安娜的档案需要您的帮助! 许多人试图关停我们,但我们会奋起反击。
➡️ 如果您现在捐赠,您将获得
双倍
的快速下载次数。 有效期至本月底。
捐赠
✕
安娜的档案
am - አማርኛ - 阿姆哈拉语
ar - العربية - 阿拉伯语
ast - asturianu - 阿斯图里亚斯语
az - azərbaycan - 阿塞拜疆语
be - беларуская - 白俄罗斯语
bg - български - 保加利亚语
bn - বাংলা - 孟加拉语
br - Brasil: português - 葡萄牙语 (巴西)
ca - català - 加泰罗尼亚语
ckb - کوردیی ناوەندی - 中库尔德语
cs - čeština - 捷克语
da - dansk - 丹麦语
de - Deutsch - 德语
el - Ελληνικά - 希腊语
en - English - 英语
eo - Esperanto - 世界语
es - español - 西班牙语
et - eesti - 爱沙尼亚语
fa - فارسی - 波斯语
fi - suomi - 芬兰语
fil - Filipino - 菲律宾语
fr - français - 法语
gl - galego - 加利西亚语
gu - ગુજરાતી - 古吉拉特语
ha - Hausa - 豪萨语
he - עברית - 希伯来语
hi - हिन्दी - 印地语
hr - hrvatski - 克罗地亚语
hu - magyar - 匈牙利语
hy - հայերեն - 亚美尼亚语
id - Indonesia - 印度尼西亚语
it - italiano - 意大利语
ja - 日本語 - 日语
jv - Jawa - 爪哇语
ka - ქართული - 格鲁吉亚语
ko - 한국어 - 韩语
lt - lietuvių - 立陶宛语
ml - മലയാളം - 马拉雅拉姆语
mr - मराठी - 马拉地语
ms - Melayu - 马来语
ne - नेपाली - 尼泊尔语
nl - Nederlands - 荷兰语
no - norsk bokmål - 书面挪威语 (挪威)
or - ଓଡ଼ିଆ - 奥里亚语
pl - polski - 波兰语
ps - پښتو - 普什图语
pt - Portugal: português - 葡萄牙语 (葡萄牙)
ro - română - 罗马尼亚语
ru - русский - 俄语
sk - slovenčina - 斯洛伐克语
sl - slovenščina - 斯洛文尼亚语
sq - shqip - 阿尔巴尼亚语
sr - српски - 塞尔维亚语
sv - svenska - 瑞典语
ta - தமிழ் - 泰米尔语
te - తెలుగు - 泰卢固语
th - ไทย - 泰语
tr - Türkçe - 土耳其语
tw - 中文 (繁體) - 中文 (繁体)
uk - українська - 乌克兰语
ur - اردو - 乌尔都语
vec - veneto - 威尼斯语
vi - Tiếng Việt - 越南语
yue - 粵語 - 粤语
zh - 中文 - 中文 ☑️
📚 人类历史上最大的完全开放的图书馆。 📈 61,654,285 本图书、95,687,150 篇论文被永久保存。
AA
38TB
direct uploads
IA
304TB
scraped by AA
DuXiu
298TB
scraped by AA
Hathi
9TB
scraped by AA
Libgen.li
188TB
collab with AA
Z-Lib
77TB
collab with AA
Libgen.rs
82TB
mirrored by AA
Sci-Hub
90TB
mirrored by AA
⭐️ Our code and data are 100% open source.
