- Beginning JavaScript 4th Edition
- The Hacker Underground Handbook
- The Web Application Hackers Handbook
- Writing Security Tools and Exploits
- Shell Scripting
- Cryptography and Network Security Principle and Practice 5th Edition
- Nmap Cookbook
- Computer Forensics for Dummies
- Raspberry Pi Hacks
- Raspberry Pi Hacking
- The Art of Memory Forensics
- EnCase Computer Forensics The Official EnCE EnCase Certified Examiner
- Computer Incident Response and Forensics Team Management
- Computer Forensics JumpStart
- Hacking Exposed Computer Forensics Secret and Solutions
- Guide to Computer Forensics and Investigations 3rd Edition
- Cyber Crime Investigations
- Computer Forensics an Essential Guide for Accountants, Lawyers, and Manager
- Practical Malware Analysis
- Privacy Protection and Computer Forensics Second Edition
- Incident Response and Computer Forensics
- Computer Forensics for Dummies
- Scene of the Cybercrime
- Computer Forensics and Cyber Crime, An Introduction
- Digital Forensics and Cyber Crime
- Computer Forensics Evidence Collection and Management
- Emerging Technology Programs ADM Hybrids Computer Forensics
- eForensics Magazine
- Network Security Essentials: Applications and Standards Fourth Edition
- Zero to Blogger in 30 Days
- WordPress To Go How to Build A WordPress Website On Your Own Domain From Scratch
- Windows 8 or Dummies - Pocket Edition
- Web Security A WhiteHat Perspective
- Web Hosting Guide To Setting Up An Effective Website
- Web Animation using JavaScript Develop & Design
- Top Tips For Building Landing Websites That Convert Like Crazy
- The Ultimate SAP User Guide The Essential SAP Training Handbook for Consultants and Project Teams
- The New MacBook A Guide for Beginners - Matthew Hollinder
- The Complete Guide to Digital Graphic Design
- The Apple TV Crash Course
- Teach Yourself VISUALLY iPhoto for iPad
- Switching from Windows to Mac
- Straightforward statistic using Excel and Tableau A hands-on guide by Stephen Peplow
- Stop Facebook from Spying on You and Other Ways to Protect Your Online Privacy
- Smart Phones by Nishant Baxi
- Python Web Hacking Essentials
- Python System Hacking Essentials
- Python Network Hacking Essentials
- Python Application Hacking Essential
- Programming Arduino Getting Started with Sketches
- Principles of LED Light Communications Toward Networked Li-Fi
- Off the Network Disrupting the Digital World (Electronic Mediations)
- NoSQL For Dummies
- MacBook Pro For Seniors
- MacBook Pro For Beginners
- Linux Hacker by Mr Ajay Kumar Tiwari
- Linux Command Line and Shell Scripting Bibles by Richard Blum
- Learning System Center App Controller by Nasir Naeem
- Learning Raspbian by William Harrington
- Learning PHP and MySQL by Knowledge flow
- Learning MySQL and MariaDB Heading in the Right Direction with MySQL and MariaDB
- Internet Security Everyday Internet Security Tips
- A Smarter Way to Learn HTML & CSS learn it faster
- Adobe InDesign CC Classroom in a Book
- Android App Development for Dummies
- Android SQLite Essentials
- AngularJS Web Application Development Blueprint
- Anurag - Hacking With Experts
- App Trillionaires How to Become an App Developer
- Big Book of Windows Hacks
- Build a Security Culture Fundamentals Series
- C++ Programming From Problem Analysis to Programming Design
- Computer Hacking
- Computer Repair Service
- Cool Tech
- Data Flow Diagramming by Example
- Developing Games With Ruby
- Digital Color in Graphic Design
- Digital FIR Band-pass Filter Design
- Digital FIR Low-Pass Filter Design
- Digital IIR Low-Pass Filter Design
- Digital Marketing using Google Services Make Your Website Visible on Google Search
- Digital Shift The Cultural Logic of Punctuation
- Email Survival Skills Survival Tips Compatible with Microsoft Microsoft Outlook 2010 & 2013
- Excel VBA 24-Hour Trainer
- Getting a Big Data Job For Dummies
- Hack-X-Crypt A Straight Forward Guide Towards Ethical Hacking And Cyber Security
- Hacking Guide to Basic Security, Penetration Testing and Everything Else Hacking - Isaac Sharpe
- Headphones Buyer's Guide 2015 by Matthew Hollinder
- HL7 For Busy Professionals Your No Sweat Guide to Understanding HL7 - Rahul Bhagat - 2015
- Learning Image Processing with OpenCV by Gloria Bueno Garcia
- Learning C++ by Creating Games with UE4 by William Sherif
- Learning C By Example - Agus Kurniawan
- Learning Android Application Testing by Paul Blundell
- Learning Photoshop CC With Pictures The Visual & Fast Way to Learn Photoshop by Monia Mier.
