ICEBREAKER101010 Posted November 3, 2015 Report Posted November 3, 2015 Salutare.Mai jos aveti linkurile de download pentru colectia Hakin9 Magazine(2005-2013):Download file Hakin9_Full_Collection.part1.rarDownload file Hakin9_Full_Collection.part2.rarDownload file Hakin9_Full_Collection.part3.rarDownload file Hakin9_Full_Collection.part4.rarDownload file Hakin9_Full_Collection.part5.rarhttp://rapidgator.net/file/4db42059c7bf17a84f9836d5c3a4a941/Hakin9_Full_Collection.part6.rar.htmlhttp://rapidgator.net/file/55c8c20fe3dc1cf1e1939291f176aea2/Hakin9_Full_Collection.part7.rar.html Fisierele sunt in format pdf si epub.Sper sa fie utila cuiva.Have Funk! Quote
Active Members Fi8sVrs Posted November 3, 2015 Active Members Report Posted November 3, 2015 (edited) in alta parte free, poti sa le urci? Quote Error. Captcha expired. Try again in 1 hour. Don`t want to wait? Buy Premium right now! Edited July 3, 2017 by Fi8sVrs Quote
m3gatr0n Posted November 4, 2015 Report Posted November 4, 2015 (edited) @Fi8sVrs & allHai ca le-am gasit eu.... Va recomand sa le luati de-aici, am vazut niste virusi 'frumosi' incercand sa dau de aceasta colectie...https://torcache.net/torrent/A389CAFDF13C45E74367AA85C59C8ADEA4D99824.torrent Edited November 5, 2015 by m3gatr0n 1 Quote
Active Members Fi8sVrs Posted November 8, 2015 Active Members Report Posted November 8, 2015 @m3gatr0nmultumesc, astea sunt: Tutorials 2005\Hakin9 (01_2005) - Cisco IOS Insecurity.pdf 2005\Hakin9 (02_2005) - Vulnerable Mobiles.pdf 2005\Hakin9 (03_2005) - Snooping On Monitor Displays.pdf 2005\Hakin9 (04_2005) - Hacking BlueTooth.pdf 2005\Hakin9 (05_2005) - Anatomy of Pharming.pdf 2006\Hakin9 (01_2006) - Rootkits Under Windows.pdf 2006\Hakin9 (02_2006) - Fighting Malicious Code.pdf 2007\Hakin9 (01_2007) - Taking Control of a Running Process.pdf 2007\Hakin9 (02_2007) - Timing Attacks.pdf 2007\Hakin9 (03_2007) - Haking Oracle.pdf 2007\Hakin9 (04_2007) - Haking Microsoft's .Net.pdf 2007\Hakin9 (05_2007) - Online Fraud Danger.pdf 2007\Hakin9 (06_2007) - Rootkits For Windows.pdf 2007\Hakin9 STARTER_KIT (01_2007) - Searching For Google's Secrets.pdf 2007\Hakin9 STARTER_KIT (02_2007) - Knock Knock Knocking.pdf 2007\Hakin9 STARTER_KIT (03_2007) - Exploiting Software.pdf 2008\Hakin9 (01_2008) - No Backdoor Try Opening The Windows.pdf 2008\Hakin9 (02_2008) - VOIP Abuse.pdf 2008\Hakin9 (03_2008) - LDAP Cracking.pdf 2008\Hakin9 (04_2008) - File Inclusion Attacks.pdf 2008\Hakin9 (05_2008) - Kernal Hacking.pdf 2008\Hakin9 (06_2008) - Hacking WiFi.pdf 2009\Hakin9 (01_2009) - Haking Instant Messenger.pdf 2009\Hakin9 (02_2009) - The Real World Click Jacking.pdf 2009\Hakin9 (03_2009) - Breaking Client-Side Certificate Protection.pdf 2009\Hakin9 (04_2009) - My ERP Got Hacked.pdf 2009\Hakin9 (05_2009) - 21st Century Hacking Techniques.pdf 2009\Hakin9 (06_2009) - Windows FE.pdf 2009\Hakin9 TBO (01_2009).pdf 2010\Hakin9 (10_2010) - Spyware.pdf 2010\Hakin9 (11_2010) - Botnets, Malware, Spyware How to Fight Back.pdf 2010\Hakin9 (1_2010) -Hardware Keylogger A Serious Threat.pdf 