thefcraft commited on
Commit
e6f0723
·
verified ·
1 Parent(s): 7a045c8

Upload folder using huggingface_hub

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. .gitattributes +134 -0
  2. Security/(Ebook - Computer) Hacking The Windows Registry.pdf +0 -0
  3. Security/(eBook - PDF) Hugo Cornwall - The Hacker's Handbook .pdf +0 -0
  4. Security/0321108957.Addison-Wesley Professional.Honeypots- Tracking Hackers.pdf +3 -0
  5. Security/285063-Hacker.Bibel.[278.kB_www.netz.ru].pdf +0 -0
  6. Security/3077366-HackerHighSchool.pdf +3 -0
  7. Security/731986-Hacker's Desk Reference.pdf +0 -0
  8. Security/Addison Wesley - Hackers Delight 2002.pdf +3 -0
  9. Security/Addison Wesley, The Outlook Answer Book Useful Tips Tricks And Hacks (2005) Bbl Lotb.chm +3 -0
  10. Security/Ahmad-Reza_Sadeghi,_David_Naccache,_Pim_Tuyls-Towards_Hardware-Intrinsic_Security__Foundations_and_Practice_(Information_Security_and_Cryptography)(2010).pdf +3 -0
  11. Security/Attacking the DNS Protocol.pdf +0 -0
  12. Security/Auerbach.Practical.Hacking.Techniques.and.Countermeasures.Nov.2006.pdf +3 -0
  13. Security/Auerbach.Pub.The.Hackers.Handbook.The.Strategy.Behind.Breaking.into.and.Defending.Networks.Nov.20.pdf +3 -0
  14. Security/Botnets - The killer web applications.pdf +3 -0
  15. Security/Certified Ethical Hacker (CEH) v3.0 Official Course.pdf +3 -0
  16. Security/Charles.C.Thomas-Document.Security.Protecting.Physical.and.Electronic.Content.2007.RETAiL.EBook.pdf +3 -0
  17. Security/Computer - Hackers Secrets - e-book.pdf +0 -0
  18. Security/Cracking_Passwords_Guide.pdf +0 -0
  19. Security/Credit.Card.Visa.Hack.Ucam.Cl.Tr.560.[223.kB_www.netz.ru].pdf +0 -0
  20. Security/Cross Site Scripting Attacks Xss Exploits and Defense.pdf +3 -0
  21. Security/DangerousGoogle-SearchingForSecrets.pdf +3 -0
  22. Security/Dummies - Hack How To Create Keygens (1).pdf +0 -0
  23. Security/For.Dummies.Hacking.Wireless.Networks.For.Dummies.Sep.2005.eBook-DDU.pdf +3 -0
  24. Security/Gray Hat Hacking~The Ethical Hacker's Handbook, 3e [2011].pdf +3 -0
  25. Security/Hack IT Security Through Penetration Testing.pdf +3 -0
  26. Security/Hack Proofing Linux A Guide to Open Source Security - Stangler, Lane - Syngress - ISBN 1-928994-34-2.pdf +3 -0
  27. Security/Hack Proofing Sun Solaris 8.pdf +3 -0
  28. Security/Hack Proofing Your E-Commerce Site.pdf +3 -0
  29. Security/Hack Proofing Your Network Second Edition.pdf +3 -0
  30. Security/Hack Proofing Your Network_First Edition.pdf +3 -0
  31. Security/Hack Proofing Your Web Applications.pdf +3 -0
  32. Security/Hack_Attacks_Revealed_A_Complete_Reference_With_Custom_Security_Hacking_Toolkit.chm +3 -0
  33. Security/Hack_IT_Security_Through_Penetration_Testing.chm +3 -0
  34. Security/Hacker Disassembling Uncovered.chm +3 -0
  35. Security/Hacker Linux Uncovered.chm +3 -0
  36. Security/Hacker Web Exploitation Uncovered.chm +0 -0
  37. Security/Hacker'S.Delight.chm +3 -0
  38. Security/HackerMonthly/hackermonthly-issue001.zip +3 -0
  39. Security/HackerMonthly/hackermonthly-issue002.zip +3 -0
  40. Security/HackerMonthly/hackermonthly-issue003.zip +3 -0
  41. Security/HackerMonthly/hackermonthly-issue004.zip +3 -0
  42. Security/HackerMonthly/hackermonthly-issue005.zip +3 -0
  43. Security/HackerMonthly/hackermonthly-issue006.zip +3 -0
  44. Security/HackerMonthly/hackermonthly-issue007.zip +3 -0
  45. Security/HackerMonthly/hackermonthly-issue008.zip +3 -0
  46. Security/HackerMonthly/hackermonthly-issue009.zip +3 -0
  47. Security/HackerMonthly/hackermonthly-issue010.zip +3 -0
  48. Security/HackerMonthly/hackermonthly-issue011.zip +3 -0
  49. Security/HackerMonthly/hackermonthly-issue012.zip +3 -0
  50. Security/HackerMonthly/hackermonthly-issue013.zip +3 -0
.gitattributes CHANGED
@@ -2708,3 +2708,137 @@ Programming/Smalltalk/The[[:space:]]Art[[:space:]]and[[:space:]]Science[[:space:
2708
