C-T-H

Saturday

// // 7 comments

How To Hack Website Learn Hacking IIS Exploit

 Website hacking is an illegal work but our purpose is to secure the web & any website is vuln then we've to inform the admin for his site security. In these days cyber war is on & every country have lots of other hidden anime for destroy them.  Cyber war also a hidden work started by anonymous just for showing off .
i've already share about hacking like : (Learn Hacking ; How to Become a Hacker)

Today i'm going to tell you easiest way of Website Hacking on Windows 7. There are also snapshots with every step just you've to try as same as i do. We can hack a site without login to any any server or a site. We just paste our Deface Page in this method.
Well just open Windows 7 & its programs. 1st you've to open My Computer & then right click on that screen just like this as showing under picture...




There is a option name (Add a Network Location) just click on that & get second step as showing as under mention picture.



Here we go, there will open a window named (Welcome to Add a Network Location Wizard). Just click on next over there & another window will appear there as showing below picutre.



Now this window will show named as (Where do you want to create this network location). This is your 2nd step to do this. Click on Next & new window will appear as showing below.




The new window will appear named as (Specify the Location of your WebSite) . Just type the website link which one is IIS founded. Just type like this site:


http://www.qcwxw.org/

& click next ... Here we go... The new window will appear like as showing below...




This site is accessible & now we just click Next & a new window will appear like showing below...

& one more thing i've already publish about Email / Facebook accounts hacking just for learning & securing of account . Just to know how hackers attack on accounts.


Now final step , new window will appear just click on Finish & Check on that empty option.




Now this window will open like a Data Save Drive. Now save there a file in (.html) (.txt) format. That format should be a deface page or your message to Site's Admin.



Paste your file & then open link .

I've paste there my Deface Page in (.html) web page format. you've to open & try this one like me .

http://www.qcwxw.org/Zeroo.html

That name after the site link is my file name which one i had paste in that  site's folder. & when i'll open my page will open there..
 Last one Learn How to Hack Facebook Account & Which method is now Good


That's enough..  Site Hacked :d

Enjoy !! Remember  this is only Educational purpose.
Read More

Sunday

// // 4 comments

Hacking Vidoes Ebooks Huge Collection










Index of /data/tut

Icon  Name                                                                        Last modified      Size  Description
[DIR] Parent Directory - [DIR] !Real Hacking Videos/ 21-Sep-2013 23:34 - [DIR] Assembly_Videos/ 21-Sep-2013 23:37 - [DIR] Backtrack Tutorials/ 21-Sep-2013 23:46 - [DIR] CareerAcademy_CEHVids/ 21-Sep-2013 23:54 - [DIR] Ethical_HackingV6/ 21-Sep-2013 23:02 - [DIR] Hack Training Video Course/ 22-Sep-2013 00:00 - [DIR] Hacking/ 22-Sep-2013 00:02 - [DIR] LenaReversingVideos/ 22-Sep-2013 00:02 - [   ] MacProVideo Native Instruments 208 Maschine's Sampler Explored TUTORIAL.rar 14-Sep-2012 10:26 155M [   ] MacProVideo.Native.Instruments.206.Massive.Essentials.part1.rar 14-Sep-2012 10:26 251M [   ] MacProVideo.Native.Instruments.206.Massive.Essentials.part2.rar 14-Sep-2012 10:26 205M [   ] MacProVideo.com Native Instruments 209 Maschine Masterclass TUTORIAL.rar 14-Sep-2012 10:26 260M [   ] MasterTheDRUPAL.zip 14-Sep-2012 10:18 760M [DIR] Misc Hacking/ 22-Sep-2013 00:04 - [   ] Native Instruments Traktor 3 Tutorial DVD.iso 14-Sep-2012 10:25 3.0G [VID] Serious.Mixing.dvdrip.xvid.avi 14-Sep-2012 10:25 702M [   ] Wiley-Malware.Analysts.Cookbook.and.DVD.2010.rar 14-Sep-2012 10:22 8.1M [DIR] c programming/ 14-Sep-2012 10:21 - [DIR] learnKey.Comptia.Security+ CD 1/ 22-Sep-2013 00:05 - [   ] macProVideo.-.Music.Theory.102.Harmony.rar 14-Sep-2012 10:26 193M [DIR] open security training - videos/ 22-Sep-2013 00:10 -






