↑ Return to FIGHT

Hacking

Welcome to the Golden Area. HACKINGHacking
Here you can find the most important tutorials and eBooks about Hacking, Exploitation and much more, everything a hacker heart desires. Everything of course for Free. So please donate if you can, to keep the project www.new-world-order-plan.org alive. Thank you. WE ARE LEGION. WE ARE ANONYMOUS.

Useful hint for Finding any eBooks for Free:
Just Search On google the name of the book and filetype:pdf
Example: Hackers lol lol filetype:pdf

Basic Anonymity Tutorial: Anonymity Tutorial who feel the drabness of the cyber community is a burden  on what matters: fun. Considering fun is now restricted to Friday,  where we look forward to the weekend, weekend, we have now taken it upon.

 

Something about Ethical Hacking
Ethical Hacking

Hackers Underground Handbook
Hacker Handbook

Hacking.Exposed.Linux.Third.Edition.pdf
Hacking Exposed Linux

2002-Hacking Exposed Web Applications
Hacking Exposed

2006 Hacking Exposed Web 2.0.pdf
Hacking Exposed 2006

_________________________________________________________________________
EXPLOITS/ROOTKITS

How to exploit a site with XML bug
How to exploit a site with XML

Javascript trojan installer
(You just need to edit the source code for your website, and .exe for your trojan)
Javascript trojan installer

Sqli defacement
Sqli defacement

DDOS Attacks with Slow Posting (Pyloris)
DDOS Attacks with Slow Posting

Google Hacking For Penetration Testers Johnny Long:
Google hacking for penetration testers VOL.1
google hacking for penetration testers VOL.2

Targeted attacks via non-persistant xss
Targeted attacks non-persistant xss

ALL HACKING RESOURCES, LINKS, EBOOKS ETC.:
Hacking resources

Security Assessment and Pentest tools Cheat Sheets
Security Assessment Cheat Sheets

________________________________________________________________________
SYSTEM ADMINISTRATION / TECH

SQL teaching and tutorials

SQL Tutorials

Zillions of Bash-Scripts
Bash Scripts