Everything related to hacking, opsec, and programming. Malware, phishing, DDoS, coding, research and news.
Rules:
• Be civil.
• No promotion for paid content or selling of guides.
• No looking for or advertising hacking services. For that please visit /d/Jobs4Crypto.
• Be nice to newbies, you used to be one of them.
All rules as well as the punishments are here.
/u/HeadJanitor Moderator
· 6 votes
· 1 year ago
· Link
Added on 2022-03-13
• DeTor -- Provably Avoiding Geographic Regions in Tor.pdf
• THE Unix COOK BOOK.pdf
• Gray Hat Hacking - The Ethical Hacker’s Handbook by Allen Harper, Daniel Regalado, Ryan Linn, Stephen • Sims, Branko Spasojevic, Linda Martinez, Michael Baucom, Chris Eagle, Shon Harris (z-lib.org).pdf
• Chainalysis-Crypto-Crime Report-2021.pdf
• Behavioral Profiling of Darknet Marketplace.pdf
• Towards Image-Based Dark Vendor Profiling.pdf
• A Qualitative Evaluation of Two Different Law Enforcement Approaches on Dark Net Markets.pdf
• On the Resilience of the Dark Net Market Ecosystem to Law Enforcement Intervention.pdf
• Collective Dynamics of Dark Web Marketplaces.pdf
• Securing the Tor Browser against De-anonymization Exploits.pdf
• Phishing With A Darknet - Imitation of Onion Services.pdf
• Security and Identification Indicators for Browsers against Spoofing and Phishing Attacks.pdf
• On the Resilience of the Dark Net Market Ecosystem to Law Enforcement Intervention by Chapters.pdf
• Cascade Ciphers The Importance of Being First.pdf
• Detecting and Preventing - Anonymous Proxy Usage
• Bad Exits in the Tor Network
• A Case Study of the Impact of Denial of Service Attacks in Cloud Applications
• Technical and Legal Overview of the Tor Anonymity Network
• Darkweb_cyber_threat_intelligence_mining_by_Robert_3428877_(z-lib.org).pdf
• Cyber-Security_And_Information_Warfare_by_Nicholas_5286233_(z-lib.org).pdf
• Circuit Fingerprinting Attacks - Passive Deanonymization of Tor Hidden Services
/u/AutoModerator M · 1 votes · 1 year ago · Link
[removed by moderators]
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
T.H.A.N.K. Y.O.U.
There will be so much more. Just name the topics.
/u/HeadJanitor Moderator
· 2 votes
· 1 year ago
· Link
Added on 2022-03-27
• Python Crash Course.pdf
• Effective Modern C++ 42 Specific Ways to Improve Your Use of C++11 and C++14.pdf
• Python Cookbook, 3rd Edition Recipes for Mastering Python 3.pdf
• LEARN C THE HARD WAY - Shaw.pdf
• Learn Python the Hard Way.pdf
• Python Crash Course A Hands-On, Project-Based Introduction to Programming.pdf
• Learn C the Hard Way Practical Exercises on the Computational Subjects You Keep Avoiding.pdf
• Learn to Program with C Learn to Program using the Popular C Programming Language.pdf
• Learn Python 3 the Hard Way A Very Simple Introduction to the Terrifyingly Beautiful World of Computers and Code.pdf
• Learn C the Hard Way.pdf
• C in a Nutshell The Definitive Reference.pdf
• Gray Hat Python Python Programming for Hackers and Reverse Engineers.pdf
/u/stellitaha · 2 votes · 1 year ago · Link
Thank you! My new library
/u/HeadJanitor Moderator
· 2 votes
· 1 year ago
· Link
Always welcome enjoy!
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
2020-03-26
Added:
• Beginning Ethical Hacking with Kali Linux Computational Techniques for Resolving Security Issues.pdf
• Tor Darknet Master the Art of Invisibility.pdf
• Advance Your Linux Skills Hacker’s Manual 2019.pdf
• Building Internet Firewalls.pdf
• Linux in Action.pdf
• Ellis,_Vacca_-_Firewalls_-_Jumpstart_for_Network_and_Systems_Administrators.pdf
• Linux Firewalls Attack Detection and Response with iptables, psad, and fwsnort.pdf
• Linux iptables Pocket Reference.pdf
• CCNP Security FIREWALL 642-618 Official Cert Guide.pdf
• The Art of Linux Kernel Design Illustrating the Operating System Design Principle and Implementation.pdf
• Linux Administration A Beginner’s Guide.pdf
• Internet Infrastructure Networking, Web Services, and Cloud Computing.pdf
• Hacking the art of exploitation.pdf
• Digital Forensics With Open Source Tools Using Open Source Platform Tools for Performing Computer Forensics on Target Systems Windows, MAC, Linux, Unix, Etc..pdf
• Linux System Programming.pdf
• Linux in a Nutshell 6th Edition.pdf.pdf
• Understanding the Linux Kernel, Third Edition.pdf
• Unit-I-II-IT-XII-CHSE-B.pdf
• The Practice of System and Network Administration Volume 1 DevOps and other Best Practices for Enterprise IT.pdf
• Python for Unix and Linux System - Welcome to LinuxTone.Org _.pdf
• bash Cookbook Solutions and Examples for bash Users.pdf
• Cisco CCNA in 60 Days.pdf
• Cisco ASA Firewall Fundamentals, 3rd Edition.pdf
• Cisco Firewalls.pdf
• Linux Command Line and Shell Scripting Bible, 3rd Edition.pdf
• Hacking-Firewalls And Networks How To Hack Into Remote Computers.pdf
• Linux Basics for Hackers Getting Started with Networking, Scripting, and Security in Kali.pdf
• Red Hat Linux Networking and System Administration.pdf
• Essential System Administration Tools and Techniques for Linux and Unix Administration, 3rd Edition.pdf
• UNIX and Linux System Administration Handbook.pdf
• What Data Do The Google Dialer and Messages Do.pdf
• How Linux Works What Every Superuser Should Know.pdf
• Linux Firewalls Enhancing Security with nftables and Beyond.pdf
• Linux Essentials for Cybersecurity.pdf
• Linux® BIBLE.pdf
• Linux Linux Command Line, Cover all essential Linux commands. A complete introduction to Linux Operating System, Linux Kernel, For Beginners, Learn Linux in easy steps, Fast! A Beginner's Guide.pdf
• Linux The Textbook.pdf
/u/AutoModerator M · 1 votes · 1 year ago · Link
[removed by moderators]
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
Uploaded on 2022-04-04
• Python Machine Learning A Step-by-Step Guide (2020)-40641.pdf
• Python WebApp Learn how to serve a Machine Learning Model (2020)-39924.pdf
• Tiny Python Projects-Manning Publications (2020)-40650.pdf
• Hackers Guide to Machine Learning with Python (2020)-40621.pdf
• Python for Linguists (2020)-39939.pdf
• Serverless Applications with Node.js JavaScript (2020)-40151.pdf
• JavaScript The Definitive Guide Master the Worlds Most-Used Programming Language (2020)-40147.pdf
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
Added on 2022-04-08
• Combating Cybercrime Toolkit.pdf
• Inside cyber warfare mapping the cyber underworld.pdf
• Security Monitoring.pdf
• Essential Cybersecurity Science.pdf
• Cyber Security Policy Guidebook.pdf
• Cyber Operations.pdf
• Handbook-ch-29-Jayakumar-Cyber-Attacks-by-Terrorists-and-other-Malevolent-Actors.pdf
• CYBER CRIME AND SECURITY.pdf
• Mining the Social Web Data Mining Facebook Twitter LinkedIn Instagram.pdf
• Computer Forensics and Cyber Crime An Introduction.pdf
• Cyber Denial, Deception and Counter Deception A Framework for Supporting Active Cyber Defense.pdf
• Weaving the Dark Web Legitimacy on Freenet, Tor, and I2P.pdf
• Cyber Criminology.pdf
• Cyber Security on Azure An IT Professional’s Guide to Microsoft Azure Security Center.pdf
• The dark web breakthroughs in research and practice.pdf
• Mastering Azure Analytics Architecting in the Cloud with Azure Data Lake, HDInsight, and Spark.pdf
• Post-Graduate Diploma in Cyber Security Cyber Attacks and Counter Measures.pdf
• Digital Forensics With Open Source Tools Using Open Source Platform Tools for Performing Computer Forensics on Target Systems Windows, MAC, Linux, Unix, Etc.pdf
