P_Kellhack Posted July 19, 2013 Report Posted July 19, 2013 Hi everyone!I'm writing to you form Hakin9 magazine. We would like to share with you some of our free tutorials which focus on IT Security & Hacking. Here are some topics you may find interesting:Write your own debbuger and learn how to use shellcodes techniquesReverse Engineering Tutorials | Hackers about hacking techniques in our IT Security Magazine | Reverse Engineering TutorialsDo you know how to use Hydra? Cross-site scripting and many moreHakin9 Offensive Programming - for Authors and Friends | Hackers about hacking techniques in our IT Security Magazine | Hakin9 Offensive Programming - for Authors and FriendsEverything that beginner should know about hackingHacking for Beginners | Hackers about hacking techniques in our IT Security Magazine | Hacking for BeginnersHow to exploit Android with metasploit? Defending layer 2 attacks, and how to make sure that your Wordpress site is not exposed to any hack attack?The Guide to Backtrack | Hackers about hacking techniques in our IT Security Magazine | The Guide to BacktrackMetasploit's secrets on 180 pagesMetasploit Tutorials Compedium | Hackers about hacking techniques in our IT Security Magazine | Metasploit Tutorials CompediumWhy is NMAP so efficent? How to use it properly for your purpose?Nmap Guide Revisited | Hackers about hacking techniques in our IT Security Magazine | Nmap Guide RevisitedHow to exploit SAP? Practical guidanceA Guide to SAP Exploit | Hackers about hacking techniques in our IT Security Magazine | A Guide to SAP ExploitHTML hacking, How to perform MITM attack - step by stepAdvanced Web Attacks And Exploitation | Hackers about hacking techniques in our IT Security Magazine | Advanced Web Attacks And ExploitationLast but not least - a beginner's guide to software exploitationsoftware exploitation starter kit | Hackers about hacking techniques in our IT Security Magazine | software exploitation starter kitIs your WI-FI really that safe?Wireshark Compendium | Hackers about hacking techniques in our IT Security Magazine | Wireshark CompendiumAlso here are some other tutorials from our pre orders:Mobile hacking- everything you need to know to protect your devices and prevent any hack attackMOBILE HACKING – Learn How Mobile Devices Can Be Hacked And How to Protect Them with Many Step-by-step Tutorials! | Magazine | Hackers about hacking techniques in our IT Security MagazineHow to deal with Malware and keep your machines safeLEARN ADVANCED MALWARE ANALYSIS TECHNIQUES – Hakin9?s STEP-BY-STEP TUTORIALS – PRE-ORDER | Magazine | Hackers about hacking techniques in our IT Security MagazineBIOS Security and protecting your precious dataBIOS Security – Learn How To Protect Your System And Become A Professional Security Expert! – PRE-ORDER | Magazine | Hackers about hacking techniques in our IT Security MagazineAdvanced Windows ExploitationAdvanced Windows Exploitation – Hakin9 Step-by-step Tutorials – PRE-ORDER | Magazine | Hackers about hacking techniques in our IT Security MagazineDealing with electronic accounts hacking, phishing and many moreHow to Hack Cyber Wallets – Hakin9 Step-by-step PDF and VIDEO Tutorials – PRE-ORDER | Magazine | Hackers about hacking techniques in our IT Security MagazineIf you are interested in other topics please let me know at pawel.keller@hakin9.orgKind Regards Quote