Jump to content
Nytro

HUMBLE BOOK BUNDLE: HACKING 101 BY NO STARCH PRESS

Recommended Posts

Posted
HUMBLE BOOK BUNDLE: HACKING 101 BY NO STARCH PRESS
 

We've teamed up with No Starch Press for our newest bundle with a wealth of great ebooks for you to enjoy!! Get ebooks like Metasploit, Web Security for Developers, Real-World Bug Hunting, and Black Hat Go. Plus, your purchase will support the National Coalition Against Censorship and the No Starch Press Foundation!

US$655 WORTH OF AWESOME STUFF
 
PAY €1 OR MORE
 
DRM-FREE
 
MULTI-FORMAT
 
13,165 BUNDLES SOLD
GET THE BUNDLE
TIME LEFT
REMIND
17
days
https%3A%2F%2Fpics.paypal.com%2F00%2Fs%2
https%3A%2F%2Fpics.paypal.com%2F00%2Fs%2
Supporting

PAY €1 TO UNLOCK!

 
0019f1a113720bb1d35d9ba6fdea67ea0c367a00
 
 
 Locked contentHacking: The Art of Exploitation, 2nd Edition
 
647954332f4881cdcd33454cf3eed31eb11d484d
 
 
 Locked contentThe Car Hacker's Handbook: A Guide for the Penetration Tester
 
d949379b73429de58dc6367d9086f6052ff29e8f
 
 
 Locked contentMetasploit: A Penetration Tester's Guide

PAY €6.77 OR MORE TO ALSO UNLOCK!

 
57f9cb5180f4c9ad66a63eef562c2cb856578dcc
 
 
 Locked contentPractical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
 
0ae506fab66f53438a187d8a6ff88665dd5e2636
 
 
 Locked contentPenetration Testing: A Hands-On Introduction to Hacking
 
cd0eb925e3b2be5b3b9666f00a0ee1b702f56e55
 
 
 Locked contentAttacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation
 
2f67830498a6c84fe62d271170ad3f831ada12aa
 
 
 Locked contentPractical Packet Analysis, 3rd Edition: Using Wireshark to Solve Real-World Network Problems

PAY €8.46 OR MORE TO ALSO UNLOCK!

 
e5981885b9ca6f67e444c4da3da5a651ebf001e9
 
 
 Locked contentPractical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly
 
b4c8c49ce8856b4ff4a66deb19d5891c363aee78
 
 
 Locked contentMalware Data Science: Attack Detection and Attribution
 
21f33415d3fd10a776635a1515049c60b7de8b93
 
 
 Locked contentLinux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
 
94aa9bcf6166fd550c84b70a3698fea6531c8936
 
 
 Locked contentThe Linux Command Line, 2nd Edition: A Complete Introduction
 
80b7e3454278855abe61c60b36ca056ed8d36ddd
 
 
 Locked contentSerious Cryptography: A Practical Introduction to Modern Encryption

PAY €15.23 OR MORE TO ALSO UNLOCK!

 
f111f3b79be540cf12b8adac827f7f5562cf100a
 
 
 Locked contentRootkits and Bootkits: Reversing Modern Malware and Next Generation Threats
 
0fcfc9f59586638e8f69606514b93eea98489797
 
 
 Locked contentBlack Hat Go: Go Programming For Hackers and Pentesters
 
68f08c07e19897723ae5cbc33f3f46f857ea6c51
 
 
 Locked contentThe Hardware Hacker: Adventures in Making and Breaking Hardware
 
35d34e1d9faaca76ee005fffd381e96d4f937539
 
 
 Locked contentWeb Security for Developers: Real Threats, Practical Defense
 
dceab12b15d62eef8f42b63d1ee3cdb0a78fead0
 
 
 Locked contentFoundations of Information Security: A Straightforward Introduction
 
26b90b078b0466fc4611c7a829cb6ea824de3084
 
 
 Locked contentReal-World Bug Hunting: A Field Guide to Web Hacking
 

SUPPORT CHARITY

National Coalition Against Censorship
National Coalition Against Censorship
  • Thanks 1

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...