• Data Analysis For Network Cyber-Security.pdf
• Computer Forensics Investigating Network Intrusions and Cyber Crime.pdf
• The Basics of Cyber Warfare Understanding the Fundamentals of Cyber Warfare in Theory and Practice.pdf
• hack-x-crypt a straight forward guide towards ethical hacking and cyber security.pdf
• Network Security Assessment, 2nd Edition.pdf
• Nmap 6 Network Exploration and Security Auditing Cookbook.pdf
• Pro Linux High Availability Clustering.pdf
• Visual Cryptography for Image Processing and Security.pdf
• Applied Cryptography 2nd Edition.pdf
• Router Security Strategies Securing IP Network Traffic Planes - Networking Book.pdf
• Cryptography And Network Security 5th Edition Book.pdf
• End to End Network Security.pdf
• Security and Privacy for Mobile Healthcare Networks.pdf
• Junos Security.pdf
• Understanding The Linux Kernel 3rd Edition.pdf
• Application Security for the Android Platform.pdf
• Arch Linux Environment Setup How-To.pdf
• Beginning Red Hat Linux 9.pdf
• Foundations Of Centos Linux.pdf
• Beginning the Linux Command Line, 2nd edition.pdf
• Cybersecurity Essentials.pdf
• National Security and Counterintelligence in the Era of Cyber Espionage.pdf
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
Uploaded on 2022-03-31
• Hacking Exposed Linux Security Secrets And Solutions, 3rd Edition.pdf
• Linux System Administration.pdf
• Opensuse Linux Unleashed.pdf
• Linux Firewalls.pdf
• The Linux Programming Interface.pdf
• Web PeNetration Testing With Kali Linux.pdf
• Linux System Programming 2nd Edition.pdf
• Managing Raid On Linux.pdf
• Beginning the Linux Command Line, 2nd edition.pdf
• Cisco Routers For The Desperate 2nd Edition Book.pdf
• Linux Kernel In A Nutshell.pdf
• Kali Linux Network Scanning Cookbook.pdf
• Linux System Administration Recipes.pdf
• DevOps Troubleshooting Linux Server Best Practices.pdf
• Instant Kali Linux - A Quick Guide To Learn The Most Widely Used Operating System By Network Security Professionals.pdf
• Red Hat Linux Networking and System Administration.pdf
• Linux Kernel Networking.pdf
• Beginning Linux Programming 4th Edition.pdf
• Linux Networking Clearly Explained.pdf
• Optimized C++.pdf
• Python Machine Learning A Step-by-Step Guide (2020)-40641.pdf
• Python WebApp Learn how to serve a Machine Learning Model (2020)-39924.pdf
• Tiny Python Projects-Manning Publications (2020)-40650.pdf
• Hackers Guide to Machine Learning with Python (2020)-40621.pdf
• Python for Linguists (2020)-39939.pdf
• SQL Server Concurrency Locking Blocking And Row Versioning.pdf
• Serverless Applications with Node.js JavaScript (2020)-40151.pdf
• JavaScript The Definitive Guide Master the Worlds Most-Used Programming Language (2020)-40147.pdf
• Running Linux 5th Edition.pdf
• Building Embedded Linux Systems 2nd Edition.pdf
• Linux Device Drivers 3rd Edition.pdf
• Linux Server Hacks - Free PDF Books.pdf
• Python One-Liners PDF.pdf
• iCloud_Private_Relay_Overview_Dec2021.PDF
• Hackers Guide to Machine Learning with Python (2020)-40621.pdf
• Python for Linguists (2020)-39939.pdf
• SQL Server Concurrency Locking Blocking And Row Versioning.pdf
• Serverless Applications with Node.js JavaScript (2020)-40151.pdf
• JavaScript The Definitive Guide Master the Worlds Most-Used Programming Language (2020)-40147.pdf
• Running Linux 5th Edition.pdf
• Building Embedded Linux Systems 2nd Edition.pdf
• Linux Device Drivers 3rd Edition.pdf
• Linux Server Hacks - Free PDF Books.pdf
• Hacking Exposed Linux Security Secrets And Solutions, 3rd Edition.pdf
• Reliably Erasing Data From Flash-Based Solid State Drives.pdf
• SSD Forensics 2014.pdf
• DFINewsRecoveringEvidencefromSSDDrivesUnderstandingTRIMGarbageCollectionandExclusions2014-10-15.pdf
• Analyzing the Trimming Activity of Solid-State.pdf
• Understanding the must-haves of data and cyber resilience Storage edition.pdf
• Java in a Nutshell - A Desktop Quick Reference.pdf
• JavaScript - The Definitive Guide.pdf
• Linux System Programming.pdf
• MYSQL in a Nutshell (In a Nutshell (O'Reilly).pdf
• Python Pocket Reference, 5th Edition Python in Your Pocket.pdf
• The Python Book The ultimate guide to coding with Python.pdf
• Linux Device Drivers, 3rd Edition.pdf
• Deep Learning with Python.pdf
• Computer Security Handbook, 6th Edition.pdf
• Classic Shell Scripting.pdf
• O'Reilly Learning Ruby.pdf
• HTML5 Cookbook (O'Reilly Cookbooks).pdf
• LPI Linux Certification in a Nutshell.pdf
• Building Embedded Linux Systems.pdf
• O'Reilly Linux Kernel in a Nutshell.pdf
• Cisco IOS Cookbook, 2nd Edition (Cookbooks (O'Reilly).pdf
• Linux in a Nutshell 6th Edition.pdf
• O'Reilly - Python Cookbook.pdf
• Understanding the Linux Kernel, Third Edition.pdf
• sb22_use_of_mobile_phones_to_buy_and_sell_illicit_drugs.pdf
• Syngress.The.Basics.Of.Digital.Forensics.Mar.2012.ISBN.1597496618.pdf
• Wiley.Memory.Jul.2014.ISBN.1118825098.pdf
• Prentice.Hall.Network.Forensics.Jun.2012.ISBN.0132564718.pdf
• Sybex.Mastering.Windows.Network.Forensics.And.Investigation.2nd.Edition.Jun.2012.ISBN.1118163826.pdf
• McGraw.Hill.Hacking.Exposed.Network.Security.Secrets.And.Solutions.2nd.Edition.Oct.2000.ISBN.0072127481.pdf
• Ethical Hacking.pdf
• McGraw.Hill.Gray.Hat.Hacking.4th.Edition.Jan.2015.ISBN.0071832386.pdf
• McGraw.Hill.Hacking.Exposed.Linux.3rd.Edition.Jul.2008.ISBN.0072262575.pdf
• Defeating_Encryption.pdf
• DES.pdf
• Detecting and Defeating Government_Interception Attacks Against SSL.pdf
• DETECTING HIDDEN MESSAGES USING HIGHER-ORDER STATISTICAL MODELS.pdf
• Detecting Hidden Messages Using Higher-Order_Statistics and Support Vector Machines.pdf
• Detecting Steganographic Content on the Internet.pdf
• FUNDAMENTALS OF_CRYPTOLOGY.pdf
• How to Break MD5 and Other Hash Functions.pdf
• Improved Collision Attack on Hash Function MD5.pdf
• Improved Collision Attack on MD5.pdf
• Information Hiding—A Survey.pdf
• IntroToCrypto.pdf
• Malicious Cryptography Techniques for Unreversable.pdf
• Malicious Cryptology and Mathematics 29700.pdf
• MD5.pdf
• MONOALPHABETIC UNILATERAL SUBSTITUTION.pdf
• On The Limits of Steganography.pdf
• Pen_Testing_and_Ethical_Hacking_Study_Guide.pdf
• PublicandPrivateKeyCryptographyWhitePaper-Dec2014.pdf
• Securing_Enterprise_Web_Applications_at_the_Source.pdf
• Serpent_ A Proposal for the_Advanced Encryption Standard.pdf
• steganography seeing the unseen by neil f. johnson.pdf
• Syndrome Decoding in the Non-Standard Cases.pdf
• Weakness in the key scheduling algorithm of RC4.pdf
• westfeld-pfitzmann-ihw99.pdf
• Wiley.Malicious.Cryptography.Exposing.Cryptovirology.Feb.2004.ISBN.0764549758.pdf
• A cryptographic file system for unix.pdf
• ADVANCED ENCRYPTION STANDARD.pdf
• Attacking NTLM with Precomputed_Hashtables.pdf
• Cryptanalysis_of Hash Functions_of the MD4-Family.pdf
• Cryptography.pdf
• D1T2 - Skyper - Cracking the GSM A5_1 Encryption in Seconds.pdf
• Apress.Healthcare.Jun.2014.ISBN.1430266767.pdf
• McGraw.Hill.Principles.Of.Computer.Security.CompTIA.Security.Plus.And.Beyond.Lab.Manual.2nd.Edition.Dec.2010.ISBN.0071748563.pdf
• Syngress.The.Basics.Of.Digital.Privacy.May.2013.ISBN.0128000112.pdf
• Addison.Wesley.The.Technical.And.Social.History.Of.Software.Engineering.Dec.2013.ISBN.0321903420.pdf
• Packt.Metasploit.Jun.2012.ISBN.1849517428.pdf
• Aditya Balapure-Learning Metasploit Exploitation and Development-Packt Publishing (2013).pdf
