کتاب های من (اگر خواستید میفرستم براتون)
دوشنبه, ۷ بهمن ۱۴۰۴، ۱۱:۳۶ ق.ظ
باتوجه به اینکه دسترسی به منابع و کتاب های آموزشی این مدت کمی سخت تر شده این لیست کتاب هایی هست که من به صورت فایلی دارم و اکثرشون مرتبط با حوزه کامپیوتر هستند . اگر موردیش به دردتون میخورد میتونم براتون بفرستم :
12_CSE141-MBT-Virtual-Memory.ppt.pdf
1.Simon Singh - The code book_ the science of secrecy from ancient Egypt to quantum cryptography (2000, Anchor Books).pdf
21013-shellcoding-in-linux.pdf
28475-linux-stack-based-buffer-overflows.pdf
28476-linux-format-string-exploitation.pdf
Al Sweigart - Cracking Codes with Python_ An Introduction to Building and Breaking Ciphers (2018, No Starch Press) - libgen.li.pdf
Android App Reverse Engineering 101 _ Learn to reverse engineer Android applications!.pdf
An Introduction to Mathematical Cryptography.pdf
Anthony Shaw - CPython Internals_ Your Guide to the Python 3 Interpreter-Real Python (2021).pdf
Apress.Learn.Kotlin.for.Android.Development..www.EBooksWorld.ir.pdf
ArtOfAssembly.pdf
assembly64.pdf
Assembly.Language.For_.x86.Processors.Kip_.R..Irvine..6ed.Prentice.Hall_.2011www.xuexi111.com_.pdf
AVR Microcontroller and Embedded Systems by Mazidi.pdf
Basics of Windows shellcode writing _ Ring 0x00.pdf
Bill Blunden - The Rootkit Arsenal_ Escape and Evasion in the Dark Corners of the System-Jones & Bartlett Publishers (2009).pdf
book.pdf
Bruce Dang, Alexandre Gazet, Elias Bachaalany, Sébastien Josse - Practical reverse engineering_ x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation-Wiley (2014).pdf
Capturing WPA_WPA2 Handshake _ Cracking Principles [CYBERPUNK ].pdf
Computer Architecture, Sixth Edition A Quantitative Approach by John L. Hennessy, David A. Patterson.pdf
ComputerFundamentals.pdf
Computer System Architecture (3rd Ed) by M Morris Mano.pdf
C++ Reversing.pdf
Crypto101.pdf
D1T2 - Taking Ghidra to The Next Level - Zhanzhao Ding.pdf
dokumen.pub_prompt-engineering-for-generative-ai-9781098153434.pdf
Eldad Eilam - Reversing_ secrets of reverse engineering-Wiley (2005).pdf
elf file format.pdf
embedded_pmode.pdf
Ferrante_Auriemma_Exploiting_Game_Engines.pdf
File System Forensic Analysis (1).pdf
Game Hacking - Developing Autonomous Bots For Online Games (2016).pdf
___ General Purpose Hash Function Algorithms - By Arash Partow ___.pdf
Ghidra Server README.pdf
GMLTutorialv6.pdf
Hackers Delight.pdf
Hacking- The Art of Exploitation (2nd ed. 2008) - Erickson.pdf
How to write a display manager _ gsgx.pdf
idapro.pdf
Jasper van Woudenberg, Colin O'Flynn - The Hardware Hacking Handbook_ Breaking Embedded Security with Hardware Attacks-No Starch Press (2021).pdf
John Boxall - AVR Workshop_ A Hands-On Introduction with 60 Projects-No Starch Press (2022).pdf
John the Ripper - wordlist rules syntax.pdf
Jordan Hatcher - Break WiFi with Python.pdf
Joshua Saxe, Hillary Sanders - Malware Data Science_ Attack Detection and Attribution-No Starch Press (2018).pdf
Jozve-0-ta-100-AVR-V3.pdf
learn_gml.pdf
lec11_x86arch.pdf
Libpcap_libnet.pdf
LPIC-2_LPIC_Study_Guide(2016).pdf
Make_-AVR-Programming_-Learning-to-Write-Software-for-Hardware-PDFDrive-.pdf
Make - Electronics.pdf
mdmz_book.pdf
Menezes.pdf
Metasploit.tutorial_Part.1.pdf
Metasploit.tutorial_Part.2.pdf
Metasploit.tutorial_Part.3.pdf
Metasploit.tutorial_Part.4.pdf
Modular Arithmetic and the Diffie-Hellman Algorithm _ Aleksandr Hovhannisyan.pdf
MTCNA Study Guide.pdf
No.Starch.Attacking.Network.Protocols.2017.pdf
No.Starch.Practical.Packet.Analysis.3rd.Edition.2017.pdf
number_representation.pdf
obfuscation.pdf
OpenRCE_C++ reversing.pdf
os-dev.pdf
paging.pdf
pe101l.pdf
PE Format - Win32 apps Microsoft Learn.pdf