Huge Collection of Ebooks for Hacking

Microsoft VBScript: Step by Step
Nessus, Snort, & Ethereal Power Tools
PHP & MySQL Web Development All-in-One Desk Reference For Dummies
Hackers: Heroes of the Computer Revolution - 25th Anniversary Edition
A Guide to Kernel Exploitation: Attacking the Core
Ubuntu: Powerful Hacks and Customizations
Seven Deadliest USB Attacks (Syngress Seven Deadliest Attacks Series)
Seven Deadliest Network Attacks (Syngress Seven Deadliest Attacks)
Botnets: The Killer Web App
DMT - The Spirit Molecule (Book)
Evil Genius books
Python programming books
[PDF] Computer Viruses for Dummies
1000 Hacker Tutorials
Hacking Exposed: Network Security Secrets & Solutions, 5th Edition
[PDF] A Game of Thrones (Books 1-5)
[PDF] OReilly: Learning Android (2011)
Think Python
C++ Primer Plus [6th Edition]
Re: French books
A step-by-step guide to buildning databases, 2nd edition
Enterprise JavaBeans 3.0, 6th edition
Enterprise JavaBeans, 4th edition
Java database best practices
Learning C# 3.0
Patterns of Enterprise - Application Architecture
Java Software Solutions - Foundations of Program Design, 4th Edition
Resistor values
Practical Malware Analysis
Re: BackTrack 5 Wireless Penetration Testing Beginner's Guide
Re: Forrest Mims
Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Computer repair with diagnostic flowcharts
Windows Internals Part 1
Guide to Assembly Language - A Concise Introduction
Re: Learning C# 3.0
Re: PHP & MySQL Web Development All-in-One Desk Reference For Dummies
CCNA Explorer
Secrets of Network Cartography
Re: request ebook
Fighting in the Streets: A Manual of Urban Guerrilla Warfare
C for dummies
how not to program in c
Re: Secrets of Network Cartography
Nmap Network Scanning: The Official Nmap Project Guide
Bypassing Censorship
Nmap Cookbook
Cyber Security Essentials
Re: DMT - The Spirit Molecule (Book)
The Arch Handbook
Information Hiding
Android Application Development: Programming with the Google SDK
Malware Forensics Field Guide for Windows Systems
Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
The Humane Interface: New Directions for Designing Interactive Systems
Practical Lock Picking: A Physical Penetration Tester's Training Guide
Modern JavaScript: Develop and Design
Electronics for Dummies
Hacking Exposed Series - nearly all the current books
Ruby by Example: Concepts and Code
Working With Unix Processes
Absolute C++, 5th Edition
Re: [Request] The Art of Assembly Language 2nd Edition
HTML & XHTML: The Definitive Guide (6th Edition)
[UPDATED]The Web Application Hackers Handbook
Re: The Web Application Hackers Handbook
Linux From Scratch
Linux Kernel Development
C Primer Plus (Mother Fucking Finally)
Metasploit: The Penetration Tester's Guide
Network Forensics Tracking Hackers through Cyberspace
Learning PHP, MySQL, and JavaScript
[RQ FILLED] The Alchemist by Paulo Coelho and other books by him
Re: [REQUEST] The Alchemist by Paulo Coelho and other books by him
Paulo Coelho (13 Books)
[RQ FILLED] The Electronics of Radio - David B. Rutledge
Shellcoder's Handbook plus two
Shell Scripting
Hacker magazines.
Networking For Dummies 7th Edition
How to Cheat at Everything
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
Starting out with C++: from control structures through objects. (PDF)
McGraw & Hill: Gray Hat Hacking: 2nd Edition
The Linux Programming Interface: A Linux and UNIX System Programming Handbook
UNIX and Linux System Administration Handbook, 4th Edition
Linux Kernel Development (3rd Edition)
Healthy Lifestyle: Vital Living to 120!
VMware Cookbook, Second Edition: A Real-World Guide to Effective VMware Use
The Linux Command Line: A Complete Introduction
Advanced Penetration Testing for Highly-Secured Environments: Ultimate Guide
Application Security for the Android Platform
A Bug Hunter's Diary: A Guided Tour Through The Wilds Of Software Security
Unauthorized Access for penetration testers
Windows Internals, Part 2
Starting Out With C++
Breaking Into The Game Industry
Programming In Lua
XNA 4.0 Game Development by Example, Visual Basic Edition
Re: [Req ] Network Security First-Step
[RQ semi-Filled] The Analysis of Biological Data
[C++11]The C++ Standard Library - A Tutorial and Reference, 2nd Edition
Premier Press - Game Programming with Python, Lua, and Ruby
Premier Press - MUD Game Programming
CSS and Documents
The Roman Empire: Roots of Imperialism
Metasploit: The penetration testers guide
Internet Denial of Service: Attack and Defense Mechanisms
C++ Without Fear
Metasploit Penetration Testing Cookbook
Programming Many-Core Chips
Re: [REQUEST] Wired For War
Re: [REQUEST] Bored of the rings by Harvard lampoon and Henry Beard
Carlos Castaneda
Ebook :Beginning python from novice to professional
Ebook : Actionscript 3.0
Ebook:teach yourself javascript in 24 hours
Anarchy Cookbook 2000
Hacker's Delight
Hacking Exposed Wireless 2nd Edition
Re: Videogame Programming and Hacking EBooks collection
Nmap in the Enterprise. Your Guide to Network Scanning
Ebook: Hacker's Black Book (ENG/DEU)
Design Patterns: Elements of Reusable Object-Oriented Software
Inside Windows Debugging: A Practical Guide to Debugging and Tracing Strategies
Little Book of Ruby
wxPython in Action
wxPython-2.8 Application Development Cookbook - 2010
Daemon's Requests Filled
[skidiot.h] CISSP All-In-One Exam Guide - Shon Harris
[skidiot.h] Linux Bible 2010 Edition
[skidiot.h] High Probability Trading Strategies - Miner, Robert C
[skidiot.h] How to Make a Living Trading Foriegn Exchange
[skidiot.h] Making Money in Forex Trade Like a Pro Without Giving Up Your Day Jo
[skidiot.h] Clean Code: A Handbook of Agile Software Craftsmanship
Programming: Principles and Practice Using C++ (Bjarne Stroustrup)
C++ Primer ( 5 Edition-2012 )
Windows Command Line Administration
Ivor Horton's Beginning Visual C++ 6
The Hacker's Dictionary
Core Python Programming (2nd Edition)
Computer Forensics Investigating Data and Image Files
Computer Forensics Investigating Network Intrusions and CyberCrime
Computer Forensics Investigating Hard Disks File and Operating Systems
Corporate Computer Security (3rd Edition)
Cryptography and Network Security Principles (5th Edition)
Disappearing Cryptography (3rd edition)
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration T
Dissecting the Hack: The F0rb1dd3n Network, Revised Edition
Optimizing software in C++
20 hakin9 magazines - includes the hakin9 Bible
Penetration Testers Open Source Toolkit (3rd Edition)
Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems
Ethical Hacking and Countermeasures: Threats and Defense Mechanisms
Ethical Hacking and Countermeasures: Web Applications and Data Servers
Re: 20 hakin9 magazines - includes the hakin9 Bible
Ethical Hacking and Countermeasures: Attack Phases
Ethical Hacking and Countermeasures: Secure Network Infrastructures
Exploiting Software: How to Break Code