• Monika Agarwal, Abhinav Singh-Metasploit Penetration Testing Cookbook, Second Edition-Packt Publishing (2013).pdf
• No.Starch.Meta.Jun.2011.ISBN.159327288X.pdf
• Packt.Mastering.Metasploit.May.2014.ISBN.1782162224.pdf
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
Uploaded on 2022-05-06 (Mostly) On Monero
• Red Hat Enterprise Linux 7 Networking Guide.pdf
• R. Achary - Cryptography and Networking Security_ An Introductio-Mercury Learning & Information (2021).pdf
• Linux Network Administrator's Guide, 3rd Edition.pdf
• Linux Network Administrators Guide.pdf
• Distinguisher and Related-Key Attack on the Full AES-256.pdf
• TOR Beginners to Expert Guide .pdf
• Monitoring the Dark Web and Securing Onion Services.pdf
• Will this onion make you cry.pdf
• The Sniper Attack.pdf
• How much is the fork - Fast Probability and Profitability Calculation during Temporary Forks.pdf
• One-out-of-Many Proofs - Or How to Leak a Secret and Spend a Coin.pdf
• Snow White - Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of Stake.pdf
• A Deep Learning-Based Action Recommendation Model for Cryptocurrency Profit Maximization.pdf
• A Secure and Efficient Conditional Anonymous Scheme for Permissionless Blockchains.pdf
• Accountable Monero System with Privacy Protection.pdf
• Quisquis - A New Design for Anonymous Cryptocurrencies.pdf
• Fully Auditable Privacy-preserving Cryptocurrency Against Malicious Auditors.pdf
• CRYPTOCURRENCY - A TOOL AND TARGET FOR CYBERCRIME.pdf
• Evaluating Criminal Transactional Methods in Cyberspace as Understood in an International Context.pdf
• VIRTUAL CURRENCIES December 2021 - Additional Information Could Improve Federal Agency Efforts to Counter Human and Drug Trafficking.pdf
• Exploring the use of Zcash cryptocurrency for illicit or criminal purposes.pdf
• Anonymity, Cybercrime, and the Connection to Cryptocurrency.pdf
• A Basic Manual on the Detection And Investigation of the Laundering of Crime Proceeds Using Virtual Currencies.pdf
• On The Unforkability of Monero.pdf
• Bifurcated Signatures - Folding the Accountability vs. Anonymity Dilemma into a Single Private Signing Scheme.pdf
• Cryptocurrency Crime and Anti-Money Laundering Report, February 2021.pdf
• Cryptocurrencies and future financial crime.pdf
• Privacy preservation in permissionless blockchain - A survey.pdf
• An Empirical Analysis of Traceability in the Monero Blockchain.pdf
• Atomic Swaps between Bitcoin and Monero.pdf
• Bitcoin–Monero Cross-chain Atomic Swap.pdf
• Low-cost transaction flooding attack with Monero’s bulletproof protocol.pdf
• A Proof of Reserves Protocol for Monero Exchanges.pdf
• Payment Channels For Monero.pdf
• An Empirical Analysis of Monero Cross-Chain Traceability.pdf
• MONERO - Privacy in the blockchain.pdf
• A Traceability Analysis of Monero’s Blockchain.pdf
• RingCT 2.0 - A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero.pdf
• RING CONFIDENTIAL TRANSACTIONS.pdf
• On Elapsed Time Consensus Protocols.pdf
• Post-Quantum Succinct Arguments - Breaking the Quantum Rewwinding Barrier.pdf
• Oracles from the Ground Truth to Market Manipulation.pdf
• Red Belly - A Secure, Fair and Scalable Open Blockchain.pdf
• Flood & Loot - A Systemic Attack On The Lightning Network.pdf
• Can a Public Blockchain Keep a Secret.pdf
• An Empirical Analysis of Privacy in the Lightning Network.pdf
• About Blockchain Interoperability.pdf
• Aggregatable Subvector Commitments for Stateless Cryptocurrencies.pdf
• High-Frequency Trading on Decentralizd On-Chain Exchanges.pdf
• SoK - Layer-Two Blockchain Protocols.pdf
• A Survey on Blockchain Interoperability - Past, Present, and Future Trends.pdf
• Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability.pdf
• Towards scaling blockchain systems via sharding.pdf
• A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts.pdf
• Security and Privacy on Blockchain.pdf
• Vulnerability of blockchain technologies to quantum attacks.pdf
• Mastering Monero First Edition by SerHack and Monero Community.pdf
• RBP_a website fingerprinting obfuscation method against intelligent fingerprinting attacks.pdf
• Ubuntu Powerful Hacks and Customizations.pdf
• (Computer Communications and Networks) Reinhard Gotzhein - Real-time Communication Protocols for Multi-hop Ad-hoc Networks_ Wireless Networking in Production and Control Systems-Springer International.pdf
• Fedora-11-Security_Guide-en-US.pdf
• CTR_NSA_NETWORK_INFRASTRUCTURE_SECURITY_GUIDANCE_20220301.PDF
/u/DarkFoxlin · 4 votes · 1 year ago · Link
Yet another comment saying it, thank you! Great list
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
Always appreciated. Believe me sometimes the other person doesn't know if it's worth it unless someone else chimes in and says it is. So, thank you.
/u/beneathwit_me7 · 3 votes · 1 year ago · Link
Serriously google drive? I'm not being mean by the way.
/u/HeadJanitor Moderator
· 2 votes
· 1 year ago
· Link
The positive is that google checks for viruses. Also this is like 1 TB.
/u/beneathwit_me7 · 3 votes · 1 year ago · Link
Good point, I do like that feature. I'm just a bit skeptical of google, like most people on dread.
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
I spent 99% of the time think WTH can I upload these and 1% uploading them. Google scans everything, even copyrighted material and these are all authentic versions.
Detailed mode helps see the titles in case something benefits someone.
/u/beneathwit_me7 · 1 votes · 1 year ago · Link
I just looked through what you've got. You have a ton of good stuff!
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
There's another 150 but I want to keep it in the 2019-2021 range.
/u/beneathwit_me7 · 1 votes · 1 year ago · Link
I respect that, you want to keep the info current.
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
Just added 17 more. One of these might help someone. Most are textbooks.
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
This is what it should look like
https://i.ibb.co/ZH7v1DR/snap0000913.png
/u/beneathwit_me7 · 1 votes · 1 year ago · Link
I still remember the first hacking book I ever bought. It was a really old one. Does anyone remember "Hacking the art of exploitation"?
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
Fond memories. No, title sounds familiar. But I'm glad you do.
/u/martinatchet · 1 votes · 1 year ago · Link
you mostly gotta watch out for docs linking to driveby downloads, I've rarely seen malicious binaries stored (compiled as binaries at least) on google drive for deployment. Usually it's just like obfuscated code or assets that get grabbed by a RAT or something later without the user's knowledge.
That said, props for thinking twice before clicking mate.
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
Enjoy. Yeah, the good thing about google is it has a strong scanner. Won't allow binaries, executable. It's going to scan these books too because some will be copyright.
/u/martinatchet · 1 votes · 1 year ago · Link
Thanks! I'm sure I have dumps of a similar nature (mostly netsec/cryptography research papers) sitting on disks around here somewhere that I snagged to be able to mirror later, as well as all the crap I download via legit means (e.g. JSTOR). If people have a more narrow topic they're interested in I might be able to provide some supplementary intermediate or advanced material on it, depending on what it is.