  Programming/VB/Visual[[:space:]]Basic[[:space:]]2005[[:space:]]Express[[:space:]]Edition[[:space:]]for[[:space:]]Dummies.pdf filter=lfs diff=lfs merge=lfs -text
2709
  Programming/VB/Visual[[:space:]]Basic[[:space:]]2005[[:space:]]for[[:space:]]Dummies.pdf filter=lfs diff=lfs merge=lfs -text
2710
  Programming/VB/Wrox.Beginning.Microsoft.Visual.Basic.2008.May.2008.pdf filter=lfs diff=lfs merge=lfs -text
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
2708
  Programming/VB/Visual[[:space:]]Basic[[:space:]]2005[[:space:]]Express[[:space:]]Edition[[:space:]]for[[:space:]]Dummies.pdf filter=lfs diff=lfs merge=lfs -text
2709
  Programming/VB/Visual[[:space:]]Basic[[:space:]]2005[[:space:]]for[[:space:]]Dummies.pdf filter=lfs diff=lfs merge=lfs -text
2710
  Programming/VB/Wrox.Beginning.Microsoft.Visual.Basic.2008.May.2008.pdf filter=lfs diff=lfs merge=lfs -text
2711
+ Security/0321108957.Addison-Wesley[[:space:]]Professional.Honeypots-[[:space:]]Tracking[[:space:]]Hackers.pdf filter=lfs diff=lfs merge=lfs -text
2712
+ Security/3077366-HackerHighSchool.pdf filter=lfs diff=lfs merge=lfs -text
2713
+ Security/Addison[[:space:]]Wesley[[:space:]]-[[:space:]]Hackers[[:space:]]Delight[[:space:]]2002.pdf filter=lfs diff=lfs merge=lfs -text
2714
+ Security/addison[[:space:]]wesley[[:space:]]-[[:space:]]web[[:space:]]hacking[[:space:]]-[[:space:]]attacks[[:space:]]and[[:space:]]defense.chm filter=lfs diff=lfs merge=lfs -text
2715
+ Security/Addison[[:space:]]Wesley,[[:space:]]The[[:space:]]Outlook[[:space:]]Answer[[:space:]]Book[[:space:]]Useful[[:space:]]Tips[[:space:]]Tricks[[:space:]]And[[:space:]]Hacks[[:space:]](2005)[[:space:]]Bbl[[:space:]]Lotb.chm filter=lfs diff=lfs merge=lfs -text
2716
+ Security/Ahmad-Reza_Sadeghi,_David_Naccache,_Pim_Tuyls-Towards_Hardware-Intrinsic_Security__Foundations_and_Practice_(Information_Security_and_Cryptography)(2010).pdf filter=lfs diff=lfs merge=lfs -text
2717
+ Security/amazon-hacks.chm filter=lfs diff=lfs merge=lfs -text
2718
+ Security/Auerbach.Practical.Hacking.Techniques.and.Countermeasures.Nov.2006.pdf filter=lfs diff=lfs merge=lfs -text
2719
+ Security/Auerbach.Pub.The.Hackers.Handbook.The.Strategy.Behind.Breaking.into.and.Defending.Networks.Nov.20.pdf filter=lfs diff=lfs merge=lfs -text
2720
+ Security/Botnets[[:space:]]-[[:space:]]The[[:space:]]killer[[:space:]]web[[:space:]]applications.pdf filter=lfs diff=lfs merge=lfs -text
2721
+ Security/bsd-hacks.pdf filter=lfs diff=lfs merge=lfs -text
2722
+ Security/ceh-official-certified-ethical-hacker-review-guide-exam-312-50.9780782144376.27422.pdf filter=lfs diff=lfs merge=lfs -text
2723
+ Security/Certified[[:space:]]Ethical[[:space:]]Hacker[[:space:]](CEH)[[:space:]]v3.0[[:space:]]Official[[:space:]]Course.pdf filter=lfs diff=lfs merge=lfs -text
2724
+ Security/Charles.C.Thomas-Document.Security.Protecting.Physical.and.Electronic.Content.2007.RETAiL.EBook.pdf filter=lfs diff=lfs merge=lfs -text
2725
+ Security/Cross[[:space:]]Site[[:space:]]Scripting[[:space:]]Attacks[[:space:]]Xss[[:space:]]Exploits[[:space:]]and[[:space:]]Defense.pdf filter=lfs diff=lfs merge=lfs -text
2726
+ Security/DangerousGoogle-SearchingForSecrets.pdf filter=lfs diff=lfs merge=lfs -text
2727
+ Security/ebay-hacks-100-industrial-strength-tips-and-tools.pdf filter=lfs diff=lfs merge=lfs -text
2728
+ Security/ebook.oreilly.-.windows.xp.hacks.sharereactor.chm filter=lfs diff=lfs merge=lfs -text
2729
+ Security/eBooks.OReilly.-.Wireless.Hacks.100.Industrial.-.Strength.Tips.and.Tools.chm filter=lfs diff=lfs merge=lfs -text
2730
+ Security/ethical[[:space:]]hacking,[[:space:]]student[[:space:]]guide.pdf filter=lfs diff=lfs merge=lfs -text
2731
+ Security/excel-hacks.chm filter=lfs diff=lfs merge=lfs -text
2732
+ Security/For.Dummies.Hacking.Wireless.Networks.For.Dummies.Sep.2005.eBook-DDU.pdf filter=lfs diff=lfs merge=lfs -text
2733
+ Security/Gray[[:space:]]Hat[[:space:]]Hacking~The[[:space:]]Ethical[[:space:]]Hacker's[[:space:]]Handbook,[[:space:]]3e[[:space:]]\[2011\].pdf filter=lfs diff=lfs merge=lfs -text