Buffer Overflow Attacks: Detect, Exploit, Prevent
Foundations of Cryptography: Volume 1, Basic Tools
Wireshark Network Analysis
Nuclear Matters Handbook
From SQL Injection to Shell
Writing Great Code: Volume One
Write Great Code: Volume Two
Wicked Cool Perl Scripts
Netcat Power Tools
Configuring Windows Server 2008 Active Directory
Violent Python: A Cookbook for Hackers
A tiny pdf on aliens and the NSA
Re: 20 hakin9 magazines - includes the hakin9 Bible
Storm Lockpicking Guide [Official]
Unix In A Nutshell
Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
Hack the Stack: Using Snort and Ethereal to Master The 8 Layers of An Insecure N
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
Computer Forensics: Investigating Network Intrusions and Cyber Crime
Malicious Cryptography: Exposing Cryptovirology
CWSP Certified Wireless Security Professional
Hacking Exposed Linux, 3rd Edition
Computer Security and Cryptography
Cracking Passwords Guide
Perl for beginners
Structured Programming with c++
Ruby Cookbook
Linux Assembly Programming
Java
Thinking in c++
Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network
Nmap 6: Network Exploration and Security Auditing Cookbook
Professional Assembly Programming(Programmer to Programmer)
Refactoring: Ruby Edition
- 1000 Hacker Tutorials + some tools -
Re: Cracking Passwords Guide
Foundations of Python Network Programming Second Edition
Python Algorithms - Mastering basic algorithms in the python language
Hacking GMail
bgp
Make key generators
Nmap 6: Network Exploration and Security Auditing Cookbook
Secrets of the JavaScript Ninja + Source Code
Let us C (yashwant kanetkar)
C++ How to program 8th edition
Microsoft Visual C# 2012 Step By Step
Persuasion Skills Black Book: Practical NLP Language Patterns
Applied Cryptography: Protocols, Algorithms and Source Code in C
Build Awesome Command-Line Applications in Ruby
Computer Networks - 5th edition
Hacking the Human
Basic Engineering Circuit Analysis 10th Edition
Guide to Assembly Language Programming in Linux
Introduction to 80x86 Assembly Language and Computer Architecture
Identifying Malicious Code Through Reverse Engineering
Malicious Cryptography Exposing Cryptovirology
Programming Your Home Automate with Arduino, Android, and Your Computer
Programming Interviews Exposed: Secrets To Landing Your Next Job, 3rd Edition
8 General Education ebooks EPUB
Programming Scala: Tackle Multi-Core Complexity on the Java Virtual Machine
Java NIO
Java Web Services
The Linux Cookbook: Tips and Techniques for Everyday Use
Java 7 New Features Cookbook
Cryptography in C and C++ Second Edition
Oracle Certified Associate, Java SE 7 Programmer Study Guide
Expert Oracle and Java Security: Programming Secure Oracle Database Applications
Killer Game Programming in Java
Everyday Scripting with Ruby: For Teams, Testers, and You
How to Win Every Argument The Use and Abuse of Logic
The 200 Best Home Businesses: Easy To Start, Fun To Run, Highly Profitable
7 Weeks to 50 Pull-Ups: Strengthen and Sculpt
Firewalls And Networks How To Hack Into Remote Computers
How to Instantly Connect with Anyone - 96 All-New Little
Never Be Lied to Again: How to Get the Truth...
The 4-Hour Body - An Uncommon Guide to Rapid Fat-Loss
Java Network Programming, Third Edition
The Dark Visitor: Inside the World of Chinese Hackers
Thor's Microsoft Security Bible: A Collection of Practical Security Techniques
The Myths of Security: What the Computer Security Industry Doesn't Want You to K
The Art of Computer Virus Research and Defense
MCITP Exam 70-646 Windows Server 2008 Administration eBook
Solving&design in C 7th ed, starting raspberry pi, working tcp sockets, kingpin:
The Giant Black Book of Computer Viruses
Windows Sysinternals Administrator's Reference
Code Craft: The Practice of Writing Excellent Code
The Book of Overclocking: Tweak Your PC to Unleash Its Power
The Immortals of Meluha
AR15 A2 Rifle Diagram
Army handgun and pistol training guide
The Art of War - Sun Tzu
Thomas Paine's Common Sense
Championship Fighting: Explosive Punching and Aggressive Defense by Jack Dempsey
Code Complete: A Practical Handbook of Software Construction, Second Edition
Linux Networking Clearly Explained.
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global
Re: Solving&design in C 7th ed, starting raspberry pi, working tcp sockets, kingpin:
iOS Hacker's Handbook
Illustrated TCP/IP
Culture Jam: How to Reverse America's Suicidal Consumer Binge
Re: [Request] Mastermind: How to Think Like Sherlock Holmes
Re: [Request] Mastermind: How to Think Like Sherlock Holmes
Hacktivism and Cyberwars: Rebels With a Cause?
Backtrack 5 Cookbook
Sonic Warfare: Sound, Affect and the Ecology of Fear
Introduction to 64 Bit Intel Assembly Language Programming for Linux
Eloquent Ruby
Cracking Drupal: A Drop in the Bucket
Foundations of modern cosmology
Hacking Secret Ciphers with Python
Understanding Cryptography
Making Games with Python & Pygame
Windows Forensic Analysis
Cryptographic Security Architecture: Design and Verification
Learning Ruby
The Ruby Programming Language
Functional Programming for Java Developers
Understanding the Linux Kernel, Third Edition
CMS Security Handbook: Comprehensive Guide WordPress, Joomla, Drupal, Plone
Secure Programming Cookbook for C and C++
21st Century C
C in a Nutshell
C Programming Language (2nd Edition)
Think Fast! Accurate Decision-Making, Problem-Solving, and Planning in Minutes..
Nine Things Successful People Do Differently
Programming in C, 3rd Edition
[The KLF] The Manual: How to Have a Number One the Easy Way
Writing Security Tools And Exploits.
the deliberate dumbing down of america
Learn Windows PowerShell 3 in a Month of Lunches
Network Hacks: Attack & Defense With Python
Re: Network Hacks: Attack & Defense With Python
Re: Network Hacks: Attack & Defense With Python
Hardware Hacking: Have Fun While Voiding Your Warranty
Coding for Penetration Testers
The Database Hacker's Handbook
Cryptology Unlocked
Sams Teach Yourself Shell Programming in 24 Hours (2nd Edition)
The Rise of the Fourth Reich
A.Hitler - Mein Kampf - (My Struggle)
Digital Fortress - Dan Brown PDF
[PDF] Halo Collection - All Books
Practical Vim: Edit Text at the Speed of Thought
Hacking/Exploiting/Cheating in Online Games
Exploiting Online Games: Cheating Massively Distributed Systems
Reverse Engineering of Object Oriented Code
Reversing APK files
Android Apps for Absolute Beginners - 2nd Edition 2012
Android Apps with Eclipse
C: The Complete Reference, 4th Ed
Hello Android,3rd Edition
Instant Wireshark Starter
Mastering algorithms with C
Advanced Android 4 Games
Expert C Programming: Deep C Secrets
Functional C
Handbook of Digital Forensics and Investigation
The Basics of Hacking and Penetration Testing
Encyclopedia of Electronic Components Volume 1
Re: P.J. Plauger - The Standard C Library
File System Forensic Analysis
Starting Out with Python, Second Edition