But this is quite the haul to go through already :D
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
Just wish there was better hosting. I tried Shred here ... and it couldn't do the job. These amount to a lot of data. I like that the title is visible.
/u/martinatchet · 1 votes · 1 year ago · Link
Yeah, hosting dumps this big on TOR is pretty infeasible. Haven't really seen a better way to distribute them other than just playing whack-a-mole with clearnet hosts and rehosting whenever something goes down. I've done smaller-group-shares over TOR temporarily with onionshare for interested people, but unfortunately I don't know a good public solution.
/u/AlphaZero · 2 votes · 1 year ago · Link
Holy fuck, thank you! I didn't see this when I PM'ed you by the way either, this world is very strange.
Regarding downloading titles, what do you recommend? Is this something that I do not want to touch while logged into a legacy gmail account attached to my name in the past? (I haven't fucked with it yet and rarely use Drive, but I'm assuming one must also be logged into a gmail account to download anything)
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
You don't have to log into gmail. You simply download the PDF. No logging in. These are all research material. Dense reading.
/u/AlphaZero · 2 votes · 1 year ago · Link
thank you, I'm stoked to get home to a secure computer and get going.
and /u/martinatchet, fuckin' right doggie
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
Today, you're going to have a winning streak all day, everything you touch.
/u/martinatchet · 1 votes · 1 year ago · Link
Luckily that shit's my jam (and also generally harder to find so kudos)
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
The assortment is vast. There is one book that is a massive compilation of scholarly articles on the dark net ... then there are books on specific topics like cryptography.
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
This is a good one in volume, broken by chapter
drugs_and_the_darknet_-_td0417834enn.pdf
/u/389983 · 2 votes · 1 year ago · Link
THANK U !
U r the master of sharing knowledge.
/u/HeadJanitor Moderator
· 2 votes
· 1 year ago
· Link
You guys are too nice. I just woke up and it crossed my mind I ought to share these with the crew. Enjoy.
/u/footsteps · 2 votes · 1 year ago · Link
quite a few - 76?
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
I have way more but I wanted to keep it current and not get too out-dated. If you want I can put the older material too.
/u/9nyx · 2 votes · 1 year ago · Link
This is amazing, thank you. Will share my collection after sorting - unfortunately it's mostly older content.
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
Enjoy! It'll still be great to sift through to see how far we've come.
/u/adfweasdcfg · 2 votes · 1 year ago · Link
This is gold. thank you.
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
You're welcome. Enjoy!
/u/a9jh4hg98 · 2 votes · 1 year ago · Link
Incredible! Ty HJ
/u/HeadJanitor Moderator
· 2 votes
· 1 year ago
· Link
You're welcome -- I'll be adding a ton more, it looks like. Thank you.
/u/CypherTheThird · 2 votes · 1 year ago · Link
Amazing dude ,thank you!
/u/HeadJanitor Moderator
· 2 votes
· 1 year ago
· Link
Glad to share. I'll be adding more this weekend. Enjoy.
/u/xcist · 2 votes · 1 year ago · Link
Thanks!.
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
Thank you, enjoy!
/u/HeadJanitor Moderator
· 2 votes
· 1 year ago
· Link
User requested:
1) The.Web.Application.Hackers.Handbook.Oct.2007.pdf
2) Dafydd Stuttard, Marcus Pinto - The web application hacker's handbook_ finding and exploiting security flaws-Wiley (2011).pdf
2022-03-25
/u/banman · 2 votes · 1 year ago · Link
I don't know if you got this or not but, THANK YOU!
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
You are welcome. Enjoy! Thank you.
/u/disregardeverythingisay · 2 votes · 1 year ago · Link
One more comment thanking - awesome list!
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
THANK YOU
/u/NoDogm · 2 votes · 1 year ago · Link
Thank you very much !
Very great gift.
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
Super welcome -- just added more.
/u/din3djarin · 2 votes · 1 year ago · Link
Thanks to Z-library !
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
Always welcome!
/u/yogobro298 · 2 votes · 1 year ago · Link
If a massive collection existed like this four leaked IT/Hacking courses(CEH,OSCP), then it would be perfect. Either way I gratefully appreciate the information you have bestowed upon us.
/u/HeadJanitor Moderator
· 2 votes
· 1 year ago
· Link
Thank you. If I see any I'll be sure to upload them. Enjoy!
/u/KyleKlemons54 · 2 votes · 1 year ago · Link
Might have to save this to my "bookmarks" - looks like you have some good stuff man. Keep up the good work on informing people (I will download one or maybe two sometime later).
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
Enjoy, enjoy. Hopefully there's something you'll need.
/u/Init33 · 2 votes · 1 year ago · Link
That was kind of you. Ty
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
Thank YOU /u/Init33. I really do appreciate it. Enjoy.
/u/ElmoFTW34 · 2 votes · 1 year ago · Link
have u really read all of these books /u/HeadJanitor? 0_o
If you have, I need to get like you lol
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
/u/ElmoFTW34, I wish--a big dream of a wish--to make the time to be able to delve into these. Enjoy for me.
/u/around911 · 2 votes · 1 year ago · Link
Thanks!!! You're the best !!!
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
You are welcome. I'll get to your msg tonight. There's a lot that's not listed. Enjoy!
/u/around911 · 1 votes · 1 year ago · Link
Yes i answered you !
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
Appreciate it with very much. Let me know if there's anything you need.
/u/maricos22 · 2 votes · 1 year ago · Link
Great resources, Thanks for sharing and organizing everything in 1 place
Did you read all of this ? if so how long it took u otherwise just % of what you read and how much time u spent on ?
i feel like this is more than 2 academic years if you took every page seriously
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
Thank you /u/maricos22
Not even one book :(
I think it would take me 5+ years min
/u/CannaKing · 2 votes · 1 year ago · Link
Holy shit, these are some good reads u/HeadJanitor thanks. I have a ton of technical reads that aren't listed if you are interested in them as well.
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
Enjoy, enjoy & enjoy. May they serve you well! Thank you.
/u/HeadJanitor Moderator
· 2 votes
· 1 year ago
· Link
Uploaded on 2022-06-01
• The dark web breakthroughs in research and practice.pdf
• The Darkest Web Drugs, death and destroyed lives ... the inside story of the internet’s evil twin.pdf
• The Invisible Internet Project.pdf
• The Network Security Test Lab - A Step-by-Step Guide.pdf
• Tor and the Dark Art of Anonymity (deep web, kali linux, hacking, bitcoins) Defeat NSA Spying.pdf
• Trawling for Tor Hidden Services - Detection, Measurement, Deanonymization.pdf.lnk
• Unintended-impacts-of-alcohol-restrictions-on-alcohol-a_2017_International-J.pdf
• Voice_Disguise_and_Automatic_Detection_Review_and_.pdf
• Weaving the Dark Web Legitimacy on Freenet Tor and I2P.pdf
• A Distributed Decentralised Information Storage and Retreival System.pdf
• A Practical Guide to Advanced Networking.pdf
• American Kingpin The Epic Hunt for the Criminal Mastermind Behind the Silk Road.pdf
• An Advanced Introduction to GnuPG.pdf
• D2T2-Filippo-Valsorda-and-George-Tankersly-Non-Hidden-Hidden-Services-Considered-Harmful.pdf
• Delivery-dilemmas--How-drug-cryptomarket-users-identif_2017_International-Jo.pdf
• Ethical Hacking.pdf
• Freenet - A Distributed Anonymous Information Storage and Retrieval System.pdf
• From “Onion Not Found” to Guard Discovery.pdf
• Hackers Heroes of the Computer Revolution - 25th Anniversary Edition by Steven Levy.pdf
• Hacking Computer Hacking Security Testing Penetration Testing And Basic Security.pdf
• I2P - The Invisible Internet Project.pdf
• Infinity Ethical Hacking Learn Basic To Advance Hacks.pdf
• Invisible Internet Project (I2P).pdf
• Kali Linux Social Engineering.pdf
• McGraw.Hill.Gray.Hat.Hacking.4th.Edition.Jan.2015.ISBN.0071832386.pdf
• McGraw.Hill.Hacking.Exposed.Linux.3rd.Edition.Jul.2008.ISBN.0072262575.pdf
• McGraw.Hill.Hacking.Exposed.Network.Security.Secrets.And.Solutions.2nd.Edition.Oct.2000.ISBN.0072127481.pdf
• Phishing detection on Tor hidden services.pdf
• Silk Road by Eileen Ormsby.pdf
• Silk_Road_Ormsby.epub
• So, you want to be a darknet drug lord - Walter White.txt
• Solid State Forensics.pdf
• Tails & Tor.pdf
• The Art of Memory Forensics - Detecting Malware and Threats in Windows, Linux, and Mac Memory.pdf
/u/soairse · 2 votes · 1 month ago · Link
Any recommendations for a noob to learn the basics? Thanks for this btw
/u/zehoneybadger · 1 votes · 1 year ago · Link
Thanks for sharing!