2734
+ Security/Hack[[:space:]]IT[[:space:]]Security[[:space:]]Through[[:space:]]Penetration[[:space:]]Testing.pdf filter=lfs diff=lfs merge=lfs -text
2735
+ Security/Hack[[:space:]]Proofing[[:space:]]Linux[[:space:]]A[[:space:]]Guide[[:space:]]to[[:space:]]Open[[:space:]]Source[[:space:]]Security[[:space:]]-[[:space:]]Stangler,[[:space:]]Lane[[:space:]]-[[:space:]]Syngress[[:space:]]-[[:space:]][[:space:]]ISBN[[:space:]]1-928994-34-2.pdf filter=lfs diff=lfs merge=lfs -text
2736
+ Security/Hack[[:space:]]Proofing[[:space:]]Sun[[:space:]]Solaris[[:space:]]8.pdf filter=lfs diff=lfs merge=lfs -text
2737
+ Security/Hack[[:space:]]Proofing[[:space:]]Your[[:space:]]E-Commerce[[:space:]]Site.pdf filter=lfs diff=lfs merge=lfs -text
2738
+ Security/Hack[[:space:]]Proofing[[:space:]]Your[[:space:]]Network[[:space:]]Second[[:space:]]Edition.pdf filter=lfs diff=lfs merge=lfs -text
2739
+ Security/Hack[[:space:]]Proofing[[:space:]]Your[[:space:]]Network_First[[:space:]]Edition.pdf filter=lfs diff=lfs merge=lfs -text
2740
+ Security/Hack[[:space:]]Proofing[[:space:]]Your[[:space:]]Web[[:space:]]Applications.pdf filter=lfs diff=lfs merge=lfs -text
2741
+ Security/Hack_Attacks_Revealed_A_Complete_Reference_With_Custom_Security_Hacking_Toolkit.chm filter=lfs diff=lfs merge=lfs -text
2742
+ Security/Hack_IT_Security_Through_Penetration_Testing.chm filter=lfs diff=lfs merge=lfs -text
2743
+ Security/Hacker[[:space:]]Disassembling[[:space:]]Uncovered.chm filter=lfs diff=lfs merge=lfs -text
2744
+ Security/hacker[[:space:]]ethic.pdf filter=lfs diff=lfs merge=lfs -text
2745
+ Security/Hacker[[:space:]]Linux[[:space:]]Uncovered.chm filter=lfs diff=lfs merge=lfs -text
2746
+ Security/Hacker'S.Delight.chm filter=lfs diff=lfs merge=lfs -text
2747
+ Security/hacker-disassembling-uncovered.9781931769228.20035.chm filter=lfs diff=lfs merge=lfs -text
2748
+ Security/Hackers[[:space:]]Beware.pdf filter=lfs diff=lfs merge=lfs -text
2749
+ Security/Hacking[[:space:]]-[[:space:]]Firewalls[[:space:]]And[[:space:]]Networks[[:space:]]How[[:space:]]To[[:space:]]Hack[[:space:]]Into[[:space:]]Remote[[:space:]]Computers.pdf filter=lfs diff=lfs merge=lfs -text
2750
+ Security/Hacking[[:space:]]Exposed[[:space:]]-[[:space:]]Network[[:space:]]Security[[:space:]]Secrets[[:space:]]&[[:space:]]Solutions,[[:space:]]2nd[[:space:]]Edition.pdf filter=lfs diff=lfs merge=lfs -text
2751
+ Security/Hacking[[:space:]]Exposed[[:space:]]Network[[:space:]]Security[[:space:]]Secrets[[:space:]]&[[:space:]]Solutions,[[:space:]]Third[[:space:]]Edition[[:space:]]ch1.pdf filter=lfs diff=lfs merge=lfs -text
2752
+ Security/Hacking[[:space:]]Exposed-Network[[:space:]]Security[[:space:]]-[[:space:]]Secrets[[:space:]]&[[:space:]]Solutions,[[:space:]]2nd[[:space:]]Ed..pdf filter=lfs diff=lfs merge=lfs -text
2753
+ Security/Hacking[[:space:]]Exposed-Network[[:space:]]Security[[:space:]]-[[:space:]]Secrets[[:space:]]&[[:space:]]Solutions,[[:space:]]3rd[[:space:]]Ed..pdf filter=lfs diff=lfs merge=lfs -text
2754
+ Security/Hacking[[:space:]]Exposed-Network[[:space:]]Security[[:space:]]-[[:space:]]Secrets[[:space:]]&[[:space:]]Solutions,[[:space:]]5th[[:space:]]Ed..chm filter=lfs diff=lfs merge=lfs -text
2755
+ Security/Hacking[[:space:]]Exposed-VoIP[[:space:]]-[[:space:]]Voice[[:space:]]over[[:space:]]IP[[:space:]]Security,[[:space:]]Secrets,[[:space:]]&[[:space:]]Solutions.chm filter=lfs diff=lfs merge=lfs -text
2756
+ Security/Hacking[[:space:]]Exposed-Web[[:space:]]2.0[[:space:]]-[[:space:]]Web[[:space:]]2.0[[:space:]]Security[[:space:]]Secrets[[:space:]]&[[:space:]]Solutions.pdf filter=lfs diff=lfs merge=lfs -text
2757
+ Security/Hacking[[:space:]]Exposed-Windows[[:space:]]-[[:space:]]Windows[[:space:]]Security[[:space:]]Secrets[[:space:]]&[[:space:]]Solutions,[[:space:]]3rd[[:space:]]Ed..pdf filter=lfs diff=lfs merge=lfs -text
2758