了解更多……
✕
近期下载:
主页
主页
主页
主页
安娜的档案
主页
搜索
捐赠
🧬 SciDB
常问问题
🌐 zh - 中文 - 中文
am - አማርኛ - 阿姆哈拉语
ar - العربية - 阿拉伯语
ast - asturianu - 阿斯图里亚斯语
az - azərbaycan - 阿塞拜疆语
be - беларуская - 白俄罗斯语
bg - български - 保加利亚语
bn - বাংলা - 孟加拉语
br - Brasil: português - 葡萄牙语 (巴西)
ca - català - 加泰罗尼亚语
ckb - کوردیی ناوەندی - 中库尔德语
cs - čeština - 捷克语
da - dansk - 丹麦语
de - Deutsch - 德语
el - Ελληνικά - 希腊语
en - English - 英语
eo - Esperanto - 世界语
es - español - 西班牙语
et - eesti - 爱沙尼亚语
fa - فارسی - 波斯语
fi - suomi - 芬兰语
fil - Filipino - 菲律宾语
fr - français - 法语
gl - galego - 加利西亚语
gu - ગુજરાતી - 古吉拉特语
ha - Hausa - 豪萨语
he - עברית - 希伯来语
hi - हिन्दी - 印地语
hr - hrvatski - 克罗地亚语
hu - magyar - 匈牙利语
hy - հայերեն - 亚美尼亚语
id - Indonesia - 印度尼西亚语
it - italiano - 意大利语
ja - 日本語 - 日语
jv - Jawa - 爪哇语
ka - ქართული - 格鲁吉亚语
ko - 한국어 - 韩语
lt - lietuvių - 立陶宛语
ml - മലയാളം - 马拉雅拉姆语
mr - मराठी - 马拉地语
ms - Melayu - 马来语
ne - नेपाली - 尼泊尔语
nl - Nederlands - 荷兰语
no - norsk bokmål - 书面挪威语 (挪威)
or - ଓଡ଼ିଆ - 奥里亚语
pl - polski - 波兰语
ps - پښتو - 普什图语
pt - Portugal: português - 葡萄牙语 (葡萄牙)
ro - română - 罗马尼亚语
ru - русский - 俄语
sk - slovenčina - 斯洛伐克语
sl - slovenščina - 斯洛文尼亚语
sq - shqip - 阿尔巴尼亚语
sr - српски - 塞尔维亚语
sv - svenska - 瑞典语
ta - தமிழ் - 泰米尔语
te - తెలుగు - 泰卢固语
th - ไทย - 泰语
tr - Türkçe - 土耳其语
tw - 中文 (繁體) - 中文 (繁体)
uk - українська - 乌克兰语
ur - اردو - 乌尔都语
vec - veneto - 威尼斯语
vi - Tiếng Việt - 越南语
yue - 粵語 - 粤语
zh - 中文 - 中文 ☑️
账户
登录 / 注册
账户
公开资料
已下载文件
我的捐赠
Referrals
Explore
活动
代码浏览器
ISBN Visualization ↗
Community Projects ↗
Open data
数据集
种子
大语言模型数据
关注我们
联系邮箱
安娜的博客 ↗
Reddit ↗
Matrix ↗
Help out
改进元数据
志愿服务与悬赏
翻译 ↗
Development
安娜的软件 ↗
安全性
数字千年版权法(DCMA)/ 版权声明
镜像
annas-archive.li ↗
annas-archive.pm ↗
annas-archive.in ↗
SLUM
[无关联]
↗
SLUM 2
[无关联]
↗
搜索
搜索
捐赠
x2
捐赠
x2
账户
账户
搜索设置
✕
排序
最相关
最新
(出版年份)
最旧
(出版年份)
最大
(文件大小)
最小
(文件大小)
最新
(已开源)
最旧
(已开源)
随机
高级
搜索描述和元数据中的注释
增加特定搜索字段
内容
📘 非小说类图书
4
📕 小说类图书
0
📗 未知类型的图书
0
📰 杂志
0
💬 漫画
0
📝 标准文档
0
🎶 乐谱
0
🤨 其他
0
文件类型
open our viewer
pdf
2
epub
1
zip
0
mobi
1
fb2
0
cbr
0
txt
0
cbz
0
djvu
0
azw3
0
doc
0
lit
0
rtf
0
rar
0
htm
0
html
0
mht
0
docx
0
lrf
0
jpg
0
chm
0
azw
0
pdb
0
odt
0
ppt
0
xls
0
xlsx
0
json
0
prc
0
tar
0
tif
0
snb
0
updb
0
htmlz
0
7z
0
cb7
0
gz
0
pptx
0
exe
0
ai
0
更多……
访问方式
🚀 合作服务器下载
4
外部下载
4
外部借阅
0
外部借阅(无法打印)
0
包含在种子中
4
来源
Z‑Librarys [zlib]
4
安娜的档案抓取并开源
Libgen.li [lgli]
3
上传到安娜的档案 [upload]
0
IA [ia]
0
安娜的档案抓取并开源
HathiTrust [hathi]
0
安娜的档案抓取并开源
Libgen.rs [lgrs]
2
读秀 [duxiu]
0
安娜的档案抓取并开源
Nexus/STC [nexusstc]
3
Z‑Library中文 [zlibzh]
0
MagzDB [magzdb]
0
安娜的档案抓取并开源
Sci‑Hubs [scihub]
0
语言
中文 [zh]
0
英语 [en]
4
俄语 [ru]
0
西班牙语 [es]
0
法语 [fr]
0
德语 [de]
0
意大利语 [it]
0
葡萄牙语 [pt]
0
日语 [ja]
0
荷兰语 [nl]
0
保加利亚语 [bg]
0
波兰语 [pl]
0
阿拉伯语 [ar]
0
拉丁语 [la]
0
希伯来语 [he]
0
土耳其语 [tr]
0
匈牙利语 [hu]
0
捷克语 [cs]
0
繁体中文 [zh‑Hant]
0
瑞典语 [sv]
0
丹麦语 [da]
0
韩语 [ko]
0
乌克兰语 [uk]
0
印度尼西亚语 [id]
0
希腊语 [el]
0
罗马尼亚语 [ro]
0
立陶宛语 [lt]
0
孟加拉语 [bn]
0
加泰罗尼亚语 [ca]
0
挪威语 [no]
0
南非荷兰语 [af]
0
芬兰语 [fi]
0
印地语 [hi]
0
泰语 [th]
0
克罗地亚语 [hr]
0
塞尔维亚语 [sr]
0
爱尔兰语 [ga]
0
拉脱维亚语 [lv]
0
波斯语 [fa]
0
越南语 [vi]
0
斯洛伐克语 [sk]
0
卡纳达语 [kn]
0
藏语 [bo]
0
威尔士语 [cy]
0
爪哇语 [jv]
0
乌尔都语 [ur]
0
意第绪语 [yi]
0
亚美尼亚语 [hy]
0
卢旺达语 [rw]
0
白俄罗斯语 [be]
0
泰米尔语 [ta]
0
哈萨克语 [kk]
0
斯洛文尼亚语 [sl]
0
掸语 [shn]
0
蒙古语 [mn]
0
格鲁吉亚语 [ka]
0
爱沙尼亚语 [et]
0
世界语 [eo]
0
马拉地语 [mr]
0
泰卢固语 [te]
0
菲律宾语 [fil]
0
古吉拉特语 [gu]
0
加利西亚语 [gl]
0
马来语 [ms]
0
马拉雅拉姆语 [ml]
0
阿塞拜疆语 [az]
0