/u/HeadJanitor Moderator
· 2 votes
· 1 year ago
· Link
Glad to. I'll add some more in this soon enough, as well. Enjoy.
/u/vicente · 1 votes · 1 year ago · Link
i cant download . . .
why ?
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
Right-click and click 'download'.
Or, hit Control + A and Right-click and click 'download'.
/u/vicente · 1 votes · 1 year ago · Link
can't do nothing except "login" . . .
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
No, don't login. Open a private window. In the top-right corner you should see "Download All". Which browser are you using?
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
Uploaded on 2022-04-11
• Cisco - End to End Network Security.pdf
• Advances in Security of Information and Communication Networks - Networking Book.pdf
• Security and Privacy for Mobile Healthcare Networks.pdf
• Network Security Assessment, 2nd Edition.pdf
• The Fundamentals of Network Security.pdf
• Network Security Hacks - Tips And Tools For Protecting Your Privacy, 2nd Edition.pdf
• Python Hacking Essentials.pdf
• LTE Security Book.pdf
• Distributed Networks- Intelligence, Security and Applications.pdf
• Software Networks - Virtualization SDN 5G Security.pdf
• Cyber Operations - Building, Defending and Attacking Computer Networks.pdf
• CCNA Security Portable Command Guide.pdf
• Information Security The Complete Reference 2nd Edition.pdf
• Web Database Applications With PHP And MySQL.pdf
• How Linux Works 2nd Edition.pdf
• LPI Linux Certification In A Nutshell 3rd Edition.pdf
• Web Scraping with Python.pdf
• JavaScript Succinctly.pdf
• Mining The Social Web.pdf
• Linux Firewalls.pdf
• Building a Windows IT Infrastructure in the Cloud.pdf
• High Performance Python.pdf
• Python Programming for Hackers and Pentesters (2021)-40042.pdf
• Junos Security.pdf
• Understanding Network Hacks Attack and Defense with Python 3 (2021)-40047.pdf
• Python True Book (2021)-40044.pdf
• Hacking The Art Of Exploitation 2nd Edition.pdf
• Penetration Testing - A Hands On Introduction To Hacking.pdf
• Network Security with OpenSSL.pdf
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
(Mostly Juniper)
Uploaded 2022-05-09
• GNS3 Network Simulation Guide.pdf
• The Book of GNS3 Build Virtual Network Labs Using Cisco, Juniper, and More.pdf
• Wireshark for Security Professionals Using Wireshark and the Metasploit Framework.pdf
• Juniper - Network Address Translation.pdf
• Juniper Secure Analytics - Troubleshooting Guide.pdf
• Juniper QFX10000 Series A Comprehensive Guide to Building Next-Generation Data Centers.pdf
• Juniper MX Series A Comprehensive Guide to Trio Technologies on the MX.pdf
• PassLeader-Juniper-JNCIA-Junos-JN0-102-Exam-Dumps-Braindumps-PDF-VCE.pdf
• Guide to Cisco Routers Configuration Becoming a Router Geek.pdf
/u/Moxix · 1 votes · 1 year ago · Link
[removed]
/u/AutoModerator M · 1 votes · 1 year ago · Link
It looks like you're an illiterate bitch.
Make sure to read the rules bruv.
This comment was posted automatically by a bot. All AutoModerator settings are configured by individual communities. Contact this community's Moderators to have your post approved if you believe this was in error.
/u/Tikashia · 1 votes · 1 year ago · Link
[removed]
/u/AutoModerator M · 1 votes · 1 year ago · Link
All links require moderator approval.
This comment was posted automatically by a bot. All AutoModerator settings are configured by individual communities. Contact this community's Moderators to have your post approved if you believe this was in error.
/u/ksrmsrx · 1 votes · 1 year ago · Link
Anyone got magnet?
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
You can download them as one big 6GB pile or go by sections. There should be 1,100 file approximately. Go through the names, some you might not like want, some might suit you.
/u/lurgz88 · 1 votes · 1 year ago · Link
Thankyou! You're a legend!
Is there anyway in saving the entire folder instead of one by one?
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
Absolutely, I think it gives you an option to download the whole thing once highlighted. Worst case scenario, do it in increments. Enjoy!
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
Uploaded on 2022-04-12
• Hacking The Future - Privacy, Identity, And Anonymity On The Web.pdf
• Information Security Management Handbook, Fifth Edition.pdf
• A Comprehensive Guide to Network Security.pdf
• Buffer Overflow (Root on server II).pdf
• Bulletproof Wireless Security - GSM, UMTS, 802.11, and Ad Hoc Security (Communications Engineering).pdf
• CCNA Security 640-553 Official Certification Guide.pdf
• CEH v5 Module 17 Physical Security.pdf
• CEHv6 Module 21 Physical Security.pdf
• CEHv6 Module 49 Creating Security Policies.pdf
• CEHv6 Module 66 Security Convergence.pdf
• CISSP - Certified Information Systems Security Professional Study Guide, Third Edition.pdf
• CISSP-Certified-Information-Systems-Security-Professional-Study-Guide.9780470276884.33762.pdf
• Computer, Network & Internet Security.pdf
• Computer.and.Information.Security.Handbook. [Morgan.Kaufmann-2009].pdf
• Detection of Injected, Dynamically Generated, and Obfuscated Malicious Code.pdf
• Firewalls and Internet Security, Second Edition.pdf
• The Complete Cyber Security Course, Hacking Exposed.pdf
/u/ZBM-2 · 2 votes · 1 year ago · Link
Let me start by saying, I super appreciate the resources you have provided, I also read the newbie link as well. I absolutely intend to fully utilize all resources you all have provided to further my knowledge and put the effort in.
The main reason for this comment is that you all have provided an overwhelming amount of knowledge for me to start going through and I'm not sure where to start.
For all intents and purposes, especially compared to most of you on here, let's just assume I know nothing and want to know the best starting point/recommended book. I'm not afraid to reread things I already "know" and make sure I learn this right.
Again, thank you so much for the time and effort you all put into accumulating resources and knowledge for idiots like me and I greatly appreciate any helpful responses I get!
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
Thank you so very, very much, /u/ZMB-2
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
Uploaded on 2022-04-20
• Scale Inside-Out Rapid Mitigation of Cloud DDoS Attacks.pdf
• DDoS Quick Guide.pdf
• CCNA 200-301 Official Cert Guide, Volume 1.pdf
• Forensic Aspects of Various Flash Memory Devices.pdf
• Tor_HiddenService.pdf
• ZMap - Fast Internet-Wide Scanning and its Security Applications.pdf
• Cyber Operations Building, Defending, and Attacking Modern Computer Network.pdf
• Hands-On Enterprise Automation with Python Automate common administrative and security tasks with Python.pdf
• The Illustrated Network How TCP_IP Works in a Modern Network.pdf
• Network Programmability and Automation.pdf
• 31 Days Before your CCNA.pdf
• CCNA 200-301 Official Cert Guide [Pdf][Vol.1-Sep2019].pdf
• CEH v10 EC-Council Certified Ethical Hacker Complete Training Guide with Practice Labs.pdf
• Cisco CCNA in 60 Days.pdf
• Beginning Ethical Hacking with Kali Linux Computational Techniques for Resolving Security Issues.pdf
• Official Google Cloud Certified Associate Cloud Engineer Study Guide.pdf
• CCNA Routing and Switching Complete Study Guide Exam 100-105, Exam 200-105, Exam 200-125.pdf
• The Hitchhiker’s Guide to Online Anonymity.pdf
• AWS Best Practices for DDoS.pdf
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
Uploaded on 2022-04-21
• Eldad_Eilam-Reversing__Secrets_of_Reverse_Engineering-Wiley(2005).pdf
• Cloud and Fog Computing in 5G Mobile Networks Emerging Advances and Applications.pdf
• An Introduction to Cryptography, Second Edition.pdf
• Hands-On Cryptography with Python Leverage the Power of Python to Encrypt and Decrypt Data.pdf
• CompTIA Linux+ Powered by Linux Professional Institute Study Guide Exam LX0-103 and Exam LX0-104 (Comptia Linux + Study Guide).pdf
• 5G System Design Architectural and Functional Considerations and Long Term Research.pdf
• CompTIA Cybersecurity Analyst (CSA+) Study Guide Exam CS0-001.pdf
• Cryptography And Network Security - Second Edition.pdf
• Rootkits and Bootkits Reversing Modern Malware and Next Generation Threats.pdf
• Everyday Cryptography Fundamental Principles and Applications.pdf
• Understanding Cryptography.pdf
• Serious Cryptography A Practical Introduction to Modern Encryption.pdf
• Comptia Pentest+ Study Guide Exam Pt0-001.pdf
• Pentesting Azure Applications The Definitive Guide to Testing and Securing Deployments.pdf
• Web Application Hacking Advanced SQL Injection and Data Store Attacks.pdf
• RFIDiggity - Pentester Guide to Hacking HF_NFC and UHF RFID.pdf
• Cybersecurity and the Internet of Things.pdf
• Mastering Windows Server 2016 Hyber V - John Savill.pdf
/u/fairyflights · 1 votes · 11 months ago · Link
Everything I could ever want to know or use. I can not even begin to thank you for this! I wish you all the best in future endeavors
/u/HeadJanitor Moderator
· 1 votes
· 11 months ago
· Link
Same to you. So happy you found what you needed. Beautiful the way things work out.