+ Security/Hacking[[:space:]]Exposed-Wireless[[:space:]]-[[:space:]]Wireless[[:space:]]Security[[:space:]]Secrets[[:space:]]&[[:space:]]Solutions.chm filter=lfs diff=lfs merge=lfs -text
2759
+ Security/Hacking[[:space:]]for[[:space:]]Dummies[[:space:]](2004).pdf filter=lfs diff=lfs merge=lfs -text
2760
+ Security/Hacking[[:space:]]the[[:space:]]Code[[:space:]]-[[:space:]]ASP.NET[[:space:]]Web[[:space:]]Application[[:space:]]Security[[:space:]]Cookbook[[:space:]](2004)[[:space:]].chm filter=lfs diff=lfs merge=lfs -text
2761
+ Security/Hacking[[:space:]]Windows[[:space:]]XP.pdf filter=lfs diff=lfs merge=lfs -text
2762
+ Security/Hacking-Hacker's[[:space:]]Guide.pdf filter=lfs diff=lfs merge=lfs -text
2763
+ Security/Hacking.For.Dummies.Access.To.Other.People's.System.Made.Simple.pdf filter=lfs diff=lfs merge=lfs -text
2764
+ Security/Hacking.Guide.V3.1.pdf filter=lfs diff=lfs merge=lfs -text
2765
+ Security/John[[:space:]]Wiley[[:space:]]&[[:space:]]Sons[[:space:]]-[[:space:]]Hacking[[:space:]]For[[:space:]]Dummies.pdf filter=lfs diff=lfs merge=lfs -text
2766
+ Security/John[[:space:]]Wiley[[:space:]]and[[:space:]]Sons.Hacking[[:space:]]GMail[[:space:]](ExtremeTech).pdf filter=lfs diff=lfs merge=lfs -text
2767
+ Security/John.Wiley.and.Sons.The.Art.of.Intrusion.The.Real.Stories.Behind.the.Exploits.of.Hackers.Intruders.and.Deceivers.Feb.2005.ISBN0764569597.pdf filter=lfs diff=lfs merge=lfs -text
2768
+ Security/Jon.Erickson.Hacking.The.Art.Of.Exploitation.No.Starch.Press.2003.chm filter=lfs diff=lfs merge=lfs -text
2769
+ Security/linux-server-hacks.pdf filter=lfs diff=lfs merge=lfs -text
2770
+ Security/Linux-Server.Hacks-OReilly.pdf filter=lfs diff=lfs merge=lfs -text
2771
+ Security/little_black_book_oc_computer_viruses.pdf filter=lfs diff=lfs merge=lfs -text
2772
+ Security/mac-os-hacks.chm filter=lfs diff=lfs merge=lfs -text
2773
+ Security/McGraw[[:space:]]Hill[[:space:]]-[[:space:]]Web[[:space:]]Applications[[:space:]](Hacking[[:space:]]Exposed).pdf filter=lfs diff=lfs merge=lfs -text
2774
+ Security/McGraw-Hill[[:space:]]-[[:space:]]Hacking[[:space:]]Exposed,[[:space:]]3rd[[:space:]]Ed[[:space:]]-[[:space:]]Hacking[[:space:]]Exposed[[:space:]]Win2.pdf filter=lfs diff=lfs merge=lfs -text
2775
+ Security/McGraw-Hill[[:space:]]-[[:space:]]Linux[[:space:]]and[[:space:]]Unix[[:space:]]Security[[:space:]]Portable[[:space:]]Reference.pdf filter=lfs diff=lfs merge=lfs -text
2776
+ Security/McGraw.Hacking.Exposed.Cisco.Networks.chm filter=lfs diff=lfs merge=lfs -text
2777
+ Security/McGraw.Hill.HackNotes.Linux.and.Unix.Security.Portable.Reference.eBook-DDU.pdf filter=lfs diff=lfs merge=lfs -text
2778
+ Security/McGraw.Hill.HackNotes.Network.Security.Portable.Reference.eBook-DDU.pdf filter=lfs diff=lfs merge=lfs -text
2779
+ Security/McGraw.Hill.HackNotes.Web.Security.Portable.Reference.eBook-DDU.pdf filter=lfs diff=lfs merge=lfs -text
2780
+ Security/McGraw.Hill.HackNotes.Windows.Security.Portable.Reference.eB.pdf filter=lfs diff=lfs merge=lfs -text
2781
+ Security/Mind[[:space:]]Hacks[[:space:]]-[[:space:]]Tips[[:space:]]&[[:space:]]Tricks[[:space:]]for[[:space:]]Using[[:space:]]Your[[:space:]]Brain.chm filter=lfs diff=lfs merge=lfs -text
2782
+ Security/No[[:space:]]Starch[[:space:]]Press[[:space:]]-[[:space:]]Hacking[[:space:]]The[[:space:]]Art[[:space:]]of[[:space:]]Exploitation[[:space:]]2nd[[:space:]]Edition.chm filter=lfs diff=lfs merge=lfs -text
2783
+ Security/No[[:space:]]Starch[[:space:]]Press[[:space:]]-[[:space:]]PGP[[:space:]]and[[:space:]]GPG[[:space:]]Email[[:space:]]for[[:space:]]the[[:space:]]Practical[[:space:]]Paranoid.pdf filter=lfs diff=lfs merge=lfs -text
2784
+ Security/O'Reilly[[:space:]]-[[:space:]]Online[[:space:]]Investing[[:space:]]Hacks.chm filter=lfs diff=lfs merge=lfs -text
2785
+ Security/O'Reilly[[:space:]]Security[[:space:]]and[[:space:]]Usability[[:space:]]Designing[[:space:]]Secure[[:space:]]Systems[[:space:]]that[[:space:]]People[[:space:]]Can[[:space:]]Use.chm filter=lfs diff=lfs merge=lfs -text