practical-forensic-imaging.pdf
Practical-IoT-Hacking-The-Definitive-Guide-to-Attacking-the-Internet-of-Things-by-Chantzis,-Fotios,-Stais,-Ioannis,-Calderon,-Paulino,-Deirmentzoglou,-Evangelos,-Woods,-Beau-(bibis.ir).pdf
Practical-Malware-Analysis.pdf
Practical_Video_Game_Bots (1).pdf
Process Injection Part 1_ The Theory - Secarma_ Penetration Testing and Cybersecurity Company.pdf
Pro.C++.Programmin(irenx.ir).pdf
PWK-Penetration-Testing-with-Kali-Linux.pdf
Riaziat.pdf
Rootkits and Bootkits.pdf
rubik (1).pdf
rubik.pdf
sec16_paper_andriesse.pdf
security+.pdf
Shannon_Claude_E_Weaver_Warren_The_Mathematical_Theory_of_Communication_1963.pdf
shannon-secrecy.pdf
Shellcoding for Linux and Windows Tutorial.pdf
Shiva V. N. Parasram - Digital Forensics with Kali Linux_ Enhance your investigation skills by performing network and memory forensics with Kali Linux (2023, Packt Publishing) - libgen.li.pdf
silence.on.the.wire.pdf
Sound Pattern Recognition with Python _ by Adilson Neto _ Medium.pdf
SRF04.pdf
structures in NASM.pdf
SwitchOptimization.pdf
Sybex - CCNA Security Study Guide Exam 210-260.pdf
[Tech Today] Stephanie Domas, Christopher Domas - x86 Software Reverse-Engineering, Cracking, and Counter-Measures (2024, Wiley) - libgen.li.pdf
The Art of Memory Forensics - Detecting Malware and Threats in Windows, Linux, and Mac Memory (2014).pdf
The CodeBreakers - Kahn David.pdf
the.ghidra.book.pdf
the_hitchhiker_s_guide_to_the_galaxy.pdf
the-numbers-behind-numb3rs-solving-crime-with-mathematics..pdf
The Shellcoder’s Handbook.pdf
the web application hackers handbook(www.camelcase.ir).pdf
Understanding how function call works.pdf
us-19-Kotler-Process-Injection-Techniques-Gotta-Catch-Them-All.pdf
Violent_Python_A_Cookbook_for_Hackers.pdf
VoiPing-VoIP-for-Dummies.pdf
web-hacking-101(1).pdf
win32asm_tutorial.pdf
win32-shellcode (1).pdf
win32-shellcode.pdf
Windows_Security_Internals_A_Deep_Dive_into_Windows_Authentication.pdf
x86-64bit-ccc-chapter.pdf
xorpd.pdf
1.Simon Singh - The code book_ the science of secrecy from ancient Egypt to quantum cryptography (2000, Anchor Books).pdf
21013-shellcoding-in-linux.pdf
28475-linux-stack-based-buffer-overflows.pdf
28476-linux-format-string-exploitation.pdf
Al Sweigart - Cracking Codes with Python_ An Introduction to Building and Breaking Ciphers (2018, No Starch Press) - libgen.li.pdf
Android App Reverse Engineering 101 _ Learn to reverse engineer Android applications!.pdf
An Introduction to Mathematical Cryptography.pdf
Anthony Shaw - CPython Internals_ Your Guide to the Python 3 Interpreter-Real Python (2021).pdf
Apress.Learn.Kotlin.for.Android.Development..www.EBooksWorld.ir.pdf
ArtOfAssembly.pdf
assembly64.pdf
Assembly.Language.For_.x86.Processors.Kip_.R..Irvine..6ed.Prentice.Hall_.2011www.xuexi111.com_.pdf
AVR Microcontroller and Embedded Systems by Mazidi.pdf
Basics of Windows shellcode writing _ Ring 0x00.pdf
Bill Blunden - The Rootkit Arsenal_ Escape and Evasion in the Dark Corners of the System-Jones & Bartlett Publishers (2009).pdf
book.pdf
Bruce Dang, Alexandre Gazet, Elias Bachaalany, Sébastien Josse - Practical reverse engineering_ x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation-Wiley (2014).pdf
Capturing WPA_WPA2 Handshake _ Cracking Principles [CYBERPUNK ].pdf
Computer Architecture, Sixth Edition A Quantitative Approach by John L. Hennessy, David A. Patterson.pdf
ComputerFundamentals.pdf
Computer System Architecture (3rd Ed) by M Morris Mano.pdf
C++ Reversing.pdf
Crypto101.pdf
D1T2 - Taking Ghidra to The Next Level - Zhanzhao Ding.pdf
dokumen.pub_prompt-engineering-for-generative-ai-9781098153434.pdf
