Anonymous Intelligence Agency Book Collection [Par:AnoIA] [Cypherpunked]


    Seeders : 0      Leechers : 0


Note :

Please Update (Trackers Info) Before Start "Anonymous Intelligence Agency Book Collection [Par:AnoIA] [Cypherpunked]" Torrent Downloading to See Updated Seeders And Leechers for Batter Torrent Download Speed.

Trackers List

Tracker NameLast CheckStatusSeedersLeechers



Torrent File Content (162 files)


Anonymous Intelligence Agency Book Collection [Par:AnoIA] [Cypherpunked]
    /fyi.zip
          /fyi.zip -
96.62 MB

    /misc
          JohnAllegroTheSacredMushroomAndTheCross.pdf -
897.14 KB

          Mikhail Bulgakov - The Master and Margarita.pdf -
1.84 MB

    /coding
          Addison Wesley - 2001 - Knuth - The Art of Computer Programming Vol I II III IV.pdf -
160.86 MB

    /security
          Coding for Penetration Testers - Building Better Tools - J. Andress, R. Linn (Syngress, 2012) WW.pdf -
9.88 MB

          CEH.V6.-.Module.42.Hacking.Database.Servers.pdf -
1.58 MB

          Exploiting Software - How to Break Code - G. Hoglund, et al., (Addison-Wesley, 2004) WW.pdf -
7.58 MB

          GREY HAT HACKING - THE ETHICAL HACKER'S HANDBOOK 3RD ED - A. HARPER, ET AL., (MCGRAW-HILL, 2011) WW.PDF -
12.21 MB

          CEH.V6.-.Module.23c.Advanced.Exploit.Writing.Using.Metasploit.Framework.pdf -
641.09 KB

          Google Hacking for Penetration Testers - ISBN 1931836361.pdf -
14.71 MB

          CEH.V6.-.Module.07.System.Hacking.pdf -
15.1 MB

          BackTrack-4 - Assuring Security by Penetration Testing - S. Ali, st al., (Packt, 2011) WW.pdf -
6.18 MB

          BackTrack 5 Wireless Penetration Testing - Beginner's Guide - V. Ramachandran (Packt, 2011) WW.pdf -
7.5 MB

          Buffer Overflow Attacks - Detect, Exploit, Prevent (2005).pdf -
5.38 MB

          Hack the Stack [Network security] - M. Gregg (Syngress, 2006) WW.pdf -
12.09 MB

          CEH.V6.-.Module.16.Hacking.Webservers.pdf -
4.88 MB

          CEH.V6.-.Module.20.Hacking.Wireless.Networks.pdf -
12.95 MB

          CEH.V6.-.Module.04.Google.Hacking.1.pdf -
4.17 MB

          The Basics of Hacking and Penetration Testing [ethical, made easy] - P. Engebretson (Syngress, 2011) WW.pdf -
3.74 MB

          SQL Injection Attacks and Defense.pdf -
6.54 MB

          The Hacker's Underground Handbook - D. Melnichuk (2008) WW.1.pdf -
2.51 MB

          The Web App. Hacker's Handbook - Discovering, Exploiting Security Flaws - D. Stuttard, M. Pinto (Wiley, 2008) WW.pdf -
11.13 MB

          Hacking Exposed Linux 3rd ed. - ISECOM (McGraw-Hill, 2008) WW.pdf -
10.13 MB

          The Web App. Hacker's Hbk. - Finding, Exploiting Security Flaws 2nd ed. - D. Stuttard (Wiley, 2011) WW.pdf -
13.52 MB

          Metasploit Penetration Testing Cookbook - A. Singh (Packt, 2012) WW.pdf -
4.54 MB

          Writing.Security.Tools.and.Exploits.pdf -
11.15 MB

          Hacking The Next Generation.pdf -
8.62 MB

          Hacking Google Maps And Google Earth (2006).pdf -
11.28 MB

          Metasploit - The Penetration Tester's Guide - D. Kennedy, et. al., (No Starch, 2011) WW.pdf -
6.92 MB

          Hacking for Dummies-3rd Edition-2010-PDF-IPT.pdf -
8.57 MB

          Handbook on