- JMP 12 Scripting Guide - SAS Institute
- Java All-in-One For Dummies 4th Edition
- iPhone 6 For Senior 2015 by Matthew Hollinder
- iPad mini For Dummies, 3rd Edition - Edward C. Baig, Bob LeVitus 2015
- iPad All-in-One for Dummies, 7th Edition Nancy C Muir
- Idiot's Guides 3D Printing by Cameron Coward
- How to update your PC BIOS in 3 easy steps by Wim Bervoets 2015
- How to design a computer program tips by M Mubashar
- Encyclopedia of Information Science and Technology 4th Revised Edition
- Toshiba Satellite E105-S1802
- Toshiba DMF82XKU
- Lenovo Smart Display SD-8501F
- Lenovo H4 Series Machine type: 10059/7723, 10060/7724, 10068/7752
- Epson WF-2760
- DigiTech XC4881
- Samsung Galaxy SCH-S738C
- Digital Fundamentals
- Digital Fundamentals 10th Edition Solution Manual
- Do It Yourself, Manual
- Windows 10 Step by Step
- Abusing the Internet of Things - Blackouts, Freakouts, and Stakeouts - 1st Edition (2015)
- Computer Hacking Forensics Investigation (CHFI) Power Point
- Investigate Cyber Crime Part 1
- Investigate Cyber Crime Part 2
- eForensics Magazines
- Bring Your Own Device Research Paper 2013
- Professional Android 4 Application Development
- A cyber forensics ontology creating a new approach to studying cyber forensics
- A Practical Guide to Computer Forensics Investigations
- Android Application Development Cookbook 93 Recipes for Building Winning Apps
- Architecting the Internet of Things - D. uckelmann,. et al., (Springer, 2011)
- Open Source Digital Forensics Tools: The Legal Argument
- Computer Forensics An Essential Guide for Accountants, Lawyers, and Managers
- Computer Forensics and Cyber Crime, An Introduction - Britz, Marjie T.
- Computer Forensics Evidence Collection and Management - Robert C. Newman
- Computer Forensics for Dummies
- Computer Forensics with FTK - Carbone, Fernando
- Computer Incident Response and Forensics Team Management - Recent 2014
- Computer_Forensics_JumpStart_(2nd_Edition)
- Cyber Crime Investigations
- CSS3 The Missing Manual, 3rd Edition
- Digital Archaeology
- Digital Forensics and Cyber Crime Roger M., & Seigfried-Speller K. C. (October 25-26, 2012)
- Emerging Technology Programs ADM Hybrids Computer Forensics and MEMS
- EnCase Computer Forensics The Official EnCE EnCase Certified Examiner Study Guide, 3rd Edition
- Ethics in Information Technology, 5th ed.
- File System Forensics Analysis
- Forensics with Open Source Tools
- Guide to Computer Forensics and Investigations 3rd ed - B. Nelson
- Hacking Exposed Computer Forensics Secrets & Solutions
- Huawei Enterprise BYOD Solution Brochure
- Incident Response & Computer Forensics (2014) 3rd Ed.
- Investigating and prosecuting cybercrime forensics dependencies and barriers to justice
- Kali Linux Cookbook
- Learning Android Forensics
- Prentice-Hall Network Forensics
- Press Practical Malware Analysis
- Privacy Protection and Computer Forensics Second Edition - Foundation
- Professional Android 4 Application Development
- Protecting Enterprise Information on Mobile Devices, Using Managed Information Containers
- Registry Forensics
- Security Issues in Mobile NFC Devices
- Shelton Mobile Forensics
- Syngress Windows Forensic Analysis Toolkit 3rd Edition.pdf
- The Art of Memory Forensics
- The Future of Cyber Criminology Challenges and Opportunities
- iPAD: A Magical And Revolutionary Guide
- Wiley Computer Forensics for Dummies
- Windows 10 Troubleshooting (2016)
- Windows Networking Troubleshooting by Mike Halsey
- Windows Registry Forensics
- Adobe Creative Suite 6 Production Premium Classroom in a Book
- Photographic Composition - Principles Of Image Design
- Photoshop For Beginners - Everything You Need to Get Started with Adobe Photoshop
- Practical Linux Infrastructure
- Programming eBooks
- Beginning Programming with C For Dummies (epub)
- Customizing the Shell Prompt
- Welcome to Shell
- Listing Files And Understanding Ls Output
- Scheduling Repeated Jobs With Cron
- File and Directory Permissions Explained - Text
- File and Directory Permissions Explained
- Switching Users and Running Commands as Others - Text
- Switching Users and Running Commands as Others
- Umask Modes
- Permission modes
- Interactive and Non-interactive Shell Sessions
- Gbps Non-Imaging MIMO-OFDM Scheme based VLC over Indoor Lighting LED Arrangements
VectorKernel - PoCs For Kernelmode Rootkit Techniques Research
-
PoCs for Kernelmode rootkit techniques research or education. Currently
focusing on Windows OS. All modules support 64bit OS only.
*NOTE*
Some modules ...
21 hours ago