Eldad Eilam - Reversing_ secrets of reverse engineering-Wiley (2005).pdf
elf file format.pdf
embedded_pmode.pdf
Ferrante_Auriemma_Exploiting_Game_Engines.pdf
File System Forensic Analysis (1).pdf
Game Hacking - Developing Autonomous Bots For Online Games (2016).pdf
___ General Purpose Hash Function Algorithms - By Arash Partow ___.pdf
Ghidra Server README.pdf
GMLTutorialv6.pdf
Hackers Delight.pdf
Hacking- The Art of Exploitation (2nd ed. 2008) - Erickson.pdf
How to write a display manager _ gsgx.pdf
idapro.pdf
Jasper van Woudenberg, Colin O'Flynn - The Hardware Hacking Handbook_ Breaking Embedded Security with Hardware Attacks-No Starch Press (2021).pdf
John Boxall - AVR Workshop_ A Hands-On Introduction with 60 Projects-No Starch Press (2022).pdf
John the Ripper - wordlist rules syntax.pdf
Jordan Hatcher - Break WiFi with Python.pdf
Joshua Saxe, Hillary Sanders - Malware Data Science_ Attack Detection and Attribution-No Starch Press (2018).pdf
Jozve-0-ta-100-AVR-V3.pdf
learn_gml.pdf
lec11_x86arch.pdf
Libpcap_libnet.pdf
LPIC-2_LPIC_Study_Guide(2016).pdf
Make_-AVR-Programming_-Learning-to-Write-Software-for-Hardware-PDFDrive-.pdf
Make - Electronics.pdf
mdmz_book.pdf
Menezes.pdf
Metasploit.tutorial_Part.1.pdf
Metasploit.tutorial_Part.2.pdf
Metasploit.tutorial_Part.3.pdf
Metasploit.tutorial_Part.4.pdf
Modular Arithmetic and the Diffie-Hellman Algorithm _ Aleksandr Hovhannisyan.pdf
MTCNA Study Guide.pdf
No.Starch.Attacking.Network.Protocols.2017.pdf
No.Starch.Practical.Packet.Analysis.3rd.Edition.2017.pdf
number_representation.pdf
obfuscation.pdf
OpenRCE_C++ reversing.pdf
os-dev.pdf
paging.pdf
pe101l.pdf
PE Format - Win32 apps Microsoft Learn.pdf
practical-forensic-imaging.pdf
Practical-IoT-Hacking-The-Definitive-Guide-to-Attacking-the-Internet-of-Things-by-Chantzis,-Fotios,-Stais,-Ioannis,-Calderon,-Paulino,-Deirmentzoglou,-Evangelos,-Woods,-Beau-(bibis.ir).pdf
Practical-Malware-Analysis.pdf
Practical_Video_Game_Bots (1).pdf
Process Injection Part 1_ The Theory - Secarma_ Penetration Testing and Cybersecurity Company.pdf
Pro.C++.Programmin(irenx.ir).pdf
PWK-Penetration-Testing-with-Kali-Linux.pdf
Riaziat.pdf
Rootkits and Bootkits.pdf
rubik (1).pdf
rubik.pdf
sec16_paper_andriesse.pdf
security+.pdf
Shannon_Claude_E_Weaver_Warren_The_Mathematical_Theory_of_Communication_1963.pdf
shannon-secrecy.pdf
Shellcoding for Linux and Windows Tutorial.pdf
Shiva V. N. Parasram - Digital Forensics with Kali Linux_ Enhance your investigation skills by performing network and memory forensics with Kali Linux (2023, Packt Publishing) - libgen.li.pdf
silence.on.the.wire.pdf
Sound Pattern Recognition with Python _ by Adilson Neto _ Medium.pdf
SRF04.pdf
structures in NASM.pdf
SwitchOptimization.pdf
Sybex - CCNA Security Study Guide Exam 210-260.pdf
[Tech Today] Stephanie Domas, Christopher Domas - x86 Software Reverse-Engineering, Cracking, and Counter-Measures (2024, Wiley) - libgen.li.pdf
The Art of Memory Forensics - Detecting Malware and Threats in Windows, Linux, and Mac Memory (2014).pdf
The CodeBreakers - Kahn David.pdf
the.ghidra.book.pdf
the_hitchhiker_s_guide_to_the_galaxy.pdf
the-numbers-behind-numb3rs-solving-crime-with-mathematics..pdf
The Shellcoder’s Handbook.pdf
the web application hackers handbook(www.camelcase.ir).pdf
Understanding how function call works.pdf
us-19-Kotler-Process-Injection-Techniques-Gotta-Catch-Them-All.pdf
Violent_Python_A_Cookbook_for_Hackers.pdf
VoiPing-VoIP-for-Dummies.pdf
web-hacking-101(1).pdf
win32asm_tutorial.pdf
win32-shellcode (1).pdf
win32-shellcode.pdf
Windows_Security_Internals_A_Deep_Dive_into_Windows_Authentication.pdf
x86-64bit-ccc-chapter.pdf
xorpd.pdf
درود بر مرامت...