cookie

We use cookies to improve your browsing experience. By clicking «Accept all», you agree to the use of cookies.

avatar

ناوەندی شیکار

Shikar Center Free and Copyleft Group: @FiG_Club

Show more
Advertising posts
1 439
Subscribers
-324 hours
-157 days
-330 days

Data loading in progress...

Subscriber growth rate

Data loading in progress...

Name: PENTEST SECRETS - Breaking The Unbreakable Enterprise Security Year: 2020 Categories: Book, Technology, Hacking and Security
Show all...
PENTEST_SECRETS_Breaking_The_Unbreakable_Enterprise_Security,_2020.pdf2.73 MB
Name: Practical Reverse Engineering - x86, x64, ARM, Windows® Kernel, Reversing Tools, and Obfuscation Year: 2014 Categories: Book, Technology, Hacking and Security
Show all...
Practical_Reverse_Engineering_x86,_x64,_ARM,_Windows®_Kernel,_Reversing.pdf4.57 MB
Name: ETHICAL HACKING 101 - How to conduct professional pentestings in 21 days or less Year: 2015 Categories: Book, Technology, Hacking and Security
Show all...
ETHICAL_HACKING_101_How_to_conduct_professional_pentestings_in_21.pdf24.65 MB
Name: Hacker, Hoaxer, Whistleblower, Spy - The Many Faces Of Anonymous Year: 2014 Categories: Book, Technology, Hacking and Security, History and Politics
Show all...
Hacker,_Hoaxer,_Whistleblower,_Spy_The_Many_Faces_Of_Anonymous,.pdf1.48 MB
Name: Nmap Network Scanning - Official Nmap Project Guide to Network Discovery and Security Scanning, 2008 Year: 2008 Categories: Book, Technology, Hacking and Security, Network and Internet
Show all...
Nmap_Network_Scanning_Official_Nmap_Project_Guide_to_Network_Discovery.pdf120.07 MB
Name: Google Hacking for Penetration Testers Year: 2016 Categories: Book, Technology, Hacking and Security, Network and Internet
Show all...
Google Hacking for Penetration Testers, 2016.pdf37.82 MB
Name: Mastering Modern Web Penetration Testing, 2016 Year: 2016 Categories: Book, Technology, Hacking and Security
Show all...
Mastering Modern Web Penetration Testing, 2016.pdf15.72 MB
Name: Web Application Obfuscation Year: 2011 Categories: Book, Technology, Hacking and Security, Programming, Database
Show all...
Web Application Obfuscation, 2011.pdf1.51 MB
ناو: دەروازەیەک بۆ زانستی بایۆلۆجی نوسەر: گروپی زانستی ژیان بەشەکان: کتێب، پزیشکی و زیندەزانی
Show all...
دەروازەیەک بۆ زانستی بایۆلۆجی.pdf1.93 MB
ناو: پزیشکی بۆ هەمووان - کۆمەڵێک زانیاری سودبەخش بۆ هەر خێزان و تاکێک ئامادەکار: جەلال غوڵام ئەحمەد بەشەکان: کتێب، پزیشکی و زیندەزانی
Show all...
پزیشکی_بۆ_هەمووان_کۆمەڵێک_زانیاری_سودبەخش_بۆ_هەر_خێزان_و_تاکێک.pdf12.43 MB