From 66093392822ddc3bdb780302cc76323a8616dea1 Mon Sep 17 00:00:00 2001
From: Faheem <72849238+areyouroot@users.noreply.github.com>
Date: Sat, 9 Dec 2023 20:23:40 +0530
Subject: [PATCH 1/2] Update books.html
---
books.html | 8 +-------
1 file changed, 1 insertion(+), 7 deletions(-)
diff --git a/books.html b/books.html
index 89ca9e5..0c1537a 100644
--- a/books.html
+++ b/books.html
@@ -78,18 +78,12 @@
follow the hacking based book at least 3 pratice
Hacking & Tor: The Ultimate Beginners Guide to Hacking, Tor, & Accessing the Deep Web & Dark Web Jack Jones
Tor and the Deep Web: The Complete Guide to Stay Anonymous in the Dark Net
The Dark Net
- hacking exposed (all)
- The Command Line for Hacking: Get Started with Shell for Penetration TestingThe Command Line for Hacking: Get Started with Shell for Penetration Testing
- Bash 101 Hacks
-
- Bash hacks and msfcli
-
+hacking exposed (all)
Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Hacking Secret Ciphers with Python
Cracking Codes with Python: An Introduction to Building and Breaking Ciphers
Hacking Google Maps and Google Earth
Advanced Penetration Testing. Hacking the World’s Most Secure Networks
- Game Hacking
Ethical Hacking of ASP.NET
From 6fe7741d3d661a7d26e5678aa58f1583483a5352 Mon Sep 17 00:00:00 2001
From: Faheem <72849238+areyouroot@users.noreply.github.com>
Date: Sat, 9 Dec 2023 21:03:04 +0530
Subject: [PATCH 2/2] Delete books.html
Books download done
---
books.html | 99 ------------------------------------------------------
1 file changed, 99 deletions(-)
delete mode 100644 books.html
diff --git a/books.html b/books.html
deleted file mode 100644
index 0c1537a..0000000
--- a/books.html
+++ /dev/null
@@ -1,99 +0,0 @@
-
-ROOt
-
-
-
-
-REad FuLlY
-
-- follow the hacking based book at least 3 pratice
-
-
- PEN-200: Penetration
- Testing with Kali Linux
- OSCP Certification
- - WEB-200: Foundational
- Web Application
- Assessments with Kali Linux
- - WEB-300: Advanced Web
- Attacks and Exploitation
- OSWE Certification
- - EXP-301: Windows User
- Mode Exploit Development
- OSED Certification
- - PEN-210: Foundational
- Wireless Network Attacks
- OSWP Certification
- - PEN-300: Advanced Evasion
- Techniques and Breaching Defenses
- OSEP Certification
- - EXP-312: Advanced
- macOS Control Bypasses
- OSMR Certification
- - EXP-401: Advanced
- Windows Exploitation
- OSEE Certification
- - SOC-200: Foundational Security
- Operations and Defensive Analysis
- OSDA Certification
- -
- Network Penetration Testing Essentials (PEN-100)
- - Web Application Assessment Essentials (WEB-100)
- - Exploit Development Essentials (EXP-100)
- -
- Security Operations Essentials (SOC-100)
- -
- Introduction to Cloud Security (CLD-100)
- - Introduction to Secure Software Development (SSD-100)
-- the hacker play book 1,2,3
-- metasploit: the pentesters's guide
-- the web application hackers hand book
-- web hacking 101
-- mastering mordan web penetration testing
-- hacking the art of exploitation
-- Serious cryptography,
-- shellcoders handbook,
-- android hackers handbook
-- android security internals
-- windows internal 6
-- Cryptography apocalypse
-- The art of invisibility Kevin mitnick book
-- Practical cryptography in python
-- Understanding cryptography
-- We have root book
-- Advanced penetration testing book
-- THE HARDWARE HACKER
-- ATTACKING NETWORK PROTOCOLS
- - Practical iot hacking
- - ios hacker's hand book
- - counter hack reloaded
- - ghost in wires
- - blue team hand book
- - the art of intrusion
- - offencive counter measures
-- a bug hunters dairy
-- hacking exposed
-- The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks Jasper van Woudenberg
-- The Hardware Hacker: Adventures in Making and Breaking Hardware
-- Hardware Hacking: Have Fun While Voiding Your Warranty
-- Hacking & Tor: The Ultimate Beginners Guide to Hacking, Tor, & Accessing the Deep Web & Dark Web Jack Jones
-- Tor and the Deep Web: The Complete Guide to Stay Anonymous in the Dark Net
-- The Dark Net
-- hacking exposed (all)
-- Gray Hat Python: Python Programming for Hackers and Reverse Engineers
- - Hacking Secret Ciphers with Python
- - Cracking Codes with Python: An Introduction to Building and Breaking Ciphers
- - Hacking Google Maps and Google Earth
- - Advanced Penetration Testing. Hacking the World’s Most Secure Networks
- - Ethical Hacking of ASP.NET
-
-
-
-are you root ?
-
- YES OR NO
-
-
-
-
-
-