Most Read This Week In Hackers


Most Read This Week Tagged "Hackers"

Sidetracked (Mindf*ck, #2)
Coders: The Making of a New Tribe and the Remaking of the World
Breaking And Entering: The Extraordinary Story of a Hacker Called "Alien"
White-Hot Hack (Kate and Ian, #2)
Playing With Fire (#Hacker, #1)
@War: The Rise of the Military-Internet Complex
Kill Process (Kill Chain, #1)
Black Dawn (Titan, #6)
Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News
Immoral Code
HACKING WITH SMART PHONES
Threat Modeling: Designing for Security
Ethical Hacking and Penetration Testing Guide
Zero Hour (Wired & Dangerous, #1)
Tor and the Dark Art of Anonymity (deep web, kali linux, hacking, bitcoins) : Network Security for the Rest of Us
The Hardware Hacker: Adventures in Making and Breaking Hardware
The Browser Hacker's Handbook
Penetration Testing: A Hands-On Introduction to Hacking
Exploited (Zero Day, #1)
In Too Deep (#Hacker, #2)
The Book of PoC||GTFO
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
Kali Linux Wireless Penetration Testing: Beginner's Guide: Learn to penetrate Wi-Fi and wireless networks to secure your system from vulnerabilities
Ones and Zeroes (Mirador, #2)
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
How to Hack: Hacking Secrets Exposed: A Beginner's Guide
Digital Horizon (#Hacker, #3)
Darkest Night (Wired & Dangerous, #2)
Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder.
A Geek Girl's Guide to Murder (Geek Girl Mysteries, #1)
dotwav
Sweetest Surrender (The Serafina: Sin City, #3)
Dangerous Surrender (The Serafina: Sin City, #4)
The Hacker Playbook 2: Practical Guide To Penetration Testing
Echoes
The Maker's Guide to the Zombie Apocalypse: Defend Your Base with Simple Circuits, Arduino, and Raspberry Pi
Trust Me (Find Me, #3)
Don't Let Go (PERSEFoNE, #3)
Red Team Field Manual
The Coming Swarm: DDOS Actions, Hacktivism, and Civil Disobedience on the Internet
Unmasking the Social Engineer: The Human Element of Security
Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous
Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door
The Hacker Playbook: Practical Guide to Penetration Testing
The Perfect Weapon: How the Cyber Arms Race Set the World Afire
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
Remember Me (Find Me, #2)
Black Hat Python: Python Programming for Hackers and Pentesters
Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance

While they are busy with reconnaissance, focus on exploitation. PS : reconnaissance is an ESSENTIAL phase.
Amine Essiraj

This is our world now... the world of the electron and the switch, the beauty of the baud. We make use of a service already existing without paying for what could be dirt-cheap if it wasn't run by profiteering gluttons, and you call us criminals. We explore... and you call us criminals. We seek after knowledge... and you call us criminals. We exist without skin color, without nationality, without religious bias... and you call us criminals. You build atomic bombs, you wage wars, you murder, chea ...more
The Mentor

More quotes...
A place for fans of news.ycombinator.com can discuss and share about books they like.
138 members, last active 9 years ago
What do you read that helps you "hack" learning? What books make you better? What teaching and l…more
2 members, last active 10 years ago
Q&A with Chloe Bierge ...June 01, 2011 to July 01, 2011...
2 members, last active 14 years ago
B&N Nook Color & Tablet Users Affinity and support group for Nook Color, Nook Tablet, Nook HD, and Nook HD+ users/supporters :…more
236 members, last active 8 years ago

Tags

Tags contributing to this page include: hackers, hacker, and hacking