Microsoft System Center 2012 Endpoint Protection Cookbook
Security Power Tools - O'Reilly Media
Instant Burp Suite Starter
Instant Firebug Starter
Instant Netcat Starter
Firebug 1.5: Editing, Debugging, and Monitoring Web Pages
Windows PowerShell 3.0 Step by Step
SQL Injection Attacks and Defense, 2nd Edition
Programming PHP, 3rd Edition
Re: The secret of Hacking 1st Edition
Seven Languages in Seven Weeks: A Pragmatic Guide to Learning Programming Langua
Re: The secret of Hacking 1st Edition
"A Byte Of Python" By, Swaroop C H
Re: "A Byte Of Python" By, Swaroop C H
PIC Microcontrollers: 50 Projects for Beginners & Experts
Binary An Encrypted to Cipher Bridge Sho - Carolyn McCray
Hack THis-24 IncredIble Hackerspace projects from tHe dIY movement
XDA Developers' Android Hacker's Toolkit
Fast and slow thinking
The Art of Assembly Language
The Lord of Rings -complete- plus movie screen plays and bonus!
Counter Hack Reloaded, Second Edition
The Laws of Cryptography with Java Code
Game Development and cipher hacking in Python.
[PDF] Spy & counter-Spy
Hacking Secret Ciphers with Python
Invent your own games with python
Hack Proofing Your Identity
[Ebook] Blackhatonomic
[Ebook]Syngress Data Hiding
BT5 cookbook
inferno-dan brown
Re: inferno-dan brown
JavaScript Step by Step, 2nd Edition
[Ebook]The Art Of Assembly Langauge 2nd Editition.
[Ebook]Reversing: Secrets of Reverse Engineering
[HTML] Eloquent JavaScript: A Modern Introduction to Programming
[Ebook] Hack the Stack
[Ebook] XSS Attacks - Exploits And Defense
[Ebook]Silence On The Wire - A Field Guide To Passive Reconnaissance And Indirec
detecting malice
Exploiting Software: How to Break Code
Rootkits: Subverting the Windows Kernel
Malware Analyst Cookbook
[PDF] Defense against the Black Art
Designing BSD Rootkits
Web Application Defender's Cookbook: Battling Hackers and Protecting Users
Hacker Disassembling Uncovered
Hacking Web Apps: Detecting and Preventing Web Application Security Problems
The presentation secrets of Steve Jobs
Re: C++ collection
Pyomo - Optimization Modeling in Python
Re: C++ collection
Re: C++ collection
CODE, by Petzold
Java How to Program (Early Objects) 9e
Anti-Reverse Engineering Resource Collection
Linux 101 Hacks, 2nd Edition
The Python Standard Library by Example.
Re: Can anyone please provide "powershell toolmaking in a month of lunches" ebook..
[NSA] Untangling the Web: A Guide to Internet Research
Re: Corporate Computer Security (3rd Edition)
Android Security: Attacks and Defenses
Introduction to the Theory of Computation, 3rd Edition
Hacking a Terror Network - The Silent Threat of Covert Channels
Phishing Exposed
Hack Proofing Your Network (Second Edition)
Pro Bash Programming: Scripting the Linux Shell
O'reilly Regular Expression Pocket Reference
Hacking VoIP: Protocols, Attacks and Countermeasures
Hacking: The Art of Exploitation, 2nd Edition
Webbots, Spiders, and Screen Scrapers - 2nd Edition
Security for Wireless Implantable Medical Devices
Computer Security: Art and Science
Information security and anti forensics
The DHCP Handbook
Introduction to Mathematical Thinking by Keith Devlin
Oreilly - Building the Perfect PC, 3rd Edition
Re: Request: Introduction to Mathematical Thinking by Keith Devlin
Simple Steps to Data Encryption
Unity iOS Game Development
Re: Unity iOS Game Development
Rapid gui development with QT and python
Hacking Exposed Windows: Windws Security Secrets & Solutions 3rd edition.
Inside A Hacker's Playbook
CUDA by Example: An Introduction to General-Purpose GPU Programming
Learn Java for Android Development, 2nd edition
Android Forensics
Lucid Dreaming - Stephan LaBerge
The Healthy Programmer
97 things every programmer should know
Re: [request] Microprocessor 8085
Re: [request] Trigonometry by McKeague, seventh edition
Re: [request] Comptia Network+ study guide
Practical Programming: An Introduction to Computer Science Using Python
Re: Book Needed : The Tangled Web: A Guide to Securing Modern Web Application
Re: Book Needed : The Tangled Web: A Guide to Securing Modern Web Application
programming project ideas (Martyr2's Mega Project)
[Download] Assembly Language for x86 processors (Sixth edition)
The Complete Bastard Operator from Hell :D
Handbook of Applied Cryptography - University of Waterloo
BSD UNIX Toolbox - 1000+ Commands for FreeBSD, OpenBSD and NetBSD Power Users
UNIX TOOLBOX 2008 [Unix/Linux/BSD Commands]
Practical Anonymity: Hiding in Plain Sight Online
FreeBSD Command Reference
Puzzle Encryption Algorithm - Goswell Security Laboratory
Browser Uniqueness: An EFF Article
CLR via C# 3rd edition
OpenGL Development Cookbook
The Practice of Network Security Monitoring
Re: (Request) How to Study as a Mathematics Major By Lara Alcock
Android Programming: The Big Nerd Ranch Guide
Re: TutsPlus Premium eBooks Collection (2012 Updated!)
Compilers: Principles, Techniques and Tools
Re: Java eBooks Collection (2007-2013)
Re: C/C++ Programming eBooks Collection
The Basics of Web Hacking: Tools and Techniques to Attack the Web
Hacking: The Art of Exploitation Live CD(Part 1)
Hacking: The Art of Exploitation Live CD(Part 2)
Hacking: The Art of Exploitation Live CD(Part 3)
Building Websites For Return On Investment - 16.1 MB
Building Wordpress Themes From Scratch (2012) - 7.2 MB
Client Centric Web Design - 41.5 MB [Part 1] [Part 2]
CSS Essentials (2012) - 6.0 MB
Decoding HTML5 (2012) - 10.7 MB
Digging Into Wordpress 3.3.1 + Source (2012) - 26.0 MB
From Photoshop To HTML + Source (2010) - 30.7 MB [Part 1] [Part 2]
Get Going With Google AdWords (2011) - 5.1 MB
Getting Good With Git (2010) - 3.1 MB
Getting Good With JavaScript + Source (2011) - 1.7 MB
Getting Good With PHP (2012) - 2.6 MB
Getting The Hang Of Web Typography (2011) - 10.8 MB
Getting To Know SEO (2012) - 817 KB
How to Be a Rockstar Wordpress Designer 2 + Source (2011) - 3.7 MB
How To Build A Successful Blog Business (2010) - 7.9 MB
How To Create Selling eCommerce Websites (2010) - 16.1 MB
How To Write Great Copy For The Web (2010) - 6.8 MB
LinkedIn and Lovin it (2011) - 6.8 MB
Mastering CSS for Web Developers (2011) - 10.0 MB
Mastering jQuery (2011) - 1.3 MB
Mastering Photoshop For Web Design (2010) - 10.0 MB
Mastering Photoshop for Web Design Vol - 2 (2011) - 12.7 MB
Mastering Wordpress - Advance Techniques (2011) - 4.4 MB
Professional Web Design (2010) - 2.3 MB
Professional Web Design Vol.2 (2011) - 18.8 MB
Psychology Of Web Design (2012) - 11.1 MB
Responsive Design (2012) - 6.4 MB
Rockstar Business - 1.2 MB
Rockstar Wordpress Designer (2010) - 22.6 MB
Scalable And Modular Architecture For CSS - 963 KB
Successful Facebook Marketing (2011) - 6.6 MB
The Node Beginner Book (2012) - 4.2 MB
Theme Tumblr Like a Pro + Source (2010) - 9.5 MB
Twitter Up Your Business (2009) - 3.3 MB
User Experience Design (2012) - 4.8 MB
Web Design Confidential (2012) - 20.1 MB
Wordpress Essentials - Techniques For Beginners (2011) - 3.7 MB