2010\Hakin9 (2_2010) - Mobile Exploitation.pdf 2010\Hakin9 (3_2010) - Analyzing Malware and Malicious Content.pdf 2010\Hakin9 (4_2010) - Flash Memory Mobile Forensic.pdf 2010\Hakin9 (5_2010) - Is DDOS Still A Threat.pdf 2010\Hakin9 (6_2010) - Securing VOIP.pdf 2010\Hakin9 (7_2010) - Securing The Cloud.pdf 2010\Hakin9 (8_2010) - Mobile Malware The New Cyber Threat.pdf 2010\Hakin9 (9_2010) - Email Security.pdf 2010\Hakin9 STARTER_KIT (01_2010) - Snort Exposed.pdf 2010\Hakin9 TBO (01_2010).pdf 2011\Hakin 9 2011\Hakin9 Exploiting Software 2011\Hakin9 Extra 2011\Hakin9 Mobile Security 2011\Hakin9 Starter Kit 2011\Hakin 9\Hakin9 (01_2011) - Cybercrime and Cyber War Predictions for 2011.pdf 2011\Hakin 9\Hakin9 (02_2011) - Network Security.pdf 2011\Hakin 9\Hakin9 (03_2011) - ID Theft.pdf 2011\Hakin 9\Hakin9 (04_2011) - Mobile Security.pdf 2011\Hakin 9\Hakin9 (05_2011) - Cloud Security.pdf 2011\Hakin 9\Hakin9 (06_2011) - Insecure Access Control.pdf 2011\Hakin 9\Hakin9 (07_2011) - Web App Security.pdf 2011\Hakin 9\Hakin9 (08_2011) - Hackin RFID.pdf 2011\Hakin 9\Hakin9 (09_2011) - Secure Coding.pdf 2011\Hakin 9\Hakin9 (10_2011) - Hack Apple.pdf 2011\Hakin 9\Hakin9 (11_2011) - Hacking Data.pdf 2011\Hakin 9\Hakin9 (12_2011) - TOR Project.pdf 2011\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (01_2011) - Smashing The Stack.pdf 2011\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (02_2011) - Exploit Format Strings With Python.pdf 2011\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (03_2011) - Password What Password.pdf 2011\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (04_2011) - ShellCode.pdf 2011\Hakin9 Extra\Hakin9 EXTRA (01_2011) - Exploiting Software.pdf 2011\Hakin9 Extra\Hakin9 EXTRA (02_2011) - ID Thefts.pdf 2011\Hakin9 Extra\Hakin9 EXTRA (03_2011) - Forensics.pdf 2011\Hakin9 Extra\Hakin9 EXTRA (04_2011) - Android Security.pdf 2011\Hakin9 Extra\Hakin9 EXTRA (04_2011) - Wireless Security.pdf 2011\Hakin9 Extra\Hakin9 EXTRA (05_2011) - Haking Botnet.pdf 2011\Hakin9 Extra\Hakin9 EXTRA (06_2011) - Rootkit.pdf 2011\Hakin9 Mobile Security\Hakin9 MOBILE SECURITY (01_2011) - IOS Vulnerability.pdf 2011\Hakin9 Starter Kit\Hakin9 STARTER_KIT (01_2011) - Paypal Is A Scam.pdf 2011\Hakin9 Starter Kit\Hakin9 STARTER_KIT (02_2011) - Termination The Internet.pdf 2012\Hakin 9 2012\Hakin9 BIBLE (01_2012).pdf 2012\Hakin9 Exploiting Software 2012\Hakin9 Extra 2012\Hakin9 FOR_FREE (01_2012).pdf 2012\Hakin9 Mobile Security 2012\Hakin9 On Demand 2012\TBO 2012\Hakin 9\Hakin9 (01_2012) - SQL Injection.pdf 2012\Hakin 9\Hakin9 (02_2012) - When I'm X64.pdf 2012\Hakin 9\Hakin9 (03_2012) - DNS Cache Poisoning.pdf 2012\Hakin 9\Hakin9 (04_2012) - Cyber Warfare.pdf 2012\Hakin 9\Hakin9 (05_2012) - Cloud Computing.pdf 2012\Hakin 9\Hakin9 (06_2012) - Biometrics.pdf 2012\Hakin 9\Hakin9 (07_2012) - GreenSQL.pdf 2012\Hakin 9\Hakin9 (08_2012) - Malware.pdf 2012\Hakin 9\Hakin9 (09_2012) - Network Security.pdf 2012\Hakin 9\Hakin9 (10_2012) - Hacking Oracle.epub 2012\Hakin 9\Hakin9 (10_2012) - Hacking Oracle.pdf 2012\Hakin 