/u/vfxgfx · 1 votes · 11 months ago · Link
hey im a newbie what do u recommend to read at the start
/u/HeadJanitor Moderator
· 1 votes
· 11 months ago
· Link
UNIX and Linux System Administration Handbook, 5th Edition
Crush it!
/u/defcon-kernel · 1 votes · 11 months ago · Link
THANK YOU SO MUCH SIR, THIS IS THE ALEXANDRIA BOOKSTORE, YOU DESERVE THE HEAVEN, GREAT INFO!!!
/u/HeadJanitor Moderator
· 1 votes
· 11 months ago
· Link
You are so very welcome. May it serve you well.
/u/DarkBet · 1 votes · 10 months ago · Link
This is great. I've been just getting interested in hacking in the more traditional sense. Not necessarily anything black-hat oriented. This will be great to look over theres some interesting looking titles in here. Thanks for sharing this.
/u/HeadJanitor Moderator
· 1 votes
· 10 months ago
· Link
You are more than welcome. May it serve you well and take you to great places. Thank you.
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
Uploaded on 2022--05-11
• The NICE Cyber Security Framework Cyber Security Intelligence and Analytics.pdf
• Python for Data Analysis Data Wrangling with Pandas, NumPy, and IPython.pdf
• Cryptography and Network Security - Master of Science in Information Technology.pdf
• Dependency Injection Principles, Practices, and Patterns.pdf
• Beginning Serverless Computing Developing with Amazon Web Services, Microsoft Azure, and Google Cloud.pdf
• Cracking Codes with Python An Introduction to Building and Breaking Ciphers.pdf
• Operating System Concepts and Basic Linux Commands.pdf
• Introduction to Cryptography Principles and Applications, 2nd Edition (Information Security and Cryptography).pdf
• MATLAB Deep Learning With Machine Learning, Neural Networks and Artificial Intelligence.pdf
• Hacklog Volume 1 Anonymity IT Security & Ethical Hacking Handbook.pdf
• Linux® Command Line and Shell Scripting Bible.pdf
• Applied Cryptography for Cyber Security and Defense. Information Encryption and Cyphering.pdf
• Computer Forensics Investigating Network Intrusions and Cyber Crime.pdf
• Professional Red Teaming Conducting Successful Cybersecurity Engagements.pdf
• Cyber Security Analytics, Technology and Automation.pdf
• Cyber-security Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare.pdf
• Linux Linux Command Line, Cover all essential Linux commands.pdf
• Comptia Pentest+ Study Guide Exam Pt0-001.pdf
• Cybersecurity Essentials.pdf
• Real-World Bug Hunting A Field Guide to Web Hacking Real-World Bug Hunting A Field Guide to Web Hacking.pdf
• Rtfm Red Team Field Manual.pdf
• CompTIA Cybersecurity Analyst (CSA+) Study Guide Exam CS0-001.pdf
• Linux Essentials for Cybersecurity.pdf
• Mike Meyers’ CompTIA security+ certification guide, (exam SY0-501).pdf
• The Hacker Playbook 3 Practical Guide To Penetration Testing.pdf
• Advanced Penetration Testing. Hacking the World’s Most Secure Networks.pdf
• CISSP All in one Exam Guide - Eigth Edition.pdf
• CISSP Cert Guide - Third Edition.pdf
• CISSP Official Practice Tests.pdf
• Industrial Espionage and Technical Surveillance Counter Measurers.pdf
• The Constitutional Infirmity of Warrantless NSA Surveillance.pdf
• Cyberspies The Secret History of Surveillance, Hacking, and Digital Espionage.pdf
• Drones and Unmanned Aerial Systems Legal and Social Implications for Security and Surveillance.pdf
• Edward Snowden - Taking a Stand for American Liberty.pdf
• The Age of Surveillance Capitalism The Fight for a Human Future at the New Frontier of Power.pdf
• Code Warriors, NSA's Codebreakers and the Secret Intelligence War Against the Soviet Union.pdf
• Permanent Record By Edward Snowden.pdf
• Resisting NSA Surveillance - Glenn Greenwald and the public sphere debate about privacy.pdf
• Introduction to Intelligent Surveillance Surveillance Data Capture, Transmission, and Analytics.pdf
• Tor and The Dark Net Remain Anonymous and Evade NSA Spying.pdf
• No Place to Hide Edward Snowden, the NSA, and the U.S. Surveillance State.pdf
• Mastering Splunk Optimize your machine-generated data effectively by developing advanced analytics with Splunk.pdf
• PhD THESIS - OPEN SOURCE INTELLIGENCE - A CONTEMPORARY INTELLIGENCE LIFELINE.pdf
• Techniques and tools for OSINT-based threat analysis.pdf
• Defining Second Generation Open Source Intelligence (OSINT) for the Defense Enterprise.pdf
• Splunk, OSINT And VisualizaIon Catching Bad Guys With Pictures.pdf
• DARKNET, ANONYMITY & LAW.pdf
• Monitoring darknets for detecting malicious activities.pdf
• Learning Darknet Markets.pdf
• The Dangers Of Using Tor On The Darknet And How To Fix It.pdf
• Pharmaceutical Crime on the Darknet.pdf
• BLACK-HAT HACKERS’ CRISIS INFORMATION PROCESSING IN THE DARKNET - A CASE STUDY OF CYBER UNDERGROUND MARKET SHUTDOWNS.pdf
• Dealing with Dead Ends - Efficient Routing in Darknets.pdf
• DRUGS AND THE DARKNET - CHALLENGES AND OPPORTUNITIES.pdf
• A geographical analysis of trafficking on a popular darknet market.pdf
• Complex Network Analysis of Darknet Black Market Forum Structure.pdf
• Data Mining in the Dark - Darknet Intelligence Automation.pdf
• Tracking Darknet.pdf
• Understanding the Topological Structure and Semantic Content of Darknet Communities.pdf
• Cipherspaces_Darknets An overview of attack strategies - Def Con.pdf
• The Darknet A Digital Copyright Revolution.pdf
• Open Source Intelligence Methods and Tools A Practical Guide to Online Intelligence.pdf
• Darknet Geopolitics and Uses.pdf
• Darknet as a Source of Cyber Threat Intelligence.pdf
• Anonymous_Webs_of_Trust.pdf
• Cyber-Physical Systems Architecture, Security and Application.pdf
• Cyber Security for Cyber Physical Systems.pdf
• Cyber Threat Intelligence.pdf
• Collaborative cyber threat intelligence detecting and responding to advanced cyber attacks on national level.pdf
• Post-Graduate Diploma in Cyber Security Cyber Attacks and Counter Measures.pdf
• Cyber Security Cryptography and Machine Learning 2017.pdf
• Cybersecurity Geopolitics, Law, and Policy.pdf
• Cyber-Development, Cyber-Democracy and Cyber-Defense Challenges, Opportunities and Implications for Theory, Policy and Practice.pdf
• The dark web breakthroughs in research and practice.pdf
• Data Analysis For Network Cyber-Security.pdf
• Cyber Security on Azure An IT Professional’s Guide to Microsoft Azure Security Center.pdf
• National Security Intelligence and Ethics - 2021.pdf
• CYBERSECURITY RISKS, PROGRESS, AND THE WAY FORWARD IN LATIN AMERICA AND THE CARIBBEAN.pdf
• cyber-security-report-2020.pdf
• Introduction-cyber-security.pdf
• hack-x-crypt a straight forward guide towards ethical hacking and cyber security.pdf
/u/Randumb · 1 votes · 10 months ago · Link
hey man a pdf called "Trawling for Tor Hidden Services - Detection, Measurement, Deanonymization.pdf" is not a pdf its a shortcut to someone named joe
/u/HeadJanitor Moderator
· 1 votes
· 10 months ago
· Link
Apologies about the late reply and thanks for mentioning out the oddity. I'll do a search for link and url files later.