2786
+ Security/O'Reilly[[:space:]]Security[[:space:]]Power[[:space:]]Tools.pdf filter=lfs diff=lfs merge=lfs -text
2787
+ Security/O'Reilly.-.Network.Security.Hacks.chm filter=lfs diff=lfs merge=lfs -text
2788
+ Security/O_Reilly_-_Windows_XP_Hacks.chm filter=lfs diff=lfs merge=lfs -text
2789
+ Security/Oded_Goldreich-Foundations_of_Cryptography__Volume_2,_Basic_Applications(2009).pdf filter=lfs diff=lfs merge=lfs -text
2790
+ Security/Oded_Goldreich-Foundations_of_Cryptography__Volume_2,_Basic_Applications-Cambridge_University_Press(2009).pdf filter=lfs diff=lfs merge=lfs -text
2791
+ Security/OReilly[[:space:]][[:space:]]Google[[:space:]]Hacks,[[:space:]]1st[[:space:]]Edition2003.pdf filter=lfs diff=lfs merge=lfs -text
2792
+ Security/OReilly[[:space:]]-[[:space:]]Flickr[[:space:]]Hacks[[:space:]]Tips[[:space:]]and[[:space:]]Tools[[:space:]]for[[:space:]]Sharing[[:space:]]Photos[[:space:]]Online[[:space:]](Feb[[:space:]]2006).chm filter=lfs diff=lfs merge=lfs -text
2793
+ Security/Oreilly[[:space:]]Access[[:space:]]Hacks[[:space:]]Apr[[:space:]]2005.chm filter=lfs diff=lfs merge=lfs -text
2794
+ Security/Oreilly,[[:space:]]Paypal[[:space:]]Hacks[[:space:]](2004)[[:space:]]Ddu.chm filter=lfs diff=lfs merge=lfs -text
2795
+ Security/OReilly,.Digital.Video.Hacks.(2005).DDU.LotB.chm filter=lfs diff=lfs merge=lfs -text
2796
+ Security/OReilly,.IRC.Hacks.(2004).DDU.chm filter=lfs diff=lfs merge=lfs -text
2797
+ Security/oreilly,.visual.studio.hacks.(2005).ddu.lotb.chm filter=lfs diff=lfs merge=lfs -text
2798
+ Security/oreilly.firefox.hacks.ebook-lib.chm filter=lfs diff=lfs merge=lfs -text
2799
+ Security/OReilly.Google.Hacks.2nd.Edition.Dec.2004.ISBN0596008570.chm filter=lfs diff=lfs merge=lfs -text
2800
+ Security/OReilly.Google.Maps.Hacks.Jan.2006.chm filter=lfs diff=lfs merge=lfs -text
2801
+ Security/OReilly.Linux.Security.Cookbook.pdf filter=lfs diff=lfs merge=lfs -text
2802
+ Security/OReilly.Linux.Server.Hacks.Volume.Two.Dec.2005.chm filter=lfs diff=lfs merge=lfs -text
2803
+ Security/OReilly.PC.Hacks.Oct.2004.eBook-DDU.chm filter=lfs diff=lfs merge=lfs -text
2804
+ Security/OReilly.Skype.Hacks.Tips.and.Tools.for.Cheap.Fun.Innovative.Phone.Service.Dec.2005.chm filter=lfs diff=lfs merge=lfs -text
2805
+ Security/OReilly.SQL.Hacks.Nov.2006.chm filter=lfs diff=lfs merge=lfs -text
2806
+ Security/OReilly.Statistics.Hacks.May.2006.chm filter=lfs diff=lfs merge=lfs -text
2807
+ Security/OReilly.Ubuntu.Hacks.Tips.and.Tools.for.Exploring.Using.and.Tuning.Linux.Jun.2006.chm filter=lfs diff=lfs merge=lfs -text
2808
+ Security/OReilly.VoIP.Hacks.Tips.and.Tools.for.Internet.Telephony.Dec.2005.chm filter=lfs diff=lfs merge=lfs -text
2809
+ Security/oreilly.windows.xp.hacks.2nd.edition.feb.2005.lib.chm filter=lfs diff=lfs merge=lfs -text
2810
+ Security/OReilly.Word.Hacks.Oct.2004.eBook-DDU.chm filter=lfs diff=lfs merge=lfs -text
2811
+ Security/OSB.Ethical.Hacking.and.Countermeasures.EC.Council.Exam.312.50.Student.Courseware.eBook-LiB.chm filter=lfs diff=lfs merge=lfs -text
2812
+ Security/Que.Certified.Ethical.Hacker.Exam.Prep.Apr.2006.chm filter=lfs diff=lfs merge=lfs -text
2813
+ Security/Security[[:space:]]and[[:space:]]Hacking[[:space:]]-[[:space:]]Anti-Hacker[[:space:]]Tool[[:space:]]Kit[[:space:]]Second[[:space:]]Edition.chm filter=lfs diff=lfs merge=lfs -text
2814
+ Security/SoTayHacker1.0.chm filter=lfs diff=lfs merge=lfs -text
2815
+ Security/spidering-hacks.chm filter=lfs diff=lfs merge=lfs -text
2816
+ Security/Springer.Insider.Attack.and.Cyber.Security.Beyond.the.Hacker.Apr.2008.eBook-DDU.pdf filter=lfs diff=lfs merge=lfs -text
2817
+ Security/Springer.Networked.RFID.Systems.and.Lightweight.Cryptography.Dec.2007.pdf filter=lfs diff=lfs merge=lfs -text
2818
+ Security/Springer.Open.Source.Systems.Security.Certification.Nov.2008.eBook-DDU.pdf filter=lfs diff=lfs merge=lfs -text
2819
