Jump to content
Nytro

HUMBLE BOOK BUNDLE: HACKING 101 BY NO STARCH PRESS

Recommended Posts

HUMBLE BOOK BUNDLE: HACKING 101 BY NO STARCH PRESS
 

We've teamed up with No Starch Press for our newest bundle with a wealth of great ebooks for you to enjoy!! Get ebooks like Metasploit, Web Security for Developers, Real-World Bug Hunting, and Black Hat Go. Plus, your purchase will support the National Coalition Against Censorship and the No Starch Press Foundation!

US$655 WORTH OF AWESOME STUFF
 
PAY €1 OR MORE
 
DRM-FREE
 
MULTI-FORMAT
 
13,165 BUNDLES SOLD
GET THE BUNDLE
TIME LEFT
REMIND
17
days
https%3A%2F%2Fpics.paypal.com%2F00%2Fs%2
https%3A%2F%2Fpics.paypal.com%2F00%2Fs%2
Supporting

PAY €1 TO UNLOCK!

 
0019f1a113720bb1d35d9ba6fdea67ea0c367a00
 
 
 Locked contentHacking: The Art of Exploitation, 2nd Edition
 
647954332f4881cdcd33454cf3eed31eb11d484d
 
 
 Locked contentThe Car Hacker's Handbook: A Guide for the Penetration Tester
 
d949379b73429de58dc6367d9086f6052ff29e8f
 
 
 Locked contentMetasploit: A Penetration Tester's Guide

PAY €6.77 OR MORE TO ALSO UNLOCK!

 
57f9cb5180f4c9ad66a63eef562c2cb856578dcc
 
 
 Locked contentPractical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
 
0ae506fab66f53438a187d8a6ff88665dd5e2636
 
 
 Locked contentPenetration Testing: A Hands-On Introduction to Hacking
 
cd0eb925e3b2be5b3b9666f00a0ee1b702f56e55
 
 
 Locked contentAttacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation
 
2f67830498a6c84fe62d271170ad3f831ada12aa
 
 
 Locked contentPractical Packet Analysis, 3rd Edition: Using Wireshark to Solve Real-World Network Problems

PAY €8.46 OR MORE TO ALSO UNLOCK!

 
e5981885b9ca6f67e444c4da3da5a651ebf001e9
 
 
 Locked contentPractical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly
 
b4c8c49ce8856b4ff4a66deb19d5891c363aee78
 
 
 Locked contentMalware Data Science: Attack Detection and Attribution
 
21f33415d3fd10a776635a1515049c60b7de8b93
 
 
 Locked contentLinux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
 
94aa9bcf6166fd550c84b70a3698fea6531c8936
 
 
 Locked contentThe Linux Command Line, 2nd Edition: A Complete Introduction
 
80b7e3454278855abe61c60b36ca056ed8d36ddd
 
 
 Locked contentSerious Cryptography: A Practical Introduction to Modern Encryption

PAY €15.23 OR MORE TO ALSO UNLOCK!

 
f111f3b79be540cf12b8adac827f7f5562cf100a
 
 
 Locked contentRootkits and Bootkits: Reversing Modern Malware and Next Generation Threats
 
0fcfc9f59586638e8f69606514b93eea98489797
 
 
 Locked contentBlack Hat Go: Go Programming For Hackers and Pentesters
 
68f08c07e19897723ae5cbc33f3f46f857ea6c51
 
 
 Locked contentThe Hardware Hacker: Adventures in Making and Breaking Hardware
 
35d34e1d9faaca76ee005fffd381e96d4f937539
 
 
 Locked contentWeb Security for Developers: Real Threats, Practical Defense
 
dceab12b15d62eef8f42b63d1ee3cdb0a78fead0
 
 
 Locked contentFoundations of Information Security: A Straightforward Introduction
 
26b90b078b0466fc4611c7a829cb6ea824de3084
 
 
 Locked contentReal-World Bug Hunting: A Field Guide to Web Hacking
 

SUPPORT CHARITY

National Coalition Against Censorship
National Coalition Against Censorship
  • Thanks 1
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...