You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,9 +15,9 @@ Top 100 Hacking & Security E-Books (Free Download) - Powered by <a href="htt
15
15
<tr><td>6.</td><td><atarget="_blank"href="https://mega.nz/#!Heg0jCQZ!Y6ZftkyGJc8Rw2WI63v213iIl_SMEtY1qBsb7p2nQjs">Metasploit - The Penetration Tester's Guide</a></td><td>332 Pages</td></tr>
16
16
<tr><td>7.</td><td><atarget="_blank"href="https://mega.nz/#!XKgAEIqJ!jQ0ohALFI2fKrO6S5JzRjOZn6YmAMqKgkCPQLM0Peew">Ethical Hacking and Penetration Testing Guide</a></td><td>523 Pages</td></tr>
17
17
<tr><td>8.</td><td><atarget="_blank"href="https://mega.nz/#!jSpChSpb!UGry-SnTLB3s4qMfh29s6jDromDGQc8I_fkWIqAY6rc">Network Attacks and Exploitation - A Framework</a></td><td>219 Pages</td></tr>
18
-
<tr><td>9.</td><td><atarget="_blank"href="https://mega.nz/#!jCp0QCpb!QBzvaWSfkmBg3k1sOx8LAGw-t6Cb-RaHC3tQ39hgddY">Python Web Penetration Testing Cookbook</a></td><td>224 Pages</td></tr>
18
+
<tr><td>9.</td><td><atarget="_blank"href="https://openload.co/f/mgQhHCrV8Lw/09._Python_Web_Penetration_Testing_Cookbook.pdf">Python Web Penetration Testing Cookbook</a></td><td>224 Pages</td></tr>
19
19
<tr><td>10.</td><td><atarget="_blank"href="https://mega.nz/#!fXwylIQA!ZPFmeFnccvR4ltf_2lwTdi8PqHIArRx_bkqRP9wwq4k">Wireshark for Security Professionals</a></td><td>391 Pages</td></tr>
20
-
<tr><td>11.</td><td><atarget="_blank"href="https://mega.nz/#!iHhGWKhY!-H1nMNg4LjXrDc_hIpyG0IXJ_N2GGdvjqcpaT_mkQ70">Mastering Modern Web Penetration Testing</a></td><td>298 Pages</td></tr>
20
+
<tr><td>11.</td><td><atarget="_blank"href="https://openload.co/f/2tsVl0FU0Kc/11._Modern_Web_Penetration_Testing.pdf">Mastering Modern Web Penetration Testing</a></td><td>298 Pages</td></tr>
<tr><td>13.</td><td><atarget="_blank"href="https://mega.nz/#!6e4UiY5A!3r2oy2AsGXR3P7f8K7xvL2kEVjR6ccze83cAmz9VIBc">The Little Black Book of Computer Viruses</a></td><td>183 Pages</td></tr>
23
23
<tr><td>14.</td><td><atarget="_blank"href="https://mega.nz/#!faoQUSYa!qAda14pWUjd5u4wjOYmzCI52UMa1rUFulh7V0kBGZk8">XSS Attacks - Cross Site Scripting Exploits and Defense</a></td><td>482 Pages</td></tr>
@@ -33,10 +33,10 @@ Top 100 Hacking & Security E-Books (Free Download) - Powered by <a href="htt
33
33
<tr><td>24.</td><td><atarget="_blank"href="https://mega.nz/#!XLo2hYAK!8bmNXXPvSgIotZTsPbGaR-dSj9MfyOoNmm7iZ2me798">Gray Hat Hacking - The Ethical Hacker's Handbook</a></td><td>577 Pages</td></tr>
<tr><td>26.</td><td><atarget="_blank"href="https://mega.nz/#!Sfx2WCBC!oh0fxNYfOqiyCNoeyqayetg_e2G3B8ZF7M3lr3NMCgU">Basic Security Testing with Kali Linux</a></td><td>242 Pages</td></tr>
36
-
<tr><td>27.</td><td><atarget="_blank"href="https://mega.nz/#!iT5AVK4T!-lJxNzy1PzA6lD2pILs_f11KgvI3seA_T9z0MmAKmGU">Mastering Kali Linux for Advanced Penetration Testing</a></td><td>356 Pages</td></tr>
37
-