9\Hakin9 (11_2012) - Mobile Security.epub 2012\Hakin 9\Hakin9 (11_2012) - Mobile Security.pdf 2012\Hakin 9\Hakin9 (12_2012) - Enterprise Network Security.epub 2012\Hakin 9\Hakin9 (12_2012) - Enterprise Network Security.pdf 2012\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (01_2012) - Blackhole Exploint Kit.pdf 2012\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (02_2012) - Hardening of Java Applications Against AOP.pdf 2012\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (03_2012) - Security Onion.pdf 2012\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (04_2012) - Cisco IOS Rootkits and Malware.pdf 2012\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (05_2012) - Buffer Overflow.pdf 2012\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (06_2012) - Pentesting With Android.pdf 2012\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (07_2012) - SamuraiWTF Toolkit.pdf 2012\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (08_2012) - Raspberry Pi Hacking.pdf 2012\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (09_2012) - Metasploit In A Nutshell.epub 2012\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (09_2012) - Metasploit In A Nutshell.pdf 2012\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (10_2012) - A Manual To Reverse Engineer 2012\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE - Bible.pdf 2012\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (10_2012) - A Manual To Reverse Engineer\crackme1.zip_ 2012\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (10_2012) - A Manual To Reverse Engineer\crackme2.zip_ 2012\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (10_2012) - A Manual To Reverse Engineer\Hakin9 EXPLOITING_SOFTWARE (10_2012) - A Manual To Reverse Engineer.epub 2012\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (10_2012) - A Manual To Reverse Engineer\Hakin9 EXPLOITING_SOFTWARE (10_2012) - A Manual To Reverse Engineer.pdf 2012\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (10_2012) - A Manual To Reverse Engineer\odbg201f.zip_ 2012\Hakin9 Extra\Hakin9 EXTRA (01_2012) - Cryptography.pdf 2012\Hakin9 Extra\Hakin9 EXTRA (02_2012) - Honeypots.pdf 2012\Hakin9 Extra\Hakin9 EXTRA (03_2012) - Hacking Hardware.pdf 2012\Hakin9 Extra\Hakin9 EXTRA (04_2012) - Forensics In The Cloud.pdf 2012\Hakin9 Extra\Hakin9 EXTRA (05_2012) - Adobe Security.pdf 2012\Hakin9 Extra\Hakin9 EXTRA (06_2012) - Timing Attacks.pdf 2012\Hakin9 Extra\Hakin9 EXTRA (07_2012) - Quantum Computing.pdf 2012\Hakin9 Extra\Hakin9 EXTRA (08_2012) - Helix.pdf 2012\Hakin9 Extra\Hakin9 EXTRA (09_2012) - Webserver Security.pdf 2012\Hakin9 Extra\Hakin9 EXTRA (10_2012) - How To Boost Your Cloud.pdf 2012\Hakin9 Extra\Hakin9 EXTRA (11_2012) - Biometrics Security.epub 2012\Hakin9 Extra\Hakin9 EXTRA (11_2012) - Biometrics Security.pdf 2012\Hakin9 Mobile Security\Hakin9 MOBILE_SECURITY (01_2012) - Tag You're Infected.pdf 2012\Hakin9 Mobile Security\Hakin9 MOBILE_SECURITY (02_2012) - Data Handling On IOS Devices.pdf 2012\Hakin9 Mobile Security\Hakin9 MOBILE_SECURITY (03_2012) - Mobile Device Security.pdf 2012\Hakin9 On Demand\Hakin9 ON_DEMAND (01_2012) - SQL Injection.pdf 2012\Hakin9 On Demand\Hakin9 ON_DEMAND (02_2012) - Torjan-izing USB Stics.pdf 2012\Hakin9 On Demand\Hakin9 ON_DEMAND (03_2012) - The Guide to Backtrack.pdf 2012\Hakin9 On Demand\Hakin9 ON_DEMAND (04_2012) - Network Security.pdf 2012\Hakin9 On Demand\Hakin9 ON_DEMAND (05_2012) - Connection Overload.pdf 2012\Hakin9 On Demand\Hakin9 ON_DEMAND (06_2012) - Ultimate Nessus 5 Tutorial.pdf 2012\Hakin9 On Demand\Hakin9 ON_DEMAND (07_2012) - Wireshark Sharks On The Wire.epub 2012\Hakin9 On Demand\Hakin9 ON_DEMAND (07_2012) - Wireshark Sharks On The Wire.pdf 2012\Hakin9 On Demand\Hakin9 ON_DEMAND (08_2012) - Exploiting Linux Kernal.epub 2012\Hakin9 On Demand\Hakin9 ON_DEMAND (08_2012) - Exploiting Linux Kernal.pdf 2012\Hakin9 On Demand\Hakin9 ON_DEMAND (09_2012) - Wireshark Sharks On The Wire 2.pdf 2012\TBO\Hakin9 TBO (01_2012) - The Ultimate Guide To Mobile Security.pdf 2012\TBO\Hakin9 TBO (03_2012) - Best of Network Scanning.pdf 2013\Hakin 9 2013\Hakin9 Exploiting Software 2013\Hakin9 Extra 2013\Hakin9 On Demand 2013\Hakin9 Open 2013\Hakin9 Starter Kit 2013\Hakin9 TBO 2013\Python Triple Pack 2013\Hakin 9\Hakin9 (01_2013) - Fight The Spyware.epub 2013\Hakin 9\Hakin9 (01_2013) - Fight The Spyware.pdf 2013\Hakin 9\Hakin9 (02_2013) - DDOS Tutorials.pdf 2013\Hakin 9\Hakin9 (03_2013) - Hacking Android.epub 2013\Hakin 9\Hakin9 (03_2013) - Hacking Android.pdf 2013\Hakin 9\Hakin9 (04_2013) - A Guide To NMAP The Second Encounter.epub 2013\Hakin 9\Hakin9 (04_2013) - A Guide To NMAP The Second Encounter.pdf 2013\Hakin 9\Hakin9 (05_2013) - Offensive Programming.epub 2013\Hakin 9\Hakin9 (05_2013) - Offensive Programming.pdf 2013\Hakin 9\Hakin9 (06_2013) - Advanced Malware Analysis.epub 2013\Hakin 9\Hakin9 (06_2013) - Advanced Malware Analysis.pdf 2013\Hakin 9\Hakin9 (07_2013) - QR Code Haking.epub 2013\Hakin 9\Hakin9 (07_2013) - QR Code Haking.pdf 2013\Hakin 9\Hakin9 (08_2013) - C++ Vs Python.epub 2013\Hakin 9\Hakin9 (08_2013) - C++ Vs Python.pdf 2013\Hakin 9\Hakin9 (09_2013) - Network Security & SQL Injection.pdf 2013\Hakin 9\Hakin9_20_12_2013.pdf 2013\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (01_2013) - Exploiting SAP.epub 2013\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE (01_2013) - Exploiting SAP.pdf 2013\Hakin9 Exploiting Software\Hakin9 EXPLOITING_SOFTWARE TBO (01_2013) - Metasploit Tutorials.pdf 2013\Hakin9 Extra\Hakin9 EXTRA (01_2013) - Backtrack 5 R3.epub 2013\Hakin9 Extra\Hakin9 EXTRA (01_2013) - Backtrack 5 R3.pdf 2013\Hakin9 Extra\Hakin9 EXTRA (02_2013) - Mobile Hacking.epub 2013\Hakin9 Extra\Hakin9 EXTRA (02_2013) - Mobile Hacking.pdf 2013\Hakin9 Extra\Hakin9 EXTRA (03_2013) - Guide To Kali Linux.epub 2013\Hakin9 Extra\Hakin9 EXTRA (03_2013) - Guide To Kali Linux.pdf 2013\Hakin9 On Demand\Hakin9 ON_DEMAND (01_2013) - CyberSecurity.epub 2013\Hakin9 On Demand\Hakin9 ON_DEMAND (01_2013) - CyberSecurity.pdf 2013\Hakin9 On Demand\Hakin9 ON_DEMAND (02_2013) - Internet Based World Security.epub 