Freelancing:
Finance For Freelancer (2012) - 2.3 MB
Freelance Confidential (2011) - 7.1 MB
How To Be A Rockstar Freelancer (2007) - 834 KB
Successful Freelancing (2010) - 4.0 MB
The Freelance Statistics Report (2008) - 1.2 MB
The Unlimited Freelancer (2009) - 1.1 MB

Mobile Development:
Designing For Android (2012) - 7.3 MB
Designing For iPhone (2012) - 9.5 MB
Essentials Of Mobile Design (2012) - 6.6 MB
iPhone App Entrepreneur (2010) - 12.1 MB
Mobile Design For iPhone And iPad (2010) - 16.1 MB
Mobile Design Patterns (2012) - 4.0 MB

Addison-Wesley C++ Primer Plus, 6th Edition 2011 PDF Source Code - 5.9 MB
Addison-Wesley C++ Primer, 5th Edition 2012 - 49.6 MB [Part 1] [Part 2]
Addison-Wesley The C++ Programming Language 4th Edition Jun 2013 - 6 1 MB
Addison-Wesley The C++ Standard Library, 2nd Edition 2012 - 6.1 MB
Apress Beginning C, 5th Edition 2013 EPUB - 4.3 MB
Apress Beginning C, 5th Edition 2013 PDF - 3.2 MB
Apress Cryptography in C and C++ 2001 - 3.6 MB
C Language Reference Manual, 5th Edition 2003 - 496 KB
Course Technology An Introduction to Programming With C++, 6th Edition D. Zak 2011 - 5.8 MB
Course Technology Beginning C++ Through Game Programming, 3rd Edition 2011 - 3.2 MB
Course Technology C++ Programming From Problem Analysis to Program Design, 5th Edition D.S. Malik 2011 - 5.2 MB
Course Technology C++ Programming From Problem Analysis to Program Design, 6th Edition D.S.Malik 2013 - 4.8 MB
Course Technology C++ Programming Program Design Including Data Structures, 6th Edition D.S. Malik 2013 - 13.2 MB
Course Technology C Programming for the Absolute Beginner, 2nd Edition 2008 - 2.2 MB
Deitel C++ How to Program, 8th Edition 2012 - 51.5 MB [Part 1] [Part 2]
Deitel C How To Program, 6th Edition 2010+Web Files+Source Code - 16.0 MB
Expert C Programming Deep C Secrets - 2.1 MB
Jumping Into C++ Alex Allain + Source Code - 4.0 MB
McGraw-Hill C++ The Complete Reference, 4th Edition 2003 - 2.3 MB
McGraw-Hill C The Complete Reference, 4th Edition 2000 - 3.0 MB
McGraw-Hill C++ A Beginners Guide, 2nd Edition Herbert Schildt 2003 +Source Code+Answers+Corrections - 9.7 MB
McGraw-Hill C++ Demystified A Self-Teaching Guide 2004 - 2.6 MB
McGraw-Hill Herb Schildts C++ Programming Cookbook 2008 - 1.8 MB
McGraw-Hill The Art Of C++ Herb Schildts 2004 - 1.1 MB
O'Reilly C++ Cookbook 2005 - 946 KB
O'Reilly Mastering Algorithms with C 1999 - 2.5 MB
O'Reilly Practical C Programming 3rd Edition 1997 - 5.9 MB
O'Reilly Programming Embedded Systems in C and C++ 1999 - 957 KB
O'Reilly Secure Programming Cookbook For C And C++ 2003 - 1.4 MB
Packt Publishing Boost Asio C++ Network Programming 2013 - 3.6 MB
Pearson Absolute C++, 5th Edition Walter Savitch 2012 - 3.8 MB
Pearson Problem Solving and Program Design in C, 7th Edition 2013-Jeri R Hanly-Elliot B Koffman - 5.2 MB
Pearson Problem Solving with C++, 7th Edition Walter Savitch 2009 - 3.3 MB
Prentice-Hall Data Structures and Program Design in C++ 2000 - 11.6 MB
Prentice-Hall C++ Without Fear A Beginners Guide, 2nd Edition 2011 - 3.1 MB
Prentice-Hall The C Programming Language, 2nd Edition 1988 - 19.2 MB
Que Publishing C++ by Example 1992 - 2.5 MB
Sams Teach Yourself C in 21 Days, 6th Edition 2003 - 3.1 MB
Sams Publishing Advanced C 1992 - 2.7 MB
Sams Teach Yourself C++ In One Hour A Day, 7th Edition 2011 - 4.4 MB
Sams Teach Yourself C in 24 Hours - 621 KB
Wiley Beginning Programming with C++ For Dummies 2010 - 53.4 MB [Part 1] [Part 2]
Wiley C++ All-In-One Desk Reference For Dummies, 2nd Edition 2009 - 5.9 MB
Wiley C++ For Dummies, 6th Edition 2009 - 1.6 MB
Wiley C++ Timesaving Techniques for Dummies 2005 - 4.4 MB
Wiley C For Dummies 2004 - 2.5 MB
Addison-Wesley Building Java Programs A Back To Basics Approach (2011)
Addison-Wesley Effective Java, 2nd Edition (2008)
Addison-Wesley The Java EE 6 Tutorial, 4th Edition (2011)
Apress Beginning EJB3 Java EE 7 Edition, 2nd Edition (2013)
Apress Beginning Java EE 7 (2013)
Apress Expert Oracle and Java Security Programming Secure Oracle Database Applications with Java (2011)
Apress Java 7 for Absolute Beginners (2012)
Apress Java EE 7 Recipes A Problem-Solution Approach (2013)
Apress JavaFX 2 0 Introduction by Example (2011)
Apress Oracle Certified Professional Java SE 7 Programmer Exams 1Z0-804 and 1Z0-805 (2013)
Apress Pro Java 7 NIO.2 (2011)
Apress Pro Java ME Apps (2011)
Apress Pro JavaFX 2 A Definitive Guide to Rich Clients with Java Technology (2012) [Part 1] [Part 2]
Course Technology Java Programming From Problem Analysis to Program Design, 5th Edition - D.S. Malik (2012)
Course Technology Java Programming, 6th Edition - Joyce Farrel (2012)
CRC Press Secure Java For Web Development (2011) - Doesn't exist on the link provided by the OP.
Deitel Developer Series Java For Programmers, 2nd Edition (2012)
Deitel Java How to Program Early Objects, 9th Edition (2012)
Manning Effective Unit Testing A Guide For Java Developers (2013)
Manning OCA Java SE 7 Programmer I Certification Guide (2013)
Manning The Well-Grounded Java Developer (2013)
McGraw Hill The Art Of Java (2004)
McGraw-Hill An Introduction To Object-Oriented Programming With Java, 5th Edition (2010)
Oracle Press Java The Complete Reference, 8th Edition - Herbert Schildt (2011) [Part 1] [Part 2]
O'Reilly Functional Programming for Java Developers (2011)
O'Reilly Java 7 Pocket Guide, 2nd Edition (2013)
O'Reilly Java Network Programming, 3rd Edition 2004
O'Reilly Java The Good Parts (2010)
O'Reilly Java Web Services Up and Running (2009)
O'Reilly JavaMail API (2013)
O'Reilly Learning Java, 4th Edition (2013)
Packt Publishing Java 7 Concurrency Cookbook (2012)
Packt Publishing Java 7 New Features Cookbook (2012)
Packt Publishing Oracle Certified Associate Java SE 7 Programmer Study Guide (2012)
Pearson Absolute Java, 5th Edition Walter Savitch (2012)
Pearson Starting Out With Java From Control Structures Through Objects, 5th Edition (2013) [Part 1] [Part 2]
Prentice-Hall Core Java Volume I Fundamentals 9th Edition (2013)
Prentice-Hall Core Java Volume II Advanced Features 9th Edition (2013) [Part 1] [Part 2]
Prentice-Hall Introduction to Java Programming Brief Version, 8th Edition - Y.Daniel Liang (2011)
Prentice-Hall Introduction to Java Programming Brief Version, 9th Edition - Y.Daniel Liang (2013)
Prentice-Hall Introduction to Java Programming Comprehensive Version, 8th Edition - Y.Daniel Liang (2011)
Prentice-Hall Introduction to Java Programming Comprehensive Version, 9th Edition - Y.Daniel Liang (2013)
Prentice-Hall Java An Introduction to Problem Solving and Programming 6th Edition - Walter Savitch (2012)
Sams Java Phrasebook (2007)
Sams Teach Yourself Java 6 in 21 Days, 5th Edition (2007)
Sams Teach Yourself Java In 24 Hours, 6th Edition (2012)
Springer An Introduction To Network Programming Using Java, 3rd Edition (2013)
Springer Guide to Web Development with Java (2012)
Wiley Beginning Programming With Java For Dummies, 3rd Edition (2012)
Wiley Java and Mac OS X Developer Reference (2010) [Part 1] [Part 2]
Wiley Java Concepts for Java 5 and 6 5th Ed
Wiley Java For Dummies, 5th Edition (2011)
Wrox Press Ivor Horton's Beginning Java Java 7 Edition (2011) [Part 1] [Part 2]
Wrox Press Java Programming 24-Hour Trainer (2011)

