70% stars - 3077 reviews
  • Hacker's Desk Reference

    About The File:
    File Format | PDF
    File Size | 1.0 MB
    Pages | 429
    Language | English
    Category | Hacks
    Description:  The Ultimate Hacking Reference!
    This application details various different hacking methods, exploits, software attacks and more! If you ever wanted to know what a SQL injection is, what social engineering is, or simply already know most of the material and just want a handy reference, with How-To's, cheatsheets, quick references and more, THIS IS THE APP FOR YOU!

    Our review from DroidTweak:
    "The Best Hacking Reference Available! For Beginners and Experts alike! 5/5 Stars!"

    ***THIS APPLICATION IS FOR LEARNING/EDUCATIONAL PURPOSES ONLY. THE CREATORS OF THIS APP DO NOT CONDONE ILLLEGAL ACTIVITIES AND DO NOT SUPPORT ILLEGAL HACKING. THIS APP IS DESIGNED AS A REFERENCE FOR ETHICAL HACKERS AND PENETRATION TESTERS.***

    The Largest and Most Extensive Hacking Reference on the Market!

    Learn how to:
    - Secure yourself and your devices from malicious attackers! -
    - Properly install and configure anti-virus for your Windows PC -
    - Configure and secure Firefox so as to remain impervious to online hackers and various web attacks! -
    - Learn how to spot and remove malware from your system! -
    - Learn how to secure your android device from malicious applications, hackers stealing your data, and eavesdroppers! -
    - Encrypt and backup your android device! Learn how to prevent thieves from stealing your data with your device! -
    - Use the very same guides used by the NSA, CIA, FBI, and DoD to secure their devices! Learn how to be as secure as the NSA! -

    - Exploiting Wireless Networks:
    --Cracking WEP Encryption
    --Cracking WPA/2 Encryption
    --Introduction to Sniffing the Wire
    --Cracking WEP/WPA(2) through WPS
    -Exploiting Web Applications:
    --Cross-Site-Request-Forgery How-To
    --SQL Injection How-To
    --Unrestricted URL references
    --Local/Remote File Injection
    --Cross Site Scripting
    --Webshells
    --Various other attacks
    -Exploiting your local Network
    --Scanning the Network & Enumerating Services
    --Exploiting Services
    --Maintaining Access
    --Linux Post-Exploitation Cheat Sheet
    --OS X Post-Exploitation Cheat Sheet
    --Windows Post-Exploitation Cheat Sheet
    --ARP & DNS Poisoning
    --Nmap command reference
    --USB Device hacking
    --Wireshark reference
    - How to Create a Legal Hacking Lab for testing and training!
    -Social Engineering:
    --Phishing
    --Facesniff
    --Firesheep
    --Social Engineering Toolkit Guide
    +MORE
    Download | Free