2013\Hakin9 On Demand\Hakin9 ON_DEMAND (02_2013) - Internet Based World Security.pdf 2013\Hakin9 On Demand\Hakin9 ON_DEMAND (03_2013) - Reverse Engineering Tutorials.pdf 2013\Hakin9 On Demand\Hakin9 ON_DEMAND (04_2013) - Advanced Web Attacks and Exploitations.epub 2013\Hakin9 On Demand\Hakin9 ON_DEMAND (04_2013) - Advanced Web Attacks and Exploitations.pdf 2013\Hakin9 On Demand\Hakin9 ON_DEMAND (05_2013) - Advanced Windows Exploitations.pdf 2013\Hakin9 On Demand\Hakin9 ON_DEMAND (06_2013) - BIOS Security.epub 2013\Hakin9 On Demand\Hakin9 ON_DEMAND (06_2013) - BIOS Security.pdf 2013\Hakin9 On Demand\Hakin9 ON_DEMAND (07_2013) - Exploitation Compendium.epub 2013\Hakin9 On Demand\Hakin9 ON_DEMAND (07_2013) - Exploitation Compendium.pdf 2013\Hakin9 Open\Hakin9 OPEN (01_2013) - How To Use Metasploit For Security Defense.epub 2013\Hakin9 Open\Hakin9 OPEN (01_2013) - How To Use Metasploit For Security Defense.pdf 2013\Hakin9 Open\Hakin9 OPEN (02_2013) - How To Brute Force Drupal 6 Login Pages.epub 2013\Hakin9 Open\Hakin9 OPEN (02_2013) - How To Brute Force Drupal 6 Login Pages.pdf 2013\Hakin9 Open\Hakin9 OPEN (03_2013) - How To Detect System Intrusion.pdf 2013\Hakin9 Open\Hakin9 OPEN (04_2013) - Cyber Threats Solutions.epub 2013\Hakin9 Open\Hakin9 OPEN (04_2013) - Cyber Threats Solutions.pdf 2013\Hakin9 Starter Kit\Hakin9 STARTER_KIT (01_2013) - Beginners Guide To Hacking 2013\Hakin9 Starter Kit\Hakin9 STARTER_KIT (02_2013) - A Beginners Guide To Software Exploitation.pdf 2013\Hakin9 Starter Kit\Hakin9 STARTER_KIT (03_2013) - How To Pentest With BackTrack.pdf 2013\Hakin9 Starter Kit\Hakin9 STARTER_KIT (01_2013) - Beginners Guide To Hacking\Hakin9 STARTER_KIT (01_2013) - Beginners Guide To Hacking.pdf 2013\Hakin9 Starter Kit\Hakin9 STARTER_KIT (01_2013) - Beginners Guide To Hacking\helloworld.exe 2013\Hakin9 TBO\Hakin9 TBO (01_2013) - Wifi Hacking.pdf 2013\Hakin9 TBO\Hakin9 TBO (02_2013) - Exploiting Software.pdf 2013\Hakin9 TBO\Hakin9 TBO (03_2013) - Advanced Backtrack Set.pdf 2013\Python Triple Pack\Software Developer Journal - Python Programming (12_2013).pdf 2013\Python Triple Pack\Software Developer Journal - Python Starter Kit (13_2013).pdf Hakin9 Ebooks\Defend Yourself Hakin9 Ebooks\Don't Be Mocked Secure Your System.pdf Hakin9 Ebooks\Low Tech Hacking.pdf Hakin9 Ebooks\Malware - From Basic Cleaning To Anaylsing.pdf Hakin9 Ebooks\Nmap Guide Hakin9 Ebooks\Public Key Cryptostructure Hakin9 Ebooks\Defend Yourself\Defend Yourself.epub Hakin9 Ebooks\Defend Yourself\Defend Yourself.pdf Hakin9 Ebooks\Nmap Guide\Nmap Guide.epub Hakin9 Ebooks\Nmap Guide\Nmap Guide.pdf Hakin9 Ebooks\Public Key Cryptostructure\Public Key Cryptostructure.epub Hakin9 Ebooks\Public Key Cryptostructure\Public Key Cryptostructure.pdf Tutorials\CEHv7 - Study Guide 1.pdf Tutorials\CEHv7 - Study Guide 2.pdf Tutorials\CEHv7 - Study Guide 3.pdf Tutorials\Crypto Tutorial 1.pdf Tutorials\Crypto Tutorial 2.pdf Tutorials\Crypto Tutorial 3.pdf Tutorials\Crypto Tutorial 4.pdf Tutorials\Metasploit and SET Install on Apple iDevice.pdf 1 Quote