Uploaded now:
2013 IEEE Symposium on Security and Privacy
Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization
Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann
University of Luxembourg
{alex.biryukov,ivan.pustogarov,ralf-philipp.weinmann}@uni.lu
SHA-256: 99E47CFBF822146912F3F664F811D7838CBA55EC576D37DCA7DF7DA9B227B98A
/u/Henryrollins222 · 1 votes · 10 months ago · Link
Hi, this is about 1.8 gb.jusy wondering if books have been deleted or what and thank you so much
/u/HeadJanitor Moderator
· 1 votes
· 10 months ago
· Link
No, they are all there. View it in detailed view so you see the titles. You can download them all at once or only the ones that interest you. Enjoy.
/u/Randumb · 1 votes · 10 months ago · Link
it is because they are a .zip file so they are compact
/u/cyrus · 1 votes · 9 months ago · Link
[removed]
/u/HeadJanitor Moderator
· 1 votes
· 9 months ago
· Link
That was be so great if you can. Thank you so much. Yeah, I needed mass space and something where no one needed to login. So this was the best choice at the time + Google scans for viruses and copyright material so it brought safety. The pile grew to the point where it's hard on the browser. But I'll add even more this week. Thank you, again /u/cyrus
/u/cyrus · 3 votes · 9 months ago · Link
[removed]
/u/HeadJanitor Moderator
· 2 votes
· 9 months ago
· Link
That is so beast. This should get pinned. I'll add a hundred more this week.
/u/OceanChemicals · 1 votes · 9 months ago · Link
Any good one on data analysis ??
/u/HeadJanitor Moderator
· 1 votes
· 9 months ago
· Link
I don't think so but I'll get you some. If you have any specifics let me know.
/u/OceanChemicals · 1 votes · 9 months ago · Link
aight thanks sir/ma'am
/u/HeadJanitor Moderator
· 1 votes
· 9 months ago
· Link
Thank you! Enjoy. Hope the serve you well.
/u/thyme77 · 1 votes · 9 months ago · Link
Thank you for this
/u/HeadJanitor Moderator
· 2 votes
· 9 months ago
· Link
No problem. Thank you very much. I have more recent books I'll upload this weekend.
/u/TOPcatDNM · 1 votes · 9 months ago · Link
I LOVE YOU..... I MEAN THANKS!
/u/HeadJanitor Moderator
· 1 votes
· 9 months ago
· Link
Anytime. Glad if it helps you. More coming this evening.
/u/TOPcatDNM · 1 votes · 9 months ago · Link
I do have a request. Can we get a detailed guide on setting up a secure I2P setup on a Rasberry PI. That would be connected to the home modem or router. Or is that even safe to do? I dont want the feds kicking my door in cause I am running a I2P node. You have the most epic flare too. Can I get a flare?
A book about I2P would be great like a I2P BIBLE.
/u/HeadJanitor Moderator
· 1 votes
· 9 months ago
· Link
I'll try to find one. It's so unpopular it never crossed my path. But I'll look for one this afternoon.
/u/redlightgreenlight · 1 votes · 9 months ago · Link
do we have to read all this wearing a hoodie?
/u/HeadJanitor Moderator
· 1 votes
· 9 months ago
· Link
HaH! I was thinking more like with candlelight in the dark and some highlighters.
/u/bcertified · 1 votes · 9 months ago · Link
Thank you for this, but if you have anything on iOS or android security that would be wicked
/u/HeadJanitor Moderator
· 1 votes
· 9 months ago
· Link
Nada but if you have something in mind I'll get it. I realize there's too many to scroll. I should put them in folders.
/u/FiktishusIgor · 1 votes · 9 months ago · Link
Hey I'm not sure if you're still coming back to this post after so long but should I enable JavaScript to download this? Is Iit safe?
/u/HeadJanitor Moderator
· 2 votes
· 9 months ago
· Link
I can't enable JS. Don't use Tor to download it as it would take you a week to download 6 GB. I'll upload a ton of more recent books soon. Just use a VPN and a regular browser ----- no login necessary.
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
Uploaded on 2022--05-11
• The NICE Cyber Security Framework Cyber Security Intelligence and Analytics.pdf
• Python for Data Analysis Data Wrangling with Pandas, NumPy, and IPython.pdf
• Cryptography and Network Security - Master of Science in Information Technology.pdf
• Dependency Injection Principles, Practices, and Patterns.pdf
• Beginning Serverless Computing Developing with Amazon Web Services, Microsoft Azure, and Google Cloud.pdf
• Cracking Codes with Python An Introduction to Building and Breaking Ciphers.pdf
• Operating System Concepts and Basic Linux Commands.pdf
• Introduction to Cryptography Principles and Applications, 2nd Edition (Information Security and Cryptography).pdf
• MATLAB Deep Learning With Machine Learning, Neural Networks and Artificial Intelligence.pdf
• Hacklog Volume 1 Anonymity IT Security & Ethical Hacking Handbook.pdf
• Linux® Command Line and Shell Scripting Bible.pdf
• Applied Cryptography for Cyber Security and Defense. Information Encryption and Cyphering.pdf
• Computer Forensics Investigating Network Intrusions and Cyber Crime.pdf
• Professional Red Teaming Conducting Successful Cybersecurity Engagements.pdf
• Cyber Security Analytics, Technology and Automation.pdf
• Cyber-security Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare.pdf
• Linux Linux Command Line, Cover all essential Linux commands.pdf
• Comptia Pentest+ Study Guide Exam Pt0-001.pdf
• Cybersecurity Essentials.pdf
• Real-World Bug Hunting A Field Guide to Web Hacking Real-World Bug Hunting A Field Guide to Web Hacking.pdf
• Rtfm Red Team Field Manual.pdf
• CompTIA Cybersecurity Analyst (CSA+) Study Guide Exam CS0-001.pdf
• Linux Essentials for Cybersecurity.pdf
• Mike Meyers’ CompTIA security+ certification guide, (exam SY0-501).pdf
• The Hacker Playbook 3 Practical Guide To Penetration Testing.pdf
• Advanced Penetration Testing. Hacking the World’s Most Secure Networks.pdf
• CISSP All in one Exam Guide - Eigth Edition.pdf
• CISSP Cert Guide - Third Edition.pdf
• CISSP Official Practice Tests.pdf
• Industrial Espionage and Technical Surveillance Counter Measurers.pdf
• The Constitutional Infirmity of Warrantless NSA Surveillance.pdf
• Cyberspies The Secret History of Surveillance, Hacking, and Digital Espionage.pdf
• Drones and Unmanned Aerial Systems Legal and Social Implications for Security and Surveillance.pdf
• Edward Snowden - Taking a Stand for American Liberty.pdf
• The Age of Surveillance Capitalism The Fight for a Human Future at the New Frontier of Power.pdf
• Code Warriors, NSA's Codebreakers and the Secret Intelligence War Against the Soviet Union.pdf
• Permanent Record By Edward Snowden.pdf
• Resisting NSA Surveillance - Glenn Greenwald and the public sphere debate about privacy.pdf
• Introduction to Intelligent Surveillance Surveillance Data Capture, Transmission, and Analytics.pdf
• Tor and The Dark Net Remain Anonymous and Evade NSA Spying.pdf
• No Place to Hide Edward Snowden, the NSA, and the U.S. Surveillance State.pdf
• Mastering Splunk Optimize your machine-generated data effectively by developing advanced analytics with Splunk.pdf
• PhD THESIS - OPEN SOURCE INTELLIGENCE - A CONTEMPORARY INTELLIGENCE LIFELINE.pdf