+ Security/SQL[[:space:]]Injection[[:space:]]Attacks[[:space:]]and[[:space:]]Defense.pdf filter=lfs diff=lfs merge=lfs -text
2820
+ Security/Stamp[[:space:]]M.,[[:space:]]Low[[:space:]]R.M.[[:space:]]Applied[[:space:]]cryptanalysis...pdf filter=lfs diff=lfs merge=lfs -text
2821
+ Security/Syngress[[:space:]]-[[:space:]]Hack[[:space:]]Proofing[[:space:]]Linux[[:space:]](2001).pdf filter=lfs diff=lfs merge=lfs -text
2822
+ Security/Syngress[[:space:]]-[[:space:]]Hacking[[:space:]]a[[:space:]]Terror[[:space:]]Network.[[:space:]]The[[:space:]]Silent[[:space:]]Threat[[:space:]]of[[:space:]]Covert[[:space:]]Channels.pdf filter=lfs diff=lfs merge=lfs -text
2823
+ Security/Syngress[[:space:]]--[[:space:]]Hack[[:space:]]Proofing[[:space:]]Your[[:space:]]Wireless[[:space:]]Network.pdf filter=lfs diff=lfs merge=lfs -text
2824
+ Security/Syngress[[:space:]]Hack[[:space:]]Proofing[[:space:]]Your[[:space:]]Identity[[:space:]]in[[:space:]]the[[:space:]]Information[[:space:]]Age.pdf filter=lfs diff=lfs merge=lfs -text
2825
+ Security/Syngress.Buffer.Overflow.Attacks.Dec.2004.eBook-DDU.pdf filter=lfs diff=lfs merge=lfs -text
2826
+ Security/Syngress.Coding.for.Penetration.Testers.Oct.2011.pdf filter=lfs diff=lfs merge=lfs -text
2827
+ Security/Syngress.Hack.the.Stack.Oct.2006.pdf filter=lfs diff=lfs merge=lfs -text
2828
+ Security/Syngress.Hacking.a.Terror.Network.Nov.2004.ISBN1928994989.pdf filter=lfs diff=lfs merge=lfs -text
2829
+ Security/Syngress.Penetration.Testers.Open.Source.Toolkit.3rd.Edition.Aug.2011.pdf filter=lfs diff=lfs merge=lfs -text
2830
+ Security/Syngress.The.Basics.of.Hacking.and.Penetration.Testing.Aug.2011.pdf filter=lfs diff=lfs merge=lfs -text
2831
+ Security/The_Business_of_Cybercrime.pdf filter=lfs diff=lfs merge=lfs -text
2832
+ Security/tivo-hacks.100-industrial-strength-tips-and-tools.pdf filter=lfs diff=lfs merge=lfs -text
2833
+ Security/u23_Wiley[[:space:]]-[[:space:]]Hacking[[:space:]]GPS[[:space:]]-[[:space:]]2005[[:space:]]-[[:space:]](By[[:space:]]Laxxuss).pdf filter=lfs diff=lfs merge=lfs -text
2834
+ Security/Websters.New.World.Websters.New.World.Hacker.Dictionary.Sep.2006.pdf filter=lfs diff=lfs merge=lfs -text
2835
+ Security/Wiley-Principles.of.Computer.Security.2010.RETAiL.EBook.pdf filter=lfs diff=lfs merge=lfs -text
2836
+ Security/Wiley.Hacking.Firefox.More.Than.150.Hacks.Mods.and.Customizations.Jul.2005.eBook-DDU.pdf filter=lfs diff=lfs merge=lfs -text
2837
+ Security/Wiley.Hacking.Google.Maps.and.Google.Earth.Jul.2006.pdf filter=lfs diff=lfs merge=lfs -text
2838
+ Security/Wiley.Hacking.GPS.Mar.2005.ISBN0764598805.pdf filter=lfs diff=lfs merge=lfs -text
2839
+ Security/Wiley.Implementing.Email.and.Security.Tokens.May.2008.pdf filter=lfs diff=lfs merge=lfs -text
2840
+ Security/Wiley.Lifehacker.Dec.2006.pdf filter=lfs diff=lfs merge=lfs -text
2841
+ Security/Wiley.Secure.Computer.and.Network.Systems.Modeling.Analysis.and.Design.Mar.2008.pdf filter=lfs diff=lfs merge=lfs -text
2842
+ Security/Wiley.The.Database.Hackers.Handbook.Defending.Database.Servers.chm filter=lfs diff=lfs merge=lfs -text
2843
+ Security/Windows[[:space:]]Server[[:space:]]Hacks.chm filter=lfs diff=lfs merge=lfs -text
2844
+ Security/Yahoo.Hacks.Oct.2005.chm filter=lfs diff=lfs merge=lfs -text
Security/(Ebook - Computer) Hacking The Windows Registry.pdf ADDED
Binary file (227 kB). View file
 
Security/(eBook - PDF) Hugo Cornwall - The Hacker's Handbook .pdf ADDED
Binary file (285 kB). View file
 
Security/0321108957.Addison-Wesley Professional.Honeypots- Tracking Hackers.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:4da0b5c8c9a95384c54e289fa9bda1e6e2d73663aabdb71148f4b97d46ba844d
3
+ size 2239424
Security/285063-Hacker.Bibel.[278.kB_www.netz.ru].pdf ADDED
Binary file (285 kB). View file
 
Security/3077366-HackerHighSchool.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:aacc59b474017f6c70140f2587d1dcf4ee492b49750a2a0f75786a406eb03702
3
+ size 3077366
Security/731986-Hacker's Desk Reference.pdf ADDED