The Python Tutorial
A+, Network+, Security+ Exams in a Nutshell
Algorithms in a Nutshell
C++ in a Nutshell
C# 5.0 in a Nutshell
J2ME in a Nutshell
Linux in a Nutshell 6th Edition
Python in a Nutshell 2nd Edition
Paul Ekman Books (Emotions Revealed and Telling Lies)
Capitalism and Freedom
Psychological Operations in Guerrilla Warfare
PHP in a Nutshell
Web design in a Nutshell 3rd Edition
Ruby in a Nutshell
The D Programming Language
PCs AiO for Dummies 6th Edition
Hacking Raspberry Pi
Programming Spiders, Bots and Aggregators in Java
SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys
The Scheme Programming Language, 4th Edition
The Way to Go: A Thorough Introduction to the Go Programming Language
An Introduction To Reverse Engineering for Beginners
Javascript - step by step, 3th Edition
Head First - Wordpress
Head First - Python
Head First - HTML with CSS & XHTML
Head First - Programming
Head First - Ajax [Part 1] >> [Part 2]
Head First - C# [Part 1] >> [Part 2]
Head First - C [Part 1] >> [Part 2]
Head First - Android Development [Part 1] >> [Part 2]
Head First - Design Patterns
Head First - Excel
Head First - HTML5 Programming [Part 1] >> [Part 2] >> [Part 3]
Head First - Networking
Head First - iPhone Development
Head First - Statistics
Head First - Rails

Python and HDF5
iOS 7 Programming Fundamentals
iOS 7 Programming Cookbook [Part 1] >> [Part 2]
Elementary Differential Equations 10th Ed
Vagabonding: An Uncommon Guide to the Art of Long-Term World Travel
Hacking Vim 7.2
vi and Vim Editors Pocket Reference, 2nd Edition
Learning the vi and Vim Edtors, 7th Edition

Apress Beginning Blender
Beginners Guide to Blender Game Engine
The Complete Guide to Blender Graphics
Twisted Network Programming


