کتاب های من (اگر خواستید میفرستم براتون)

دوشنبه, ۷ بهمن ۱۴۰۴، ۱۱:۳۶ ق.ظ

باتوجه به اینکه دسترسی به منابع و کتاب های آموزشی این مدت کمی سخت تر شده این لیست کتاب هایی هست که من به صورت فایلی دارم و اکثرشون مرتبط با حوزه کامپیوتر هستند . اگر موردیش به دردتون میخورد میتونم براتون بفرستم : 

12_CSE141-MBT-Virtual-Memory.ppt.pdf
1.Simon Singh - The code book_ the science of secrecy from ancient Egypt to quantum cryptography (2000, Anchor Books).pdf
21013-shellcoding-in-linux.pdf
28475-linux-stack-based-buffer-overflows.pdf
28476-linux-format-string-exploitation.pdf
Al Sweigart - Cracking Codes with Python_ An Introduction to Building and Breaking Ciphers (2018, No Starch Press) - libgen.li.pdf
Android App Reverse Engineering 101 _ Learn to reverse engineer Android applications!.pdf
An Introduction to Mathematical Cryptography.pdf
Anthony Shaw - CPython Internals_ Your Guide to the Python 3 Interpreter-Real Python (2021).pdf
Apress.Learn.Kotlin.for.Android.Development..www.EBooksWorld.ir.pdf
ArtOfAssembly.pdf
assembly64.pdf
Assembly.Language.For_.x86.Processors.Kip_.R..Irvine..6ed.Prentice.Hall_.2011www.xuexi111.com_.pdf
AVR Microcontroller and Embedded Systems by Mazidi.pdf
Basics of Windows shellcode writing _ Ring 0x00.pdf
Bill Blunden - The Rootkit Arsenal_ Escape and Evasion in the Dark Corners of the System-Jones & Bartlett Publishers (2009).pdf
book.pdf
Bruce Dang, Alexandre Gazet, Elias Bachaalany, Sébastien Josse - Practical reverse engineering_ x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation-Wiley (2014).pdf
Capturing WPA_WPA2 Handshake _ Cracking Principles [CYBERPUNK ].pdf
Computer Architecture, Sixth Edition A Quantitative Approach by John L. Hennessy, David A. Patterson.pdf
ComputerFundamentals.pdf
Computer System Architecture (3rd Ed) by M Morris Mano.pdf
C++ Reversing.pdf
Crypto101.pdf
D1T2 - Taking Ghidra to The Next Level - Zhanzhao Ding.pdf
dokumen.pub_prompt-engineering-for-generative-ai-9781098153434.pdf
Eldad Eilam - Reversing_ secrets of reverse engineering-Wiley (2005).pdf
elf file format.pdf
embedded_pmode.pdf
Ferrante_Auriemma_Exploiting_Game_Engines.pdf
File System Forensic Analysis (1).pdf
Game Hacking - Developing Autonomous Bots For Online Games (2016).pdf
___ General Purpose Hash Function Algorithms - By Arash Partow ___.pdf
Ghidra Server README.pdf
GMLTutorialv6.pdf
Hackers Delight.pdf
Hacking- The Art of Exploitation (2nd ed. 2008) - Erickson.pdf
How to write a display manager _ gsgx.pdf
idapro.pdf
Jasper van Woudenberg, Colin O'Flynn - The Hardware Hacking Handbook_ Breaking Embedded Security with Hardware Attacks-No Starch Press (2021).pdf
John Boxall - AVR Workshop_ A Hands-On Introduction with 60 Projects-No Starch Press (2022).pdf
John the Ripper - wordlist rules syntax.pdf
Jordan Hatcher - Break WiFi with Python.pdf
Joshua Saxe, Hillary Sanders - Malware Data Science_ Attack Detection and Attribution-No Starch Press (2018).pdf
Jozve-0-ta-100-AVR-V3.pdf
learn_gml.pdf
lec11_x86arch.pdf
Libpcap_libnet.pdf
LPIC-2_LPIC_Study_Guide(2016).pdf
Make_-AVR-Programming_-Learning-to-Write-Software-for-Hardware-PDFDrive-.pdf
Make - Electronics.pdf
mdmz_book.pdf
Menezes.pdf
Metasploit.tutorial_Part.1.pdf
Metasploit.tutorial_Part.2.pdf
Metasploit.tutorial_Part.3.pdf
Metasploit.tutorial_Part.4.pdf
Modular Arithmetic and the Diffie-Hellman Algorithm _ Aleksandr Hovhannisyan.pdf
MTCNA Study Guide.pdf
No.Starch.Attacking.Network.Protocols.2017.pdf
No.Starch.Practical.Packet.Analysis.3rd.Edition.2017.pdf
number_representation.pdf
obfuscation.pdf
OpenRCE_C++ reversing.pdf
os-dev.pdf
paging.pdf
pe101l.pdf
PE Format - Win32 apps Microsoft Learn.pdf
practical-forensic-imaging.pdf
Practical-IoT-Hacking-The-Definitive-Guide-to-Attacking-the-Internet-of-Things-by-Chantzis,-Fotios,-Stais,-Ioannis,-Calderon,-Paulino,-Deirmentzoglou,-Evangelos,-Woods,-Beau-(bibis.ir).pdf
Practical-Malware-Analysis.pdf
Practical_Video_Game_Bots (1).pdf
Process Injection Part 1_ The Theory - Secarma_ Penetration Testing and Cybersecurity Company.pdf
Pro.C++.Programmin(irenx.ir).pdf
PWK-Penetration-Testing-with-Kali-Linux.pdf
Riaziat.pdf
Rootkits and Bootkits.pdf
rubik (1).pdf
rubik.pdf
sec16_paper_andriesse.pdf
security+.pdf
Shannon_Claude_E_Weaver_Warren_The_Mathematical_Theory_of_Communication_1963.pdf
shannon-secrecy.pdf
Shellcoding for Linux and Windows Tutorial.pdf
Shiva V. N. Parasram - Digital Forensics with Kali Linux_ Enhance your investigation skills by performing network and memory forensics with Kali Linux (2023, Packt Publishing) - libgen.li.pdf
silence.on.the.wire.pdf
Sound Pattern Recognition with Python _ by Adilson Neto _ Medium.pdf
SRF04.pdf
structures in NASM.pdf
SwitchOptimization.pdf
Sybex - CCNA Security Study Guide Exam 210-260.pdf
[Tech Today] Stephanie Domas, Christopher Domas - x86 Software Reverse-Engineering, Cracking, and Counter-Measures (2024, Wiley) - libgen.li.pdf
The Art of Memory Forensics - Detecting Malware and Threats in Windows, Linux, and Mac Memory (2014).pdf
The CodeBreakers - Kahn David.pdf
the.ghidra.book.pdf
the_hitchhiker_s_guide_to_the_galaxy.pdf
the-numbers-behind-numb3rs-solving-crime-with-mathematics..pdf
The Shellcoder’s Handbook.pdf
the web application hackers handbook(www.camelcase.ir).pdf
Understanding how function call works.pdf
us-19-Kotler-Process-Injection-Techniques-Gotta-Catch-Them-All.pdf
Violent_Python_A_Cookbook_for_Hackers.pdf
VoiPing-VoIP-for-Dummies.pdf
web-hacking-101(1).pdf
win32asm_tutorial.pdf
win32-shellcode (1).pdf
win32-shellcode.pdf
Windows_Security_Internals_A_Deep_Dive_into_Windows_Authentication.pdf
x86-64bit-ccc-chapter.pdf
xorpd.pdf
 
موافقین ۱ مخالفین ۱

درود بر مرامت...

سلامت باشید
ارسال نظر آزاد است، اما اگر قبلا در بیان ثبت نام کرده اید می توانید ابتدا وارد شوید.
شما میتوانید از این تگهای html استفاده کنید:
<b> یا <strong>، <em> یا <i>، <u>، <strike> یا <s>، <sup>، <sub>، <blockquote>، <code>، <pre>، <hr>، <br>، <p>، <a href="" title="">، <span style="">، <div align="">