Binary file (732 kB). View file
 
Security/Addison Wesley - Hackers Delight 2002.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:d1ca4f349b2edc9507266f56e14109e17be5d16f00f92e005aa8fae0ddfd2879
3
+ size 6355478
Security/Addison Wesley, The Outlook Answer Book Useful Tips Tricks And Hacks (2005) Bbl Lotb.chm ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:d96e57046a21d8a3c51b7d1bd0c68e557734cf4de0c328c4ba96271526be82bf
3
+ size 14848935
Security/Ahmad-Reza_Sadeghi,_David_Naccache,_Pim_Tuyls-Towards_Hardware-Intrinsic_Security__Foundations_and_Practice_(Information_Security_and_Cryptography)(2010).pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:1326774aa4811c56306e37ed24969f7fc0083de61c132437946330bdac920ecb
3
+ size 8355940
Security/Attacking the DNS Protocol.pdf ADDED
Binary file (330 kB). View file
 
Security/Auerbach.Practical.Hacking.Techniques.and.Countermeasures.Nov.2006.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:c6a0a407b25a9851adc6de44dd2b31d6f8b8a3ee562e957f72f213ca0c5dc762
3
+ size 150959943
Security/Auerbach.Pub.The.Hackers.Handbook.The.Strategy.Behind.Breaking.into.and.Defending.Networks.Nov.20.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:6c59de7e094691167df230cf0e662e12d47310ae9398b97c8a3630ad83c1984c
3
+ size 18949650
Security/Botnets - The killer web applications.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:b590da6fb1e933c750b961d4540e2ad324f42e763ee44a55c532cf7b232d9646
3
+ size 7318417
Security/Certified Ethical Hacker (CEH) v3.0 Official Course.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:5468ba4dcb6f047dd8f1800044e1cff279ec453b4ddba0cdabacf1f94b648903
3
+ size 27144726
Security/Charles.C.Thomas-Document.Security.Protecting.Physical.and.Electronic.Content.2007.RETAiL.EBook.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:80c66adf2b455ab057bd914f2e8e16ff77359a50be2da4000170f831a733ca1b
3
+ size 1397278
Security/Computer - Hackers Secrets - e-book.pdf ADDED
Binary file (504 kB). View file
 
Security/Cracking_Passwords_Guide.pdf ADDED
Binary file (278 kB). View file
 
Security/Credit.Card.Visa.Hack.Ucam.Cl.Tr.560.[223.kB_www.netz.ru].pdf ADDED
Binary file (229 kB). View file
 
Security/Cross Site Scripting Attacks Xss Exploits and Defense.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:7f0e6872e20523232805eea516b10b433c2b304b29afcc81d878a8eac9a8cfa8
3
+ size 7696778
Security/DangerousGoogle-SearchingForSecrets.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:d0ebe99f6fe8ebb6a5d1ac234476d11424ad83651a48408496464f7561f7435e
3
+ size 2210027
Security/Dummies - Hack How To Create Keygens (1).pdf ADDED
Binary file (9.83 kB). View file
 
Security/For.Dummies.Hacking.Wireless.Networks.For.Dummies.Sep.2005.eBook-DDU.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:bdd453401f2dc342f04371a6968cd16a0453f8aab30bcaffd0cfe829f67ea15c
3
+ size 11501893
Security/Gray Hat Hacking~The Ethical Hacker's Handbook, 3e [2011].pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:976ee6efc98b807ceee03c2e79bdc27e58ab9d0ab6e70944ed53d941574263a2
3
+ size 12800878
Security/Hack IT Security Through Penetration Testing.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:a0c7da704604ac6d78e0252b4701e9a872875dd80dde936177b9b1909f641305
3
+ size 12864873
Security/Hack Proofing Linux A Guide to Open Source Security - Stangler, Lane - Syngress - ISBN 1-928994-34-2.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:33c5e8e2d796e68e8810ec385ec86089dcaca7dfb4fe66f431a2a98b7964050e
3
+ size 12388348
Security/Hack Proofing Sun Solaris 8.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:4e70bd69db70c42d541ad8b9f0332ba3991e739931d3ae3b5c35c2326cce1324
3
+ size 7125013
Security/Hack Proofing Your E-Commerce Site.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:e3c1100004cde4a49f6ad47e367cc980d3faea87c24c413e03871b4fed767018
3
+ size 7697336
