Exploitation & Website Hacking](http://www.cis.syr.edu/~wedu/seed/Labs/Attacks_XSS/XSS.pdf)


----------

### Programming Languages
- **Bash**
- [Penetration Testing with the Bash shell](http://it-ebooks.info/book/3568/)
- **Java**
- [Instant Web Scraping with Java](http://it-ebooks.info/book/5738/)
- **Node.js**
- [Secure Your Node.js Web Application](http://it-ebooks.info/book/1461595103/)
- **PHP**
- [PHP Web Scraping](http://it-ebooks.info/book/4297/)
- [Pro PHP Security, 2nd Edition](http://it-ebooks.info/book/2055/)
- **Python**
- [Black Hat Python](http://it-ebooks.info/book/4714/)
- [Violent Python : A Cookbook for Hackers (2013)](https://github.com/reconSF/python/blob/master/Syngress.Violent.Python.a.Cookbook.for.Hackers.2013.pdf)
- [Web Scraping with Python](http://it-ebooks.info/book/6676/)
- [Web Scraping with Python - Collecting Data from the Modern Web](http://it-ebooks.info/book/6035/)
- **SQL**
- [Dynamic SQL: Applications, Performance, and Security](http://it-ebooks.info/book/1463047545/)


----------

### Reverse Engineering
- [Practical Reverse Engineering](http://it-ebooks.info/book/3766/)
- [Reverse Engineering Hacking and Cracking](https://media.blackhat.com/bh-dc-11/Grand/BlackHat_DC_2011_Grand-Workshop.pdf)
- [Reverse Engineering for Beginners ](http://www.t-gr.com/fotis/books/re.pdf)


----------

### SysAdmin
- [Beginning the Linux Command Line, 2nd edition](http://it-ebooks.info/book/6508/)
- [Junos Security](http://it-ebooks.info/book/629/)
- [Learning Puppet Security](http://it-ebooks.info/book/5805/)
- [Mastering Linux Network Administration](http://it-ebooks.info/book/6649/)
- [Microsoft Windows XP Networking and Security Inside Out](http://it-ebooks.info/book/2478/)
- [The Accidental SysAdmin Handbook, 2nd Edition](http://it-ebooks.info/book/6917/)
- [The InfoSec Handbook](http://it-ebooks.info/book/4271/)
- [The Practice of Network Security Monitoring](http://it-ebooks.info/book/4447/)


----------

### Virus Botnet and Malware
- [Black Book of Viruses and Hacking](http://www.mediafire.com/download/c8ilcobmyiqooyp/Black+Book+of+Viruses+and+Hacking.zip)
- [Computer Hacking & Malware Attacks for Dummies](http://www.mediafire.com/download/8derf9dueyq64i5/Computer+Viruses%2C+Hacking+and+Malware+attacks+for+Dummies.zip)


----------

### Wireless Network Pentesting
- [802.11 Wireless Networks: The Definitive Guide, 2nd Edition](http://it-ebooks.info/book/269/)
- [Hacking Exposed Wireless, 2nd Edition](http://it-ebooks.info/book/1099/)
- [Kali Linux Wireless Penetration Testing](http://it-ebooks.info/book/5786/)
- [Mastering Kali Linux Wireless Pentesting](http://it-ebooks.info/book/1461060711/)
- [Mastering Wireless Penetration Testing for Highly Secured Environments](http://it-ebooks.info/book/4916/)


----------

### Misc
- [Beautiful Security](http://it-ebooks.info/book/208/)
- [Building Virtual Pentesting Labs for Advanced Penetration Testing](http://it-ebooks.info/book/5740/)
- [Computer Hacking - Cyber Laws Harvard](http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/ComputerHacking.pdf)
- [Computer Security - ESORICS 2013](http://it-ebooks.info/book/2734/)
- [Computer Security Handbook, 6th Edition](http://it-ebooks.info/book/3763/)
- [Cybersecurity for Executives](http://it-ebooks.info/book/3765/)
- [Data-Driven Security](http://it-ebooks.info/book/3762/)
- [Ethical Hacking Value and Penetration testing](http://www.certconf.org/presentations/2003/Wed/WM4.pdf)
- [Getting an Information Security Job For Dummies](http://it-ebooks.info/book/5756/)
- [Hacking Point of Sale](http://it-ebooks.info/book/3764/)
- [Hyper-V Security](http://it-ebooks.info/book/4847/)
- [Networking All-in-One For Dummies, 6th Edition](http://it-ebooks.info/book/6922/)
- [Protecting Yourself Online For Dummies](http://it-ebooks.info/book/5755/)
- [Secrets of Super and Professional Hackers](http://www.mediafire.com/download/2sspb36u5gymd23/Secrets+of+Super+and+Professional+Hackers.zip)
- [Security Intelligence](http://it-ebooks.info/book/5685/)
- [The Myths of Security](http://it-ebooks.info/book/165/)
- [Ultimate Guide to Social Enginnering attacks](http://uwcisa.uwaterloo.ca/Biblio2/Topic/ACC626%20Social%20Engineering%20A%20Cheung.pdf)

0 comments on commit 7a255fc

Please sign in to comment.