Course Name Type Coordinators Institute Available
Artificial Intelligence(Prof.P.Dasgupta)VideoProf. P. DasguptaIIT KharagpurCourse contents
CAD for VLSI Design IIWebProf. V. Kamakoti
Prof. Shankar Balachandran
IIT MadrasCourse contents
Computational GeometryVideoProf. Sandeep SenIIT DelhiCourse contents    
Computer ArchitectureVideoProf. Anshul KumarIIT DelhiCourse contents
Computer NetworksWebProf. Hema A MurthyIIT MadrasCourse contents
Computer OrganizationVideoProf. S. RamanIIT MadrasCourse contents
Design and Analysis of AlgorithmsVideoProf. Sundar Viswanathan
Prof. Ajit A Diwan
Prof. Abhiram G Ranade
IIT BombayCourse contents
Electronic Design AutomationVideoProf. Indranil SenguptaIIT KharagpurCourse contents
Logic for CSVideoProf. S. Arun KumarIIT DelhiCourse contents  
Principles of CommunicationWebProf. Hema A MurthyIIT MadrasCourse contents
Programming and Data StructureVideoDr. P.P.ChakrabortyIIT KharagpurCourse contents
Artificial IntelligenceVideoProf. S. Sarkar
Prof. Anupam Basu
IIT KharagpurSyllabus Course contents
Artificial IntelligenceWebProf. P. Mitra
Prof. S. Sarkar
IIT KharagpurSyllabus Course contents
BiometricsVideoProf. Phalguni GuptaIIT KanpurSyllabus Course contents    
CAD for VLSI Design IWebProf. V. Kamakoti
Prof. Shankar Balachandran
IIT MadrasSyllabus Course contents
Compiler DesignWebProf. Sanjeev K AggarwalIIT KanpurSyllabus Course contents
Compiler DesignVideoProf. Y.N. SrikanthIISc BangaloreSyllabus Course contents    
Computational Number Theory & CryptographyWebDr. Pinaki MitraIIT GuwahatiSyllabus Course contents  
Computer Algorithms - 2VideoProf. Shashank K. MehtaIIT KanpurSyllabus Course contents  
Computer GraphicsWebProf. Prem K KalraIIT DelhiSyllabus Course contents
Computer GraphicsVideoProf. Sukhendu DasIIT MadrasSyllabus Course contents
Computer NetworksWebProf. Ajit PalIIT KharagpurSyllabus Course contents
Computer NetworksVideoProf. Sujoy GhoshIIT KharagpurSyllabus Course contents
Computer Organisation and ArchitectureWebProf. Bhaskaran RamanIIT BombaySyllabus Course contents
Computer Organization and ArchitectureWebProf. Jatindra Kumar DekaIIT GuwahatiSyllabus Course contents
Cryptography and Network SecurityVideoDr. Debdeep MukhopadhyayIIT KharagpurSyllabus Course contents    
Data CommunicationVideoProf. Ajit PalIIT KharagpurSyllabus Course contents
Data CommunicationsWebProf. H.S. JamadagniIISc BangaloreSyllabus Course contents
Data Structures And AlgorithmsVideoProf. Naveen GargIIT DelhiSyllabus Course contents
Data Structures and Program MethodologyWebDr. Pradip K Das
Dr. S.V. Rao
IIT GuwahatiSyllabus Course contents
Database DesignVideoDr. S. Srinath
Prof. D. Janaki Ram
IIIT Bangalore
IIT Madras
Syllabus Course contents
Design and Analysis of AlgorithmsWebProf. Sundar Viswanathan
Prof. Ajit A Diwan
Prof. Abhiram G Ranade
IIT BombaySyllabus Course contents
Design Verification and Test of Digital VLSI CircuitsVideoDr. Santosh Biswas
Prof. Jatindra Kumar Deka
IIT GuwahatiSyllabus Course contents    
Digital Image ProcessingWebDr. G. HaritIIT KharagpurSyllabus Course contents  
Digital SystemsWebProf. N.J. RaoIISc BangaloreSyllabus Course contents
Discrete Mathematical StructuresVideoProf. Kamala KrithivasanIIT MadrasSyllabus Course contents
Distributed Computing SystemsWebProf. Ananthanarayana V.SNITKSyllabus Course contents    
Graph TheoryVideoDr. L. Sunil ChandranIISc BangaloreSyllabus Course contents    
High Performance Computer ArchitectureVideoProf. Ajit PalIIT KharagpurSyllabus Course contents  
High Performance ComputingVideoProf. Mathew JacobIISc BangaloreSyllabus Course contents    
Human-Computer InteractionWebPradeep P Yammiyavar
Dr.Samit Bhattacharya
IIT GuwahatiSyllabus Course contents    
Indexing and Searching Techniques in DatabasesWebDr. Arnab BhattacharyaIIT KanpurSyllabus Course contents    
Internet TechnologyVideoProf. Indranil SenguptaIIT KharagpurSyllabus Course contents
Introduction to Computer GraphicsVideoProf. Prem K KalraIIT DelhiSyllabus Course contents
Introduction to Database Systems and DesignWebProf. P.Sreenivasa KumarIIT MadrasSyllabus Course contents
Introduction to Problem Solving and ProgrammingWebProf. S. Arun KumarIIT DelhiSyllabus Course contents
Introduction to Problem Solving and ProgrammingVideoProf. D. GuptaIIT KanpurSyllabus Course contents
Low Power VLSI Circuits & SystemsVideoProf. Ajit PalIIT KharagpurSyllabus Course contents    
Microprocessors and MicrocontrollersWebProf. Krishna KumarIISc BangaloreSyllabus Course contents
Natural Language ProcessingVideoProf. Pushpak BhattacharyyaIIT BombaySyllabus Course contents  
Numerical OptimizationVideoDr. Shirish K. ShevadeIISc BangaloreSyllabus Course contents    
Operating SystemsWebProf. P.C.P. BhattIISc BangaloreSyllabus Course contents
Parallel Computer ArchitectureWebDr. Mainak ChaudhuriIIT KanpurSyllabus Course contents    
Parallel ComputingVideoDr. Subodh Kumar IIT DelhiSyllabus Course contents    
Pattern RecognitionWebProf. V. Susheela Devi
Prof. M. Narasimha Murty
IISc BangaloreSyllabus Course contents    
Performance Evaluation of Computer SystemsVideoProf. Krishna Moorthy SivalingamIIT MadrasSyllabus Course contents    
Principles of Programming LanguagesVideoProf. S. Arun KumarIIT DelhiSyllabus Course contents
Program Optimization for Multi-core ArchitecturesWebProf. Rajat Moona
Dr. Mainak Chaudhuri
Prof. Sanjeev K Aggarwal
IIT KanpurSyllabus Course contents    
Real Time SystemsVideoProf. Rajib MallIIT KharagpurSyllabus Course contents    
Real Time SystemsWebProf. Rajib MallIIT KharagpurSyllabus Course contents
Software EngineeringVideoProf. N.L. Sarda
Prof. Umesh Bellur
Prof. Rushikesh K Joshi
IIT BombaySyllabus Course contents
Software EngineeringWebProf. Rajib MallIIT KharagpurSyllabus Course contents
System Analysis and DesignVideoProf. V. RajaramanIISc BangaloreSyllabus Course contents
System Analysis and DesignWebProf. V. RajaramanIISc BangaloreSyllabus Course contents
Theory of Automata and Formal LanguagesWebDr. Diganta GoswamiIIT GuwahatiSyllabus Course contents
Theory of Automata, Formal Languages and ComputationVideoProf. Kamala KrithivasanIIT MadrasSyllabus Course contents    
Theory of ComputationVideoProf. Somenath BiswasIIT KanpurSyllabus Course contents  
VLSI Design Verification and TestWebDr. Santosh Biswas
Prof. Jatindra Kumar Deka
IIT GuwahatiSyllabus Course contents    
Advanced Computer GraphicsVideoProf. C. SharatIIT BombaySyllabus only
BioinformaticsWebProf. Harish Karnick
Dr. Arnab Bhattacharya
Prof. Somenath Biswas
IIT KanpurSyllabus only
CombinatoricsVideoDr. L. Sunil ChandranIISc BangaloreSyllabus only
Computer Security and Cryptography - IVideoProf. Bernard MenezesIIT BombaySyllabus only
Game TheoryVideoProf. Y. NarahariIISc BangaloreSyllabus only
Introduction to Cognitive ScienceVideoProf. Amitabha MukerjeeIIT KanpurSyllabus only
Introduction To OptimizationWebProf. Keshava Prasad HalemaneNITKSyllabus only
Introduction to ProgrammingVideoProf. C. SharatIIT BombaySyllabus only
Object ComputingWebDr. R. NadarajanPSG College of TechnologySyllabus only
Object ComputingVideoDr. R. NadarajanPSG College of TechnologySyllabus only
Parallel AlgorithmsVideoProf. R. Seethalakshmi
Dr. N. Sairam
SASTRA UniversitySyllabus only
Pattern RecognitionVideoProf. Sukhendu Das
Prof. C.A. Murthy
IIT Madras
Indian Statistical Institute
Syllabus only
Principles of Compiler DesignVideoProf. Y.N. SrikanthIISc BangaloreSyllabus only
Riemann Hypothesis and its ApplicationsVideoProf. Manindra AgrawalIIT KanpurSyllabus only
Self-Stabilizing Distributed AlgorithmsWebDr. Sushanta KarmakarIIT GuwahatiSyllabus only
Software Architecture and DesignWebProf. T.V. PrabhakarIIT KanpurSyllabus only
Storage SystemsVideoDr. K. GopinathIISc BangaloreSyllabus only
