<tr><td>28.</td><td><atarget="_blank"href="https://mega.nz/#!be4CUI5S!t5gnnoTcix052g50CZeOZhs-jzJsGiPikSTZWqAFvFA">Kali Linux CTF Blueprints</a></td><td>190 Pages</td></tr>
38
-
<tr><td>29.</td><td><atarget="_blank"href="https://mega.nz/#!uPpwASaK!SVx2QJw9zOBPIFcfwFqU7jZpGSAe8NEs0um1cqn1m5E">Kali Linux Cookbook</a></td><td>261 Pages</td></tr>
39
-
<tr><td>30.</td><td><atarget="_blank"href="https://mega.nz/#!yGg21Q5I!QpCaOuvULnshcJV-Kgv09y_R-etiGo4Y7769JLIARmY">Kali Linux - Assuring Security by Penetration Testing</a></td><td>454 Pages</td></tr>
36
+
<tr><td>27.</td><td><atarget="_blank"href="https://openload.co/f/NzCU_46Ryko/27._Mastering_Kali_Linux_For_Advanced_Penetration_Testing.pdf">Mastering Kali Linux for Advanced Penetration Testing</a></td><td>356 Pages</td></tr>
37
+
<tr><td>28.</td><td><atarget="_blank"href="https://openload.co/f/IvprJhQw4Qw/28._Kali_Linux_CTF_Blueprints.pdf">Kali Linux CTF Blueprints</a></td><td>190 Pages</td></tr>
38
+
<tr><td>29.</td><td><atarget="_blank"href="https://openload.co/f/nzraOrBnEO8/29._Kali_Linux_Cookbook.pdf">Kali Linux Cookbook</a></td><td>261 Pages</td></tr>
39
+
<tr><td>30.</td><td><atarget="_blank"href="https://openload.co/f/tBI9PTaOA7w/30._Kali_Linux-_Assuring_Security_by_Penetration_Testing.pdf">Kali Linux - Assuring Security by Penetration Testing</a></td><td>454 Pages</td></tr>
<tr><td>32.</td><td><atarget="_blank"href="https://mega.nz/#!vfwgjQRC!wjKpxiT-qi9r5W8px3-aDqiglZMr1fyh3ThkwPPyrRQ">Computer and Information Security Handbook</a></td><td>877 Pages</td></tr>
42
42
<tr><td>33.</td><td><atarget="_blank"href="https://mega.nz/#!aHgkjC6A!Z0ox5K8qeLeobE6VoBeXsrO5mxu68HeaczcCFRg5hC8">CISSP - Certified Information Systems Security Professional</a></td><td>804 Pages</td></tr>
@@ -103,7 +103,7 @@ Top 100 Hacking & Security E-Books (Free Download) - Powered by <a href="htt
103
103
<tr><td>94.</td><td><atarget="_blank"href="https://mega.nz/#!nX5gHCjS!vdRejQKWoOBB5ADpsciwODys4EszjWFNjTaltJcyQ7w">SSH, The Secure Shell - The Definitive Guide</a></td><td>438 Pages</td></tr>
<tr><td>96.</td><td><atarget="_blank"href="https://mega.nz/#!fC5CiaLL!f9u2h1diOMm2b1eD00DdEF8EyVAdrIgzz4V_JHrqtTo">Zero Day Exploit - Countdown to Darkness</a></td><td>363 Pages</td></tr>
<tr><td>98.</td><td><atarget="_blank"href="https://mega.nz/#!nLpw2abD!Tla1GsHPg6NzxdExbd03jK5--hr62-R_xG6aHaI4374">24 Deadly Sins of Software Securtiy</a></td><td>433 Pages</td></tr>
108
108
<tr><td>99.</td><td><atarget="_blank"href="https://mega.nz/#!DPhQ3ICB!hUk6UqVzfcfyPL3ftYx7HR6d9HNo7p8IdUQjNMlOCTQ">Botnets - The Killer Web App</a></td><td>482 Pages</td></tr>
109
109
<tr><td>100.</td><td><atarget="_blank"href="https://mega.nz/#!DKoWUI5B!WXfTCl5-quuooEq1xf-MOtm3iMaDLOt8v9X3hTm4rA8">Hacker Highschool - Hack School for Beginners (ZIP)</a></td><td>12 Books</td></tr>
0 commit comments