• Techniques and tools for OSINT-based threat analysis.pdf
• Defining Second Generation Open Source Intelligence (OSINT) for the Defense Enterprise.pdf
• Splunk, OSINT And VisualizaIon Catching Bad Guys With Pictures.pdf
• DARKNET, ANONYMITY & LAW.pdf
• Monitoring darknets for detecting malicious activities.pdf
• Learning Darknet Markets.pdf
• The Dangers Of Using Tor On The Darknet And How To Fix It.pdf
• Pharmaceutical Crime on the Darknet.pdf
• BLACK-HAT HACKERS’ CRISIS INFORMATION PROCESSING IN THE DARKNET - A CASE STUDY OF CYBER UNDERGROUND MARKET SHUTDOWNS.pdf
• Dealing with Dead Ends - Efficient Routing in Darknets.pdf
• DRUGS AND THE DARKNET - CHALLENGES AND OPPORTUNITIES.pdf
• A geographical analysis of trafficking on a popular darknet market.pdf
• Complex Network Analysis of Darknet Black Market Forum Structure.pdf
• Data Mining in the Dark - Darknet Intelligence Automation.pdf
• Tracking Darknet.pdf
• Understanding the Topological Structure and Semantic Content of Darknet Communities.pdf
• Cipherspaces_Darknets An overview of attack strategies - Def Con.pdf
• The Darknet A Digital Copyright Revolution.pdf
• Open Source Intelligence Methods and Tools A Practical Guide to Online Intelligence.pdf
• Darknet Geopolitics and Uses.pdf
• Darknet as a Source of Cyber Threat Intelligence.pdf
• Anonymous_Webs_of_Trust.pdf
• Cyber-Physical Systems Architecture, Security and Application.pdf
• Cyber Security for Cyber Physical Systems.pdf
• Cyber Threat Intelligence.pdf
• Collaborative cyber threat intelligence detecting and responding to advanced cyber attacks on national level.pdf
• Post-Graduate Diploma in Cyber Security Cyber Attacks and Counter Measures.pdf
• Cyber Security Cryptography and Machine Learning 2017.pdf
• Cybersecurity Geopolitics, Law, and Policy.pdf
• Cyber-Development, Cyber-Democracy and Cyber-Defense Challenges, Opportunities and Implications for Theory, Policy and Practice.pdf
• The dark web breakthroughs in research and practice.pdf
• Data Analysis For Network Cyber-Security.pdf
• Cyber Security on Azure An IT Professional’s Guide to Microsoft Azure Security Center.pdf
• National Security Intelligence and Ethics - 2021.pdf
• CYBERSECURITY RISKS, PROGRESS, AND THE WAY FORWARD IN LATIN AMERICA AND THE CARIBBEAN.pdf
• cyber-security-report-2020.pdf
• Introduction-cyber-security.pdf
• hack-x-crypt a straight forward guide towards ethical hacking and cyber security.pdf
/u/theArchitect · 1 votes · 8 months ago · Link
Thank you this is pure gold
/u/HeadJanitor Moderator
· 2 votes
· 8 months ago
· Link
Because of your comment, I will upload a hundred more from 2000-2022. Thank you!
/u/intersink · 1 votes · 2 months ago · Link
Is there a new link for the download? I tried to download the collection but noticed it was down
/u/HeadJanitor Moderator
· 1 votes
· 2 months ago
· Link
I just checked right now and it is up.
https://i.ibb.co/HVRkYb0/Debian0001492.png
/u/[deleted] · 1 votes · 2 months ago · Link
How tf did you used imgbb? They're asking me to activate js
/u/HeadJanitor Moderator
· 1 votes
· 2 months ago
· Link
SafePic Onion Host (No JavaScript Necessary)
http://imagesggpp7rzcfauhg2fbwzvfevadehbwjfmy74rhh4hsseescwmuyd.onion/40423281ea75230d5a2d1ba9d1119bdf.png
AnonFiles Picture Host (No JavaScript Necessary)
https://cdn-141.anonfiles.com/hf64C9iazb/2d8dcdd4-1680500240/Debian0001492.jpg
/u/Sylfaemo · 1 votes · 2 weeks ago · Link
Holly shot this is gold, thanks!
/u/HeadJanitor Moderator
· 1 votes
· 1 year ago
· Link
Uploaded on 2022-05-23
• Deep Learning Cookbook Practical Recipes to Get Started Quickly.pdf
• The Linux Programming Interface.pdf
• Violent Python A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers.pdf
• Gray hat Python Python programming for hackers and reverse.pdf
• Python Pocket Reference, 5th Edition Python in Your Pocket.pdf
• Web Scraping with Python Collecting More Data from the Modern Web.pdf
• Flask Web Development Developing Web Applications with Python.pdf
• Applied Text Analysis with Python Enabling Language-Aware Data Products with Machine Learning.pdf
• Monetizing Machine Learning Quickly Turn Python ML Ideas Into Web Applications on the Serverless Cloud.pdf
• Practical Machine Learning and Image Processing For Facial Recognition, Object Detection, and Pattern Recognition Using Python.pdf
• Building Chatbots with Python Using Natural Language Processing and Machine Learning.pdf
• Foundations of Python Network Programming.pdf
• Cracking Codes with Python An Introduction to Building and Breaking Ciphers.pdf
• Python Data Analytics Data Analysis and Science Using Pandas, matplotlib, and the Python Programming Language.pdf
• Python for Data Analysis Data Wrangling with Pandas, NumPy, and IPython.pdf
• Version Control with Git.pdf
• The GitHub Book.pdf
• Building Tools with GitHub.pdf
• Git for Teams A User-Centered Approach to Creating Efficient Workflows in Git.pdf
• Linux The Textbook.pdf
• Introducing GitHub A Non-Technical Guide.pdf
• How Much Anonymity does Network Latency Leak.pdf
• Guard Placement Attacks on Path Selection Algorithms for Tor.pdf
• Secret Network - A Privacy-Preserving Secret Contract & Decentralized Application Platform.pdf
• Network Layer Aspects of Permissionless Blockchains.pdf
• The Unexpected Dangers of Dynamic JavaScript.pdf
• An Intensive Introduction to Cryptography.pdf
• A Graduate Course in Applied Cryptography.pdf
• Cryptocurrency Market Consolidation in 2020–2021.pdf
• Correlations of Multi-input Monero Transactions.pdf
• Remote Side-Channel Attacks on Anonymous Transactions.pdf
• ISIS-OPSEC-Guide.pdf
• Security Audit of Safeplug Tor in a Box.pdf
• sanog4-devdas-transproxy.pdf
• RING CONFIDENTIAL TRANSACTIONS.pdf
• Virtual WiFi - Bring Virtualization from Wired to Wireless.pdf
• Overview of Certification Systems X.509, CA, PGP and SKIP.pdf
• Cyberspace - Malevolent Actors, Criminal Opportunities, and Strategic Competition.pdf
• OWASP Cheat Sheets.pdf
• Computer_Security_Principles_and_Practice_(3rd_Edition).pdf
• The Penetration Testing Execution Standard Documentation.pdf
• Alice in Onion Land - On Information Security of Tor.pdf
• Once is Never Enough - Foundations for Sound Statistical Inference in Tor Network Experimentation.pdf
• DPSelect - A Differential Privacy Based Guard Relay Selection Algorithm for Tor.pdf
• Modified Relay Selection and Circuit Selection for Faster Tor.pdf
• Guard Placement Attacks on Location-Based Path Selection Algorithms in Tor.pdf
• Point Break - A Study of Bandwidth Denial-of-Service Attacks against Tor.pdf
• Privacy, Anonymity, and Perceived Risk in Open Collaboration - A Study of Service Providers.pdf
• Digital Forensic Acquisition of Virtual Private Servers Hosted in Cloud Providers that Use KVM as a Hypervisor.pdf
• Modern Cryptography.pdf
• The Hardware Hacker. Adventures in Making and Breaking Hardware.pdf
• Attacking Network Protocols A Hacker’s Guide to Capture, Analysis, and Exploitation.pdf
• Wireshark Network Analysis.pdf
• Deep Learning.pdf