 Video Hacking Tut Collection


Index of /avi

      Name                    Last modified      Size  Description
Parent Directory - Defcon17Badge.avi 01-Aug-2009 00:38 11M Demolition.avi 29-Mar-2009 13:36 287M Ep. 10 - Hacking Bas..> 17-Sep-2007 16:59 33M Ep. 20 - Ettercap.avi 03-Aug-2008 14:04 317M Ep. 21 - Xss Tunnel.avi 22-Aug-2008 00:29 133M Ep. 22 - Playstation..> 14-Oct-2008 00:54 269M Ep. 23 - Cracking WE..> 10-Dec-2008 19:07 112M Ep. 24 - Bypass Hots..> 14-Jul-2009 17:28 195M Ep. 3 - Wireless Hac..> 14-Jun-2007 00:40 18M Ep. 5 - Lockpicking ..> 14-Jul-2007 18:15 42M Ep. 6 - Phone Phreak..> 24-Jul-2007 01:49 73M Ep. 7 - Phone Phreak..> 24-Jul-2007 19:52 21M Ep. 8 - Lock Picking..> 30-Aug-2007 00:27 37M Ep. 9 - Lock Picking..> 06-Sep-2007 20:39 58M IEFD Ep. 2 - Wireles..> 14-Jun-2007 00:25 29M IEFD ep. 1 - Network..> 08-Jun-2007 03:04 59M MarianG Wordpress So..> 16-Jun-2009 02:37 4.8M Patchy's Top 5 DOS G..> 18-Jan-2009 20:09 337M Round Robin - 1st Ma..> 29-Mar-2009 19:06 179M Round Robin - 2nd Ma..> 29-Mar-2009 20:00 264M Round Robin - 3rd Ma..> 29-Mar-2009 20:38 216M Round Robin - 4th Ma..> 29-Mar-2009 21:01 112M Round Robin - 5th Ma..> 29-Mar-2009 21:25 128M Round Robin - 6th Ma..> 29-Mar-2009 22:01 200M Round Robin - 7th Ma..> 29-Mar-2009 22:25 187M Tournament.avi 29-Mar-2009 17:07 864M Underground 02 - Met..> 19-Jul-2008 23:35 123M Underground 03 - App..> 29-Jul-2008 22:23 14M Underground 04 - Win..> 05-Aug-2008 19:19 29M Underground 05 - Pas..> 12-Aug-2008 21:04 63M Underground 06 - Com..> 04-Sep-2008 08:34 18M Underground 07 -Mani..> 21-Sep-2008 20:44 8.8M Underground 08 - Tro..> 15-Oct-2008 21:31 45M Underground 09 - Evi..> 20-Oct-2008 21:38 32M Underground 10 - Dow..> 28-Oct-2008 22:21 40M Underground 11 - Dow..> 07-Nov-2008 14:16 156M Underground 12 - Hom..> 22-Nov-2008 22:34 56M Underground 13 - Fix..> 04-Dec-2008 20:48 24M Underground 14 - VMW..> 14-Dec-2008 22:28 21M Underground 15 - Blu..> 26-Feb-2009 16:29 98M Underground 16 - Win..> 25-May-2009 20:39 25M Underground 17 - Loc..> 27-May-2009 20:03 22M Underground 18 - Alt..> 30-Jun-2009 19:18 27M Underground 19 - CSR..> 14-Aug-2009 21:12 42M Underground 20 - Int..> 14-Aug-2009 23:06 27M Vblog - Arduino Arp ..> 09-Jun-2009 12:52 62M Vblog - Beer Pong Ta..> 08-Aug-2008 21:50 139M Vblog - Bypass Cisco..> 10-Sep-2008 21:19 28M Vblog - DNS Spoof Vi..> 24-Oct-2008 13:44 61M Vblog - Deep Freeze.avi 23-Jan-2009 13:55 55M Vblog - Email Inject..> 01-Jun-2009 17:27 50M Vblog - Extracting D..> 09-Aug-2009 15:45 64M Vblog - FPGA MD5 Cra..> 16-Jun-2009 15:29 135M Vblog - Install BT3.avi 14-Nov-2008 13:39 34M Vblog - My Computer.avi 04-Jun-2009 20:42 146M Vblog - Ping of Deat..> 06-Mar-2009 12:23 72M Vblog - Updates.avi 01-Jun-2009 17:40 44M

Index of /t4y/Tuts 4 You - Collection 2011/


../
CrackMe/                                           11-Jan-2012 20:39                   -
CrackMe Solutions/                                 11-Jan-2012 20:39                   -
Crypto Libraries/                                  11-Jan-2012 20:39                   -
Crypto Tools/                                      11-Jan-2012 20:39                   -
Immunity Debugger/                                 11-Jan-2012 20:39                   -
Interactive Disassembler/                          11-Jan-2012 20:39                   -
Keygen Source/                                     11-Jan-2012 20:39                   -
Olly Debugger/                                     11-Jan-2012 20:39                   -
Reversing Tools/                                   11-Jan-2012 20:39                   -
Reversing for Newbies/                             11-Jan-2012 20:39                   -
Tutorials/                                         11-Jan-2012 20:39                   -
UnPackMe Collection/                               11-Jan-2012 20:39                   -
Unpacking Tutorials/                               11-Jan-2012 20:39                   -
Tuts 4 You - Collection 2011.md5                   11-Jan-2012 21:18              125690
readme.txt                                         11-Jan-2012 21:18                 808
Read More

Earn 25$ Instant