Jump to content

grayhats

Members
  • Content Count

    0
  • Joined

  • Last visited

  • Days Won

    2

grayhats last won the day on July 3 2015

grayhats had the most liked content!

Community Reputation

841 Excellent

About grayhats

  • Rank
    Newbie
  1. The Traffic Analysis: TSHARK Unleashed course lacks "6.Tshark: Custom Field Extraction from Packets" video.
  2. @anonlh please re-upload video 17, i downloaded it but i this file can not play. Thanks!
  3. Enjoy! Download: [Hidden Content]
  4. Link please, perhap i will give you crack version.. Thanks
  5. No. But Can you post burpsuite pro version 1.6.39 jar file?
  6. Hacking : The Ultimate Hacking for Beginners : How to Hack : Hacking Intelligence : Certified Hacking Book by Kevin Smith English | Aug. 3, 2015 | ASIN: B013F0T26E | 287 Pages | PDF | 4.38 MB This book has been published for education purpose only. It does not in deem to legitimize certain steps that may be illegal under applicable law and organization policies in different parts of the world. CONTENTS CHAPTER 1 : Hacking briefly CHAPTER 2 : Classification various Kind of hacking CHAPTER 3 : Computer Security Computer Crime and Intelligence Agency CHAPTER 4 : Network systems and DNS working CHAPTER 5 : Various Types of Hacking attacks CHAPTER 6 : Hacking Tools CHAPTER 7 : Malware : A hackers Henchman CHAPTER 8 : Common Attacks and Viruses CHAPTER 9 : Password cracking and How to hack an Email password? CHAPTER 10 : Penetration Testing CHAPTER 11 : Windows Hacking Tricks CHAPTER 12 : Internet Hacking Tricks Download: [Hidden Content]
  7. Hacking: The Ultimate Guide for You to Learn the Hidden secrets of Hacking by Emily Goldstein English | July 10, 2015 | ISBN: 1515023478 | 348 Pages | PDF | 872.86 KB Hacking:The Ultimate Guide for You to Learn the Hidden secrets of Hacking I assume there are a few inquiries that may be going through your mind as you consider perusing this book: Who is the target group for this book? How this book is not quite the same as hacking book (The Hackers Playbook)? Why would it be a good idea for me to purchase it? Since these are every reasonable inquiry and I am asking you to plunk down your well-deserved money, it is imperative to give a few answers to these inquiries. This book is intended to be an exceptionally delicate yet exhaustive manual for the secrets in the universe of hacking and infiltration testing. It is particularly written to help you ace the essential steps and hidden secret recipes expected to finish a hack or entrance test without overpowering you. When you complete this book, you will have a strong comprehension of the infiltration testing procedure and you will be OK with the hidden secrets and essential devices expected to finish the occupation. In particular, this book is designed for individuals who are new to the universe of hacking and entrance testing, for those with practically zero past experience, for the individuals who are baffled by the failure to see the master plan (how the different instruments and stages fit together), or for those hoping to learn hacking secrets and extend their insight into hostile security. Until you can take on a similar mindset as a terrible fellow and perceive the vulnerabilities in your frameworks, you can't manufacture a viable arrangement to keep your data secure. This book helps you remain focused of the security amusement! Here is exactly when you start thinking about penetration testing, weakness appraisals, security best practices, and each part of ethical hacking. This book is also about hacking ethically and the science of testing your computers and network for security vulnerabilities and plugging the holes you find before the bad guys get a chance to exploit them. Download: [Hidden Content]
  8. Protect Your Privacy: 17 Must-Know Ways to Keep Your Information Secure Online by James Eldredge English | Sep. 4, 2015 | ISBN: 151719301X | 52 Pages | EPUB/PDF | 801.38 KB Have you ever thought about your security online? Do you ever wonder how you can stay safe on the web? If your answers to these questions were both "yes" then you need to get this book today. James Eldredge, a thirteen year computer veteran, has put together a book filled with the most essential tips, tricks and "How-To's" that every Internet user must know. Based on his personal experience in working with clients of all skill levels, James put together this book to help novice and moderately skilled computer users tackle some of the most common issues that he has seen in his work. Here's a sampling of what you'll learn from "Protect Your Privacy!": - Common Ways Attackers Steal Your Data - Easy Ways to Secure Your Web Browser - How to Secure Your Passwords Against ANY Attack - How to Stay Anonymous When Browsing the Web - Essential Habits You Need to Stay Safe Online - How to Protect Against Dangerous Software Vulnerabilities - Advanced Data Protection Methods - And much more! Keeping to his philosophy of making things as simple as possible, James stripped out all unnecessary content from this book, reducing it down to the absolute essential tips and tricks and making sure that they're all in plain english, with step-by-step instructions for each one. If you're looking for a gigantic manual filled with computer jargon and hundreds of pages of instructions that you'll never read or use, don't buy this book. If you're looking for a book that covers some of the most essential information you NEED to have to stay safe online, give "Protect Your Privacy!" a try. James Eldredge is a thirteen year computer technology veteran and has worked with all types of clients, from stay-at-home moms to multi-million dollar law firms. James focuses on a simple approach to troubleshooting, focusing on the smart way of troubleshooting instead of beating his head against the wall. This unique angle has gained him hundreds of happy clients and helped him build a successful consulting business that helps teach users as much as it fixes their problems. Download: [Hidden Content]
  9. The Hacking Bible: The Dark secrets of the hacking world: How you can become a Hacking Monster, Undetected and in the best way by Kevin James English | Aug. 23, 2015 | ISBN: 1517110947 | 200 Pages | EPUB/PDF | 971.28 KB The Hacking Bible The Dark secrets of the hacking world: How you can become a Hacking Monster, Undetected and in the best way This book is intended to be an exceptionally delicate yet exhaustive manual for the secrets in the universe of hacking and infiltration testing. The book contains an in-depth analysis and essential tips of how to become a hacker. Additionally, it provides you with the darkest secrets of the hacking world and the hidden secret recipes that were used by the most successful hackers of all time. Noticeably, this book will act as a step-by-step guide to those who are new or are starting their journey in the world of hacking by giving you an extensive insight in hacking. You will learn the various types of hacking, the hacker’s style, hacking tips and how to hack ethically among other insightful yet vital topics in the world of hacking. This book will help you understand how to remain focused on a hacking endeavor and how to overcome various challenges faced by hackers. When you finish reading this book, you will have a vivid understanding of the hacking world and you will have undoubtedly have taken the first and most important step in becoming a hacking monster, undetected and in the best way. Thanks for purchasing this book!! Download: [Hidden Content]
  10. Hacking : An unofficial anonymous guide : Windows and Internet by Jonathan Jones English | Jul. 10, 2015 | ASIN: B011ERQO70 | 222 Pages | PDF | 4.03 MB CONTENTS: CHAPTER 1 : INTRODUCTION TO HACKING 1.1 Hacking 1.2 Hacker 1.3 Classifications of Hacker 1.4 Famous Hackers of All Time 1.5 Types of hacking attacks and techniques 1.6 Password CHAPTER 2 : WINDOWS HACKING 2.1 Introduction to Windows Hacking 2.2 Registry Editor Related Hacking 2.3 Local Group Policies Related Hacking 2.4 Shortcuts Related Hacking 2.5 Notepad Related Hacking 2.6 Miscellaneous Related Hacking CHAPTER 3 : INTERNET HACKING 3.1 Introduction to Internet Hacking 3.2 Block and unblock any website 3.3 How to Increase Internet Speed 3.4 Search Internet from the Start Menu 3.5 Know any website IP address in Command Prompt 3.6 View Passwords hidden in asterisks 3.7 How to speedup online videos and performance of Firefox 3.8 Sign-out of all Gmail sessions 3.9 Sign-in to multiple Google accounts in the same browser 3.10 Log in to multiple web accounts simultaneously 3.11 Save any web article to PDF for free 3.12 Free online Resume builder 3.13 Unlock PDF and EXCEL files Online 3.14 Free online file converter 3.15 Online Edit Photos 3.16 Scan your files for malwares online for free 3.17 Online trace any mobile number anywhere 3.18 Search pictures of people in 3D layout 3.19 Disable websites from resizing your Firefox browser window 3.20 How to run Firefox inside Firefox inside Firefox 3.21 YouTube SECRETS 3.22 Add Firefox’s Spelling-Check feature to forms 3.23 Check username availability on multiple sites at once 3.24 You don't need the “[Hidden Content] portion of a web page on Address bar/Location bar 3.25 Take advantage of tabbed browsing 3.26 Quickly move between the fields of a web page 3.27 Google “I’m Feeling Lucky” button Magic Tricks 3.28 Google Results page full overview 3.29 Google Calculator 3.30 Search with an exact phrase in Google 3.31 Search for specific file types in Google 3.32 Google Measurement Converter 3.33 Currency conversions 3.34 Exact time of any place 3.35 Check the weather of anywhere in