斯瓦希里语 [sw]
0
柯尔克孜语 [ky]
0
克丘亚语 [qu]
0
旁遮普语 [pa]
0
巴什基尔语 [ba]
0
阿尔巴尼亚语 [sq]
0
乌兹别克语 [uz]
0
巴斯克语 [eu]
0
缅甸语 [my]
0
波斯尼亚语 [bs]
0
阿姆哈拉语 [am]
0
库尔德语 [ku]
0
西弗里西亚语 [fy]
0
祖鲁语 [zu]
0
普什图语 [ps]
0
尼泊尔语 [ne]
0
维吾尔语 [ug]
0
索马里语 [so]
0
奥罗莫语 [om]
0
海地克里奥尔语 [ht]
0
马其顿语 [mk]
0
老挝语 [lo]
0
鞑靼语 [tt]
0
僧伽罗语 [si]
0
塔吉克语 [tg]
0
绍纳语 [sn]
0
巽他语 [su]
0
书面挪威语 [nb]
0
毛里求斯克里奥尔语 [mfe]
0
马拉加斯语 [mg]
0
科萨语 [xh]
0
信德语 [sd]
0
豪萨语 [ha]
0
齐切瓦语 [ny]
0
更多……
显示
列表
List (compact)
表格
搜索
搜索
Search settings
下载
期刊文章
数字借阅
元数据
结果集 1-4(总计 4)
lgli/F3thinker ! - Hands-On Penetration Testing with Kali NetHunter.pdf
HANDS-ON PENETRATION TESTING WITH KALI NETHUNTER : spy on and protect vulnerable ecosystems using ... the power of kali linux for pentesting on the go
Sean-Philip Oriyano, Glen D. Singh
Packt Publishing, Limited, 1st edition, 2019
Convert Android to a powerful pentesting platform. Key Features Get up and running with Kali Linux NetHunter Connect your Android device and gain full control over Windows, OSX, or Linux devices Crack Wi-Fi passwords and gain access to devices connected over the same network collecting intellectual data Book Description Kali NetHunter is a version of the popular and powerful Kali Linux pentesting platform, designed to be installed on mobile devices. Hands-On Penetration Testing with Kali NetHunter will teach you the components of NetHunter and how to install the software. You'll also learn about the different tools included and how to optimize and use a package, obtain desired results, perform tests, and make your environment more secure. Starting with an introduction to Kali NetHunter, you will delve into different phases of the pentesting process. This book will show you how to build your penetration testing environment and set up your lab. You will gain insight into gathering intellectual data, exploiting vulnerable areas, and gaining control over target systems. As you progress through the book, you will explore the NetHunter tools available for exploiting wired and wireless devices. You will work through new ways to deploy existing tools designed to reduce the chances of detection. In the concluding chapters, you will discover tips and best practices for integrating security hardening into your Android ecosystem. By the end of this book, you will have learned to successfully use a mobile penetration testing device based on Kali NetHunter and Android to accomplish the same tasks you would traditionally, but in a smaller and more mobile form factor. What you will learn Choose and configure a hardware device to use Kali NetHunter Use various tools during pentests Understand NetHunter suite components Discover tips to effectively use a compact mobile platform Create your own Kali NetHunter-enabled device and configure it for optimal results Learn to scan and gather information from a target Explore hardware adapters for testing and auditing wireless networks and Bluetooth devices Who this book is for Hands-On Penetration Testing with Kali NetHunter is for pentesters, ethical hackers, and security professionals who want to learn to use Kali NetHunter for complete mobile penetration testing and are interested in venturing into the mobile domain. Some prior understanding of networking assessment and Kali Linux will be helpful. Downloading the ex ..
更多信息……
英语 [en] · PDF · 6.1MB · 2019 · 📘 非小说类图书 · 🚀/lgli/zlib ·
Save
base score: 11068.0, final score: 17480.623
nexusstc/Improving your Penetration Testing Skills/cf5e86a1331e0695519382d3195151d6.mobi
Improving Your Penetration Testing Skills : Strengthen Your Defense Against Web Attacks with Kali Linux and Metasploit
Abhinav Singh; Daniel Teixeira; Juned Ahmed Ansari; Gilberto Najera-Gutierrez
Packt Publishing, Limited; Packt Publishing, Packt Publishing, Birmingham, 2019
Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition presents wireless pentesting from the ground up, and has been updated with the latest methodologies, including full coverage of the KRACK attack.About This BookLearn wireless penetration testing with Kali LinuxDetect hidden wireless networks and discover their namesExplore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffingDevelop your encryption cracking skills and gain an insight into the methods used by attackers and the underlying technologies that facilitate these attacksWho This Book Is ForKali Linux Wireless Penetration Testing Beginner's Guide, Third Edition is suitable for anyone who wants to learn more about pentesting and how to understand and defend against the latest wireless network attacks.What You Will LearnUnderstand the KRACK attack in full detailCreate a wireless lab for your experimentsSniff out wireless packets, hidden networks, and SSIDsCapture and crack WPA-2 keysSniff probe requests and track users through their SSID historyAttack radius authentication systemsSniff wireless traffic and collect interesting dataDecrypt encrypted traffic with stolen keysIn DetailAs wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of the professional penetration tester. This has been highlighted again recently with the discovery of the KRACK attack which enables attackers to potentially break into Wi-Fi networks encrypted with WPA2. The Kali Linux security distribution comes with a myriad of tools used for networking attacks and detecting security loopholes.Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition has been updated to Kali Linux 2017.3 with the latest methodologies, including full coverage of the KRACK attack and how to defend against it. The book presents wireless pentesting from the ground up, introducing all elements of penetration testing with each new technology. You'll learn various wireless testing methodologies by example, from the basics of wireless routing and encryption through to detailed coverage of hacking methods and attacks such as the Hirte and Caffe Latte.Style and approachKali Linux Wireless Penetration Testing Beginner's Guide, Third Edition is a practical, hands-on guide to modern wi-fi network hacking. It covers both the theory and practice of wireless pentesting, offering detailed, real-world coverage of the latest vulnerabilities and attacks.
更多信息……
英语 [en] · MOBI · 32.0MB · 2019 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib ·
Save
base score: 11055.0, final score: 17472.072
nexusstc/Hands-On Penetration Testing with Kali NetHunter/526bf4286eaeacd4c78d4d36156e0b5a.pdf
HANDS-ON PENETRATION TESTING WITH KALI NETHUNTER : spy on and protect vulnerable ecosystems using ... the power of kali linux for pentesting on the go
Sean-Philip Oriyano, Glen D. Singh
Packt Publishing, Limited, Packt Publishing, Birmingham, 2019
Convert Android to a powerful pentesting platform. Key Features Get up and running with Kali Linux NetHunter Connect your Android device and gain full control over Windows, OSX, or Linux devices Crack Wi-Fi passwords and gain access to devices connected over the same network collecting intellectual data Book Description Kali NetHunter is a version of the popular and powerful Kali Linux pentesting platform, designed to be installed on mobile devices. Hands-On Penetration Testing with Kali NetHunter will teach you the components of NetHunter and how to install the software. You'll also learn about the different tools included and how to optimize and use a package, obtain desired results, perform tests, and make your environment more secure. Starting with an introduction to Kali NetHunter, you will delve into different phases of the pentesting process. This book will show you how to build your penetration testing environment and set up your lab. You will gain insight into gathering intellectual data, exploiting vulnerable areas, and gaining control over target systems. As you progress through the book, you will explore the NetHunter tools available for exploiting wired and wireless devices. You will work through new ways to deploy existing tools designed to reduce the chances of detection. In the concluding chapters, you will discover tips and best practices for integrating security hardening into your Android ecosystem. By the end of this book, you will have learned to successfully use a mobile penetration testing device based on Kali NetHunter and Android to accomplish the same tasks you would traditionally, but in a smaller and more mobile form factor. What you will learn Choose and configure a hardware device to use Kali NetHunter Use various tools during pentests Understand NetHunter suite components Discover tips to effectively use a compact mobile platform Create your own Kali NetHunter-enabled device and configure it for optimal results Learn to scan and gather information from a target Explore hardware adapters for testing and auditing wireless networks and Bluetooth devices Who this book is for Hands-On Penetration Testing with Kali NetHunter is for pentesters, ethical hackers, and security professionals who want to learn to use Kali NetHunter for complete mobile penetration testing and are interested in venturing into the mobile domain. Some prior understanding of networking assessment and Kali Linux will be helpful. Downloading the ex ..
更多信息……
英语 [en] · PDF · 35.9MB · 2019 · 📘 非小说类图书 · 🚀/nexusstc/zlib ·
Save
base score: 11068.0, final score: 17465.91
nexusstc/Improving your Penetration Testing Skills/f0523263e86f93cd0155b828090c8cee.epub
Improving Your Penetration Testing Skills : Strengthen Your Defense Against Web Attacks with Kali Linux and Metasploit
Abhinav Singh; Daniel Teixeira; Juned Ahmed Ansari; Gilberto Najera-Gutierrez
Packt Publishing, Limited; Packt Publishing, Packt Publishing, Birmingham, 2019
Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition presents wireless pentesting from the ground up, and has been updated with the latest methodologies, including full coverage of the KRACK attack.About This BookLearn wireless penetration testing with Kali LinuxDetect hidden wireless networks and discover their namesExplore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffingDevelop your encryption cracking skills and gain an insight into the methods used by attackers and the underlying technologies that facilitate these attacksWho This Book Is ForKali Linux Wireless Penetration Testing Beginner's Guide, Third Edition is suitable for anyone who wants to learn more about pentesting and how to understand and defend against the latest wireless network attacks.What You Will LearnUnderstand the KRACK attack in full detailCreate a wireless lab for your experimentsSniff out wireless packets, hidden networks, and SSIDsCapture and crack WPA-2 keysSniff probe requests and track users through their SSID historyAttack radius authentication systemsSniff wireless traffic and collect interesting dataDecrypt encrypted traffic with stolen keysIn DetailAs wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of the professional penetration tester. This has been highlighted again recently with the discovery of the KRACK attack which enables attackers to potentially break into Wi-Fi networks encrypted with WPA2. The Kali Linux security distribution comes with a myriad of tools used for networking attacks and detecting security loopholes.Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition has been updated to Kali Linux 2017.3 with the latest methodologies, including full coverage of the KRACK attack and how to defend against it. The book presents wireless pentesting from the ground up, introducing all elements of penetration testing with each new technology. You'll learn various wireless testing methodologies by example, from the basics of wireless routing and encryption through to detailed coverage of hacking methods and attacks such as the Hirte and Caffe Latte.Style and approachKali Linux Wireless Penetration Testing Beginner's Guide, Third Edition is a practical, hands-on guide to modern wi-fi network hacking. It covers both the theory and practice of wireless pentesting, offering detailed, real-world coverage of the latest vulnerabilities and attacks.
更多信息……
英语 [en] · EPUB · 33.3MB · 2019 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib ·
Save
base score: 11065.0, final score: 17457.486
上一页
1
下一页
上一页
1
下一页