PDA

Ver la versión completa : Descarga gratis los 100 mejores libros de hacking de Raj Chandel



LUK
18-06-2014, 13:12
Impresionante recopilatorio con el top 100 de libros de hacking del blog de Raj Chandel (http://www.rajhackingarticles.blogspot.com/):


Kali Linux – Assuring Security by Penetration Testing (http://www.hackingarticles.in/kali-linux-assuring-security-by-penetration-testing/)
Network Analysis Using Wireshark Cookbook (http://www.hackingarticles.in/network-analysis-using-wireshark-cookbook/)
Computer Security Handbook, 6th Edition (http://www.hackingarticles.in/computer-security-handbook-6th-edition/)
iPad and iPhone Kung Fu: Tips, Tricks, Hints, and Hacks for iOS 7 (http://www.hackingarticles.in/ipad-and-iphone-kung-fu-tips-tricks-hints-and-hacks-for-ios-7/)
Android Security Cookbook (http://www.hackingarticles.in/android-security-cookbook/)
Penetration Testing with BackBox (http://www.hackingarticles.in/penetration-testing-with-backbox/)
Kali Linux Social Engineering (http://www.hackingarticles.in/kali-linux-social-engineering/)
Computer Forensics with FTK (http://www.hackingarticles.in/computer-forensics-with-ftk/)
Android Hacker’s Handbook (http://www.hackingarticles.in/android-hackers-handbook/)
Practical Reverse Engineering (http://www.hackingarticles.in/practical-reverse-engineering/)
Malware Forensics Field Guide for Linux Systems (http://www.hackingarticles.in/malware-forensics-field-guide-for-linux-systems-digital-forensics-field-guides/)
Learning Pentesting for Android (http://www.hackingarticles.in/learning-pentesting-for-android/)
The Hacker Playbook: Practical Guide To Penetration Testing (http://www.hackingarticles.in/the-hacker-playbook-practical-guide-to-penetration-testing/)
Learning Metasploit Exploitation and Development (http://www.hackingarticles.in/learning-metasploit-exploitation-and-development/)
Web Penetration Testing with Kali Linux (http://www.hackingarticles.in/web-penetration-testing-with-kali-linux/)
Metasploit Penetration Testing Cookbook Combo Pack (1st+2nd Edition) (http://www.hackingarticles.in/metasploit-penetration-testing-cookbook-combo-pack-1st2nd-edition/)
Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions (http://www.hackingarticles.in/hacking-point-of-sale-payment-application-secrets-threats-and-solutions/)
The Browser Hacker’s Handbook 2014 (http://www.hackingarticles.in/the-browser-hackers-handbook-2014/)
Hacking Politics (http://www.hackingarticles.in/hacking-politics/)
The Basics of Web Hacking Tools and Techniques to Attack the Web (http://www.hackingarticles.in/the-basics-of-web-hacking-tools-and-techniques-to-attack-the-web/)
Investigative Computer Forensics The Practical Guide for Lawyers, Accountants, Investigators, and Business Executives (http://www.hackingarticles.in/investigative-computer-forensics-the-practical-guide-for-lawyers-accountants-investigators-and-business-executives/)
The Basics of Hacking and Penetration Testing, Second Edition (http://www.hackingarticles.in/the-basics-of-hacking-and-penetration-testing-second-edition/)
Professional Penetration Testing (http://www.hackingarticles.in/professional-penetration-testing/)
The State of the Art in Intrusion Prevention and Detection (http://www.hackingarticles.in/the-state-of-the-art-in-intrusion-prevention-and-detection/)
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners (Second Edition) (http://www.hackingarticles.in/cyber-warfare-techniques-tactics-and-tools-for-security-practitioners-second-edition/)
Hacking with Kali: Practical Penetration Testing Techniques (http://www.hackingarticles.in/hacking-with-kali-practical-penetration-testing-techniques/)
Wireshark 101: Essential Skills for Network Analysis (http://www.hackingarticles.in/wireshark-101-essential-skills-network-analysis/)
Hacking Raspberry Pi 2013 (http://www.hackingarticles.in/hacking-raspberry-pi-2013/)
