Γ
All
Videos π¬
Audios π΅
eBooks π
Mobile Apps π±
Archives (ZIP/ISO) πΏ
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
178.17.170.13
Home
/
Discover
/
178.17.170.13
/
Parent Folder
CONF SLIDES AND PAPER
203 files
LIVRES
191 files
2014-the-year-of-the-application-layer-breach-ebook.pdf
PDF
3 years ago
1.00 MB
Copy Link
2014_car_hackers_handbook_compressed.pdf
PDF
3 years ago
12.39 MB
Copy Link
35-Egorov.pdf
PDF
3 years ago
1,015.56 kB
Copy Link
Advanced Penetration Testing for Highly Secured Environments.pdf
PDF
3 years ago
15.86 MB
Copy Link
Android Security Internals An In-Depth Guide to Android's Security Architecture.pdf
PDF
3 years ago
Get Size
Copy Link
AndroidSecInt.pdf
PDF
3 years ago
7.72 MB
Copy Link
Attacking_the_DNS_Protocol.pdf
PDF
3 years ago
322.42 kB
Copy Link
Attaques de type injection HTML.pdf
PDF
3 years ago
1.05 MB
Copy Link
BackTrack 5 Wireless Penetration Testing (1849515581).pdf
PDF
3 years ago
16.59 MB
Copy Link
Beginners-Guide-To-Log-Correlation.pdf
PDF
3 years ago
442.76 kB
Copy Link
Burp Suite Essentials.pdf
PDF
3 years ago
2.78 MB
Copy Link
Bypassing_VBAAC_with_HTTP_Verb_Tampering.pdf
PDF
3 years ago
605.15 kB
Copy Link
CASP.pdf
PDF
3 years ago
79.28 MB
Copy Link
CHIFFRAGE SYMETRIQUE ET SURVEILLANCE DE MASSE.pdf
PDF
3 years ago
402.85 kB
Copy Link
CISSP.pdf
PDF
3 years ago
33.73 MB
Copy Link
Cryptography and Network Security 4th Edition.pdf
PDF
3 years ago
14.04 MB
Copy Link
Cybersecurity for Industrial Control Systems_ SCADA, DCS, PLC, HMI, and SIS-Auerbach Publications,CRC Press (2011).pdf
PDF
3 years ago
4.98 MB
Copy Link
Digital Forensics for Network, Internet, and Cloud Computing.pdf
PDF
3 years ago
12.87 MB
Copy Link
EN - NoSQL, No injection - Ron, Shulman-Peleg, Bronshtein.pdf
PDF
3 years ago
453.28 kB
Copy Link
EN - Stack Bug - Stack Overflow ASLR bypass using ret2reg (1).pdf
PDF
3 years ago
761.83 kB
Copy Link
EN-Hacking Web Applications Using Cookie Poisoning.pdf
PDF
3 years ago
138.22 kB
Copy Link
EN-SAP Penetration testing_Black-H_Europe (1).pdf
PDF
3 years ago
3.30 MB
Copy Link
Ethical Hacking and Penetration Testing Guide - Baloch, Rafay.pdf
PDF
3 years ago
22.44 MB
Copy Link
Faille-CSRF.pdf
PDF
3 years ago
824.07 kB
Copy Link
FailleDNS_CollinYegdjong.pdf
PDF
3 years ago
1.74 MB
Copy Link
Failles-PHP.pdf
PDF
3 years ago
98.50 kB
Copy Link
FoxIT-Whitepaper_Blackhat-web.pdf
PDF
3 years ago
1.19 MB
Copy Link
Guide_securite_industrielle_Version_finale-2.pdf
PDF
3 years ago
5.84 MB
Copy Link
HITB Ezine Issue 001.pdf
PDF
3 years ago
2.93 MB
Copy Link
HITB Ezine Issue 002.pdf
PDF
3 years ago
18.46 MB
Copy Link
HITB Ezine Issue 003.pdf
PDF
3 years ago
16.12 MB
Copy Link
HITB Ezine Issue 004.pdf
PDF
3 years ago
15.71 MB
Copy Link
HITB Ezine Issue 005.pdf
PDF
3 years ago
4.00 MB
Copy Link
HITB Ezine Issue 006.pdf
PDF
3 years ago
31.47 MB
Copy Link
HITB Ezine Issue 007.pdf
PDF
3 years ago
3.79 MB
Copy Link
HITB Ezine Issue 008.pdf
PDF
3 years ago
2.19 MB
Copy Link
HITB-Ezine-Issue-009.pdf
PDF
3 years ago
11.63 MB
Copy Link
HITB-Ezine-Issue-010.pdf
PDF
3 years ago
9.72 MB
Copy Link
HORNET, ONION ROUTER.pdf
PDF
3 years ago
466.16 kB
Copy Link
Hacking Exposed - Web Applications (3rd Edition)-ζ±3εδΊ«.pdf
PDF
3 years ago
6.95 MB
Copy Link
Hacking Web Applications.pdf
PDF
3 years ago
5.79 MB
Copy Link
HiP2k13-Burp_Pro_Tips_and_Tricks.pdf
PDF
3 years ago
2.71 MB
Copy Link
Introduction aux Vulnerabilites Web.pdf
PDF
3 years ago
241.77 kB
Copy Link
Intrusion Detection with SNORT Advanced IDS Techniques Using SNORT Apache MySQL PHP and ACID.pdf
PDF
3 years ago
2.53 MB
Copy Link
LDAP Injection and Blind LDAP Injection In Web Applications.pdf
PDF
3 years ago
1.88 MB
Copy Link
LFI With PHPInfo Assistance.pdf
PDF
3 years ago
212.32 kB
Copy Link
LFS-BOOK-7.8.pdf
PDF
3 years ago
1.66 MB
Copy Link
Metasploit, Penetration Testers Guide.pdf
PDF
3 years ago
6.90 MB
Copy Link
Join FilePursuit on
chat for discussions and more information.