-
Notifications
You must be signed in to change notification settings - Fork 1
/
bookpage.html
57 lines (56 loc) · 5.03 KB
/
bookpage.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
<!DOCTYPE html>
<html>
<head>
<title>LHC</title>
<link rel="stylesheet" type="text/css" href="lhcWeb.css">
<link href="https://fonts.googleapis.com/css?family=Orbitron:400,500&display=swap" rel="stylesheet">
</head>
<body>
<div class ="kickASCIIArt"> <!-- ascii art came from: http://patorjk.com/software/taag/#p=display&f=Alpha&t=LHC !-->
_____ _____ _____
/\ \ /\ \ /\ \
/::\____\ /::\____\ /::\ \
/:::/ / /:::/ / /::::\ \
/:::/ / /:::/ / /::::::\ \
/:::/ / /:::/ / /:::/\:::\ \
/:::/ / /:::/____/ /:::/ \:::\ \
/:::/ / /::::\ \ /:::/ \:::\ \
/:::/ / /::::::\ \ _____ /:::/ / \:::\ \
/:::/ / /:::/\:::\ \ /\ \ /:::/ / \:::\ \
/:::/____/ /:::/ \:::\ /::\____\/:::/____/ \:::\____\
\:::\ \ \::/ \:::\ /:::/ /\:::\ \ \::/ /
\:::\ \ \/____/ \:::\/:::/ / \:::\ \ \/____/
\:::\ \ \::::::/ / \:::\ \
\:::\ \ \::::/ / \:::\ \
\:::\ \ /:::/ / \:::\ \
\:::\ \ /:::/ / \:::\ \
\:::\ \ /:::/ / \:::\ \
\:::\____\ /:::/ / \:::\____\
\::/ / \::/ / \::/ /
\/____/ \/____/ \/____/
</div>
<p>
<img id="mainLogo"src="Media/Images/dc26_LHC.png">
</p>
<h1>Welcome to the Lonely Hackers Club</h1>
<div></div>
<h2>So you wanna get your learn on huh?</h2>
<p> Below is intended to be a growing list of books to help you level up those hacker skills </p>
<h2>The Knowledgebase</h2>
<ul>
<li><a href="https://www.amazon.com/Hacking-Art-Exploitation-Jon-Erickson/dp/1593271441/ref=zg_bs_3648_16/146-3560802-7928156?_encoding=UTF8&psc=1&refRID=CZ7DTTVV0SYDJ6GCPJAS">Hacking the Art of exploitation</a></li>
<li><a href="https://www.amazon.com/Practical-Malware-Analysis-Hands-Dissecting/dp/1593272901/ref=pd_sim_14_10?_encoding=UTF8&pd_rd_i=1593272901&pd_rd_r=b4ea2881-8cb3-11e9-8154-9f1dd9ddcc5a&pd_rd_w=qLy5v&pd_rd_wg=pgywx&pf_rd_p=90485860-83e9-4fd9-b838-b28a9b7fda30&pf_rd_r=GJ8GRDJ37A1JHD8PKAY1&psc=1&refRID=GJ8GRDJ37A1JHD8PKAY1">Practical Malware Analysis</a></li>
<li><a href="https://www.amazon.com/Practical-Binary-Analysis-Instrumentation-Disassembly/dp/1593279124/ref=pd_sim_14_4/146-3560802-7928156?_encoding=UTF8&pd_rd_i=1593279124&pd_rd_r=fee9f21b-8cb3-11e9-88b6-296fde8ba69d&pd_rd_w=LmaQ8&pd_rd_wg=7VuH5&pf_rd_p=90485860-83e9-4fd9-b838-b28a9b7fda30&pf_rd_r=QAMV9MQMYQSBPE56325W&psc=1&refRID=QAMV9MQMYQSBPE56325W">Practical Binary Analysis</a></li>
<li><a href="https://www.amazon.com/Serious-Cryptography-Practical-Introduction-Encryption/dp/1593278268/ref=pd_sim_14_5/146-3560802-7928156?_encoding=UTF8&pd_rd_i=1593278268&pd_rd_r=07f67696-8cb6-11e9-8b6f-77dce06f1523&pd_rd_w=gu4Cf&pd_rd_wg=b1N4w&pf_rd_p=90485860-83e9-4fd9-b838-b28a9b7fda30&pf_rd_r=GQYBWDCQ4KT8BAV6402D&psc=1&refRID=GQYBWDCQ4KT8BAV6402D">Serious Cryptography</a></li>
<li><a href="https://www.amazon.com/PoC-GTFO-Manul-Laphroaig/dp/1593278802/ref=sr_1_1?crid=G2H20YFYBA5X&keywords=poc+gtfo&qid=1560305033&s=books&sprefix=POC+%2Cstripbooks%2C144&sr=1-1">PoC or GTFO</a></li>
<li><a href="https://www.amazon.com/PoC-GTFO-2-Manