0% found this document useful (0 votes)
123 views2 pages

Livros

The document lists the titles of books that have been downloaded or are available for download related to ethical hacking, penetration testing, and computer security. Some of the downloaded books include "Gray Hat Hacking - The Ethical Hacker’s Handbook", "RTFM: Red Team Field Manual", and "Social Engineering: The Art of Human Hacking". Books available for download include "The IoT Hacker's Handbook", "Hacking with Kali Linux: Practical Guide", and "WiFi Hacking for Beginners". The books cover topics like Linux, network penetration testing, web application hacking, social engineering, anonymity, and ethical hacking.

Uploaded by

Lucas Cardeal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
123 views2 pages

Livros

The document lists the titles of books that have been downloaded or are available for download related to ethical hacking, penetration testing, and computer security. Some of the downloaded books include "Gray Hat Hacking - The Ethical Hacker’s Handbook", "RTFM: Red Team Field Manual", and "Social Engineering: The Art of Human Hacking". Books available for download include "The IoT Hacker's Handbook", "Hacking with Kali Linux: Practical Guide", and "WiFi Hacking for Beginners". The books cover topics like Linux, network penetration testing, web application hacking, social engineering, anonymity, and ethical hacking.

Uploaded by

Lucas Cardeal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

BAIXADOS:

Allen Harper | Gray Hat Hacking - The Ethical Hacker’s


Handbook
Ben Clark | RTFM: Red Team Field Manual
Bruno Fraga | Tecnicas de Invasão
Christopher Hadnagy | Social Engineering: The Art of Human Hacking
Christopher Negus | Linux A Bíblia
Daniel Moreno | Pentest em aplicações Web
Daniel Moreno | Pentest em redes sem fio
David Kennedy | Metasploit: The Penetration Tester's Guide
David Melnichuk | The Hacker's Underground Handbook
Gabriel Torres | Redes de Computadores
Jeff Simon | Hacking Practical Guide for Beginners
Jon Erickson | Hacking: The Art of Exploitation
Justin Seitz | Black Hat Python
Kevin Mitnick | A Arte de Enganar
Kevin Mitnick | A Arte de Invadir
Simon Singh | The Code Book
Stuart McClure | Hacker Expostos

PARA BAIXAR:

Aditya Gupta | The IoT Hacker's Handbook


| https://ps.3lib.net/book/3717886/b95236?dsource=recommend
Dafydd Stuttard | The web application hacker’s handbook
| https://ps.3lib.net/book/3401544/518a0b?dsource=recommend
Daniel Howard | Hacking with Kali Linux: Practical Guide
| https://ps.3lib.net/book/5332594/f36634?dsource=recommend
Daniel James Hollins | Dark Psychology Secrets
| https://ps.3lib.net/book/5066149/a2a64c?dsource=recommend
Daniel Moreno | Introdução ao Pentest
| https://pt.br1lib.org/book/3610222/8b15b3?dsource=recommend
James Wells | WiFi Hacking for Beginners
| https://ps.3lib.net/book/2826275/0a851a?dsource=recommend
Kevin James | Computer Hacking for Beginners
| https://ps.3lib.net/book/2563260/b2147c?dsource=recommend
Kevin Mitnick | The Art of Invisibility
| https://ps.3lib.net/book/2867237/08799e?dsource=recommend
Lance Henderson | Tor and the Dark Art of Anonymity
| https://ps.3lib.net/book/2548624/31bf1f?dsource=recommend
Lance Henderson | Tor Darknet Series: Master the Art of
Invisibility | https://ps.3lib.net/book/3714746/f2420c?dsource=recommend
OccupyTheWeb | Linux Basics for Hacker's
|
Peter Kim | The Hacker Playbook 2: Penetration Testing
| https://ps.3lib.net/book/2951816/c30f27?dsource=recommend
Peter Kim | The Hacker Playbook 3: Penetration Testing
| https://ps.3lib.net/book/3525893/451b52?dsource=recommend
Project Syntax | Python and Hacking Made Simple
| https://ps.3lib.net/book/2950584/10f8a1?dsource=recommend
Sandro Melo | Exploração de Vulnerabilidades em Redes TCP/IP
| https://pt.br1lib.org/book/5304513/1dd5cf?dsource=recommend
Sanjib Sinha | Beginning Ethical Hacking with Kali Linux
| https://ps.3lib.net/book/3632594/c28006?dsource=recommend
Stefano Novelli | Hacklog Volume 1 Anonymity
| https://ps.3lib.net/book/3720900/5a1564?dsource=recommend
Stefano Novelli | Hacklog Volume 2 Web Hacking
| https://ps.3lib.net/book/5960907/4f0e50?dsource=recommend

You might also like