Google 3.36 Get Sunset and Sunrise time of anywhere in Google 3.37 Get definitions of everything in Google 3.38 Trace My IP Address 3.39 Search by advanced image search in Google 3.40 Get movie times in Google 3.41 Get the list of all films of any Actor and Actress 3.42 Google URL shortener 3.43 Google Earth 3.44 Most useful Google Operators 3.45 Google help center 3.46 Backup all your facebook data like photos, videos, and text 3.47 Facebook shortcut keys 3.48 How to deactivate or permanently delete a Facebook account 3.49 Post blank status and comment on facebook 3.50 Insert symbols and characters in Facebook status and comments 3.51 How to block people/apps/events/pages on facebook 3.52 View Facebook Photos in Full Screen Mode 3.53 How to find if somebody hacked your facebook account 3.54 How to Block Facebook Applications Forever 3.55 Who can look me up? On Facebook 3.56 Facebook Emoji 3.57 Convert Facebook Profile into a Page 3.58 Verify Facebook Page or Profile 3.59 Accept/Reject all Facebook Requests at once 3.60 Delete all Facebook Messages at once 3.61 Hide last seen in Facebook chat 3.62 Wayback Machine 3.63 WEB proxy server or HTTP proxy server 3.64 Glype 3.65 Hide-My-IP.Com 3.66 JonDo – the IP changer 3.67 VPN (Virtual Private Network) Services 3.68 Useful Extensions and Add-ons CHAPTER 4 : USEFUL HACKING SOFTWARE AND TOOLS 4.1 Password cracker software 4.2 Wireless hacking tools 4.3 Network scanning & hacking tools 4.4 Packet crafting to exploit firewall weaknesses 4.5 Traffic monitoring for network related hacking 4.6 Packet sniffers to analyze traffic 4.7 Rootkit detectors to hack file system 4.8 Fuzzers to search vulnerabilities 4.9 Forensics 4.10 Debuggers to hack running programs 4.11 Hacking operating systems 4.12 Encryption tools 4.13 Intrusion detection system and the ids tools 4.14 Hacking vulnerability exploitation tools 4.15 Vulnerability scanners 4.16 Web vulnerability scanners Download: [Hidden Content]
  11. Secrets To Becoming A Genius Hacker: How To Hack Smartphones, Computers & Websites For Beginners (Hacking) (Volume 1) by Steven E Dunlop English | Aug. 30, 2015 | ISBN: 151725955X | 36 Pages | EPUB/PDF | 519.81 KB/831.86 KB With Hacking: Secrets To Becoming A Genius Hacker - How to Hack Computers, Smartphones & Websites For Beginners, you'll learn everything you need to know to uncover the mysteries behind the elusive world of computer hacking. This guide provides a complete overview of hacking, & walks you through a series of examples you can test for yourself today. You'll learn about the prerequisites for hacking and whether or not you have what it takes to make a career out of it. This guide will explain the most common types of attacks and also walk you through how you can hack your way into a computer, website or a smartphone device. Lean about the 3 basic protocols - 3 fundamentals you should start your hacking education with. ICMP – Internet Control Message Protocol TCP – Transfer Control Protocol UDP – User Datagram Protocol If the idea of hacking excites you or if it makes you anxious this book will not disappoint. It not only will teach you some fundamental basic hacking techniques, it will also give you the knowledge of how to protect yourself and your information from the prying eyes of other malicious Internet users. This book dives deep into security procedures you should follow to avoid being exploited. You’ll learn about identity theft, password security essentials, what to be aware of, and how malicious hackers are profiting from identity and personal data theft. When you download Hacking: Secrets To Becoming A Genius Hacker - How to Hack Computers, Smartphones & Websites For Beginners, you’ll discover a range of hacking tools you can use right away to start experimenting yourself with hacking. In Secrets To Becoming A Genius Hacker You Will Learn: Hacking Overview – Fact versus Fiction versus Die Hard White Hat Hackers – A Look At The Good Guys In Hacking The Big Three Protocols – Required Reading For Any Would Be Hacker Getting Started – Hacking Android Phones Hacking WiFi Passwords Hacking A Computer – James Bond Stuff Baby! Hacking A Website – SQL Injections, XSS Scripting & More Security Trends Of The Future & Self Protection Now! Hacking Principles You Should Follow Purchase Hacking: Secrets To Becoming A Genius Hacker- How to Hack Computers, Smartphones & Websites For Beginners right away - This Amazing NEW EDITION has expanded upon previous versions to put a wealth of knowledge at your fingertips. You'll learn how to hack a computer, spoofing techniques, mobile & smartphone hacking, website penetration and tips for ethical hacking. You'll even learn how to establish a career for yourself in ethical hacking and how you can earn $100,000+ a year doing it. Download: [Hidden Content]
×
×
  • Create New...