Security/Hack Proofing Your Network Second Edition.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:296a38af7874c121869343267630dbf56380f77153448f67132c97a4984c5b4e
3
+ size 9195049
Security/Hack Proofing Your Network_First Edition.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:419b202b033da7760768fefcbbb6bcdab4c7700ce8d69278b2210d69b03d42c6
3
+ size 3091540
Security/Hack Proofing Your Web Applications.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:efc26d1b92256bbbbc69b23a49c6372ce609ca0ed004f5c6cc5fc866d32efa2a
3
+ size 9024080
Security/Hack_Attacks_Revealed_A_Complete_Reference_With_Custom_Security_Hacking_Toolkit.chm ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:87185f0e8fb89637609ed7ccf0e8eaf84a1013e3d61f9d7ce13e14f71c2136b8
3
+ size 6605780
Security/Hack_IT_Security_Through_Penetration_Testing.chm ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:ae58ce52a8a8ef3c86db16b71c8d010a6ac27258bbe5452d5b867ddb9e9f0b1f
3
+ size 4801725
Security/Hacker Disassembling Uncovered.chm ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:6e2aea62c5c5aaf27c10acd2c94477d781a547080baa7d5677212ab5c923186f
3
+ size 4950673
Security/Hacker Linux Uncovered.chm ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:90a868bc1fd4631dbf738999ae2e75818f49e32a7e1f67f8261207a3cd93f56e
3
+ size 4681808
Security/Hacker Web Exploitation Uncovered.chm ADDED
Binary file (568 kB). View file
 
Security/Hacker'S.Delight.chm ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:4b35c50c579092f84b1715b2664240d4ac643cd5fca6b0254e3abba1bbf790c6
3
+ size 2212948
Security/HackerMonthly/hackermonthly-issue001.zip ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:3f02e6022bda0d770b4d08a17a1fa7bfcfe9a4bf6b685b1ed0cce3b259a61eeb
3
+ size 3625524
Security/HackerMonthly/hackermonthly-issue002.zip ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:396c114db087473e8c552c4a8012fa25f53c6d3dae821ea29c6cbf2418b583f8
3
+ size 4679178
Security/HackerMonthly/hackermonthly-issue003.zip ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:8646061c50a322b44a9fa4008aac2132c6ec6dc0011e2a1801b941714771977e
3
+ size 3464440
Security/HackerMonthly/hackermonthly-issue004.zip ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:31f2f8cf77c8f56df673cacddd2b8d2deef60cc13af426ae0bf5dfb05e203435
3
+ size 8043047
Security/HackerMonthly/hackermonthly-issue005.zip ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:eeb87cea61fe84ce7dc89fc3f37127ad6ad69a6b76aeeffbeb1f45554ff93a01
3
+ size 4281970
Security/HackerMonthly/hackermonthly-issue006.zip ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:9d8f667620787a38ba6971757e336264c6b1492893053f595715f64045125141
3
+ size 4668462
Security/HackerMonthly/hackermonthly-issue007.zip ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:ddedd5b84bebef62b7f78dd3c7cf48828cf50f384ca6edd32f8c9ed4411c3c3b
3
+ size 6182658
Security/HackerMonthly/hackermonthly-issue008.zip ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:504ce8db482ca31e664ebfceb2cc507e3d3ee3f5d39979f0954a478decb7dd0f
3
+ size 7283366
Security/HackerMonthly/hackermonthly-issue009.zip ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:c6c3b0921a090f0aa6ef5cf5804adeaaf6244ba726d7983ae2bf31b430b8a55c
3
+ size 12729320
Security/HackerMonthly/hackermonthly-issue010.zip ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:007ada42fe68be178bdc4928d93556c8f551b39176a3c701116f307de0383bc6
3
+ size 8453236
Security/HackerMonthly/hackermonthly-issue011.zip ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:514be8447ff2369c837961f124c0a61e016c5529c0974868037472f47a0888c4
3
+ size 15527961
Security/HackerMonthly/hackermonthly-issue012.zip ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:6af863b01c23e6f13dc46855f2d2116a89d3b00304a447422e442e666726cec1
3
+ size 6781563
Security/HackerMonthly/hackermonthly-issue013.zip ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:773577048e3ebf8c2fa0f7360bb2b59abd918f2754d114555fc5d8ff1df51094
3
+ size 4249689