Blackhatonomics: An Inside Look at the Economics of Cybercrime (http://www.hackingarticles.in/blackhatonomics-an-inside-look-at-the-economics-of-cybercrime/)
Hacking and Securing iOS Applications (http://www.hackingarticles.in/hacking-and-securing-ios-applications/)
iOS Hacker’s Handbook (http://www.hackingarticles.in/ios-hackers-handbook/)
Windows Forensics Analysis Toolkit (http://www.hackingarticles.in/windows-forensics-analysis-toolkit/)
Linux Server Hacks (http://www.hackingarticles.in/linux-server-hacks/)
Violent Python – A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers (http://www.hackingarticles.in/violent-python-a-cookbook-for-hackers-forensic-analysts-penetration-testers-and-security-engineers/)
Instant Penetration Testing: Setting Up a Test Lab How-to (http://www.hackingarticles.in/instant-penetration-testing-setting-up-a-test-lab-how-to/)
Coding Freedom: The Ethics and Aesthetics of Hacking (http://www.hackingarticles.in/coding-freedom-the-ethics-and-aesthetics-of-hacking/)
The Basics of Hacking and Penetration Testing (http://www.hackingarticles.in/the-basics-of-hacking-and-penetration-testing/)
The Unrevealed Secrets of Hacking and Cracking (http://www.hackingarticles.in/the-unrevealed-secrets-of-hacking-and-cracking/)
Wireshark Network Analysis – Second Edition (http://www.hackingarticles.in/wireshark-network-analysis-second-edition-free-download/)
The Basics of Information Security (http://www.hackingarticles.in/the-basics-of-information-security/)
Secrets of Network Cartography (http://www.hackingarticles.in/secrets-of-network-cartography/)
Seven Deadliest Network Attacks (http://www.hackingarticles.in/seven-deadliest-network-attacks/)
Metaprogramming Ruby: Program Like the Ruby Pros (http://www.hackingarticles.in/metaprogramming-ruby-program-like-the-ruby-pros/)
Next-Generation Firewalls for Dummies (http://www.hackingarticles.in/next-generation-firewalls-for-dummies/)
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System (http://www.hackingarticles.in/the-rootkit-arsenal-escape-and-evasion-in-the-dark-corners-of-the-system/)
Hacking Exposed 7: Network Security Secrets & Solutions, Seventh Edition (http://www.hackingarticles.in/hacking-exposed-7-network-security-secrets-solutions-seventh-edition/)
Reversing: Secrets of Reverse Engineering (http://www.hackingarticles.in/reversing-secrets-of-reverse-engineering/)
Unauthorised Access – Physical Penetration Testing For IT Security Teams (http://www.hackingarticles.in/unauthorised-access-physical-penetration-testing-for-it-security-teams/)
Advanced Penetration Testing for Highly-Secured Environments (http://www.hackingarticles.in/advanced-penetration-testing-for-highly-secured-environments/)
Gray Hat Python: Python Programming for Hackers and Reverse Engineers (http://www.hackingarticles.in/gray-hat-python-python-programming-for-hackers-and-reverse-engineers/)
Network Forensics Tracking Hackers through Cyberspace (http://www.hackingarticles.in/network-forensics-tracking-hackers-through-cyberspace/)
Hackin9 Guide to BackTrack (http://www.hackingarticles.in/hackin9-guide-to-backtrack/)
Coding For Penetration Testers (http://www.hackingarticles.in/coding-for-penetration-testers/)
Practical Malware Analysis (http://www.hackingarticles.in/practical-malware-analysis/)
Exploiting Software: How to Break Code (http://www.hackingarticles.in/exploiting-software-how-to-break-code/)
Hacker’s Delight (http://www.hackingarticles.in/hackers-delight/)
Hackers Heroes of the Computer Revolution (http://www.hackingarticles.in/hackers-heroes-computer-revolution/)
Facebook Hacking E-Book (Free Download) (http://www.hackingarticles.in/facebook-hacking/)
Hacking The Next Generation (http://www.hackingarticles.in/download-free-ethical-hacking-ebooks/hacking-the-next-generation/)
24 Deadly Sins of Software Security (http://www.hackingarticles.in/download-free-ethical-hacking-ebooks/deadly-software-security/)
The Crypter Blue Print (http://www.hackingarticles.in/download-free-ethical-hacking-ebooks/the-crypter-blue-print/)
Google Hacking for Penetration Tester (http://www.hackingarticles.in/download-free-ethical-hacking-ebooks/google-hacking-penetration-tester/)
Wireless Kungfu Networking & Hacking (http://www.hackingarticles.in/?p=3251)
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground (http://www.hackingarticles.in/?p=3208)
Dark Market- CyberThieves CyberCrime and you (http://www.hackingarticles.in/?p=3173)
Policing Cyber Crime (http://www.hackingarticles.in/?p=3136)
Metasploit (The Penetration Tester’s Guide) (http://www.hackingarticles.in/metasploit-the-penetration-testers-guide/)
The Art of Deception (http://www.hackingarticles.in/?p=2974)
Ghost in the Wires (Free Download) (http://www.hackingarticles.in/ghost-in-the-wires-free-download/)
BackTrack 5 Wireless Penetration Testin (http://www.hackingarticles.in/?p=2961)
Windows 7 Tweaks (Best Book for Windows 7 Lovers) (http://www.hackingarticles.in/?p=2908)
Free Download Hacker Highschool (13 Books) (http://www.hackingarticles.in/?p=2866)
Hacking Beware (http://www.hackingarticles.in/?p=2749)
Batch File Programming (http://www.hackingarticles.in/?p=2690)
Windows 7 Bible (http://www.hackingarticles.in/?p=2679)
Two Beginner Guide of Hacking (http://www.hackingarticles.in/?p=2641)
Evolution of Cyber Crime (http://www.hackingarticles.in/?p=2624)
Buffer Overflow Attacks (http://www.hackingarticles.in/?p=2613)
Hacking for Dummies (http://www.hackingarticles.in/?p=2599)
The CEH Prep Guide (http://www.hackingarticles.in/?p=2588)
SQL Injection Attack and Defense (http://www.hackingarticles.in/?p=2575)
Guide to Computer Forensics and Investigation (http://www.hackingarticles.in/?p=2571)
Stealing the Network (E-Book) (http://www.hackingarticles.in/?p=2542)
Cyber Forensics (E-Book) (http://www.hackingarticles.in/?p=2528)
Gmail Hacking (New Hacking E-Book) (http://www.hackingarticles.in/?p=2502)
Hacking Computer forensics Exposed (http://www.hackingarticles.in/?p=2482)
You Tube Hacking (My New E-Book) (http://www.hackingarticles.in/?p=2448)
Footprinting (My New Hacking E-Book) (http://www.hackingarticles.in/?p=2431)
Hacking Exposed (E-Book) (http://www.hackingarticles.in/?p=2416)
Forensic Computer Crime Invsestigation (http://www.hackingarticles.in/?p=2955)
Window Based Command Line Tools (E Book) (http://www.hackingarticles.in/?p=2374)
Hacking GPS (E- Book) (http://www.hackingarticles.in/?p=2367)
Window Based GUI Tools (E Book) (http://www.hackingarticles.in/?p=2306)
Hacker Cracker (http://www.hackingarticles.in/hacker-cracker/)
Penetration Testing Procedures & Methodologies (http://www.hackingarticles.in/penetration-testing-procedures-methodologies/)
CEH V8 Course + Lab Manual (http://www.hackingarticles.in/ceh-v8-course-lab-manual/)
Secure Network Infrastructures by EC-Council (http://www.hackingarticles.in/ethical-hacking-and-countermeasures-secure-network-infrastructures-by-ec-council/)
Penetration Testing Communication Media Testing (http://www.hackingarticles.in/penetration-testing-communication-media-testing/)
Computer Forensics Investigating Wireless Networks and Devices (http://www.hackingarticles.in/computer-forensics-investigating-wireless-networks-and-devices/)
Computer Forensics – Investigating Data and Image Files (http://www.hackingarticles.in/computer-forensics-investigating-data-and-image-files/)



Fuente: http://www.hackingarticles.in/free-download-top-100-hacking-books/ (http://www.hackingarticles.in/free-download-top-100-hacking-books/)

LUK
18-06-2014, 13:13
A ver si, con paciencia, subimos todos los libros al hh-server y los agregamos a la sección de documentación (http://foro.hackhispano.com/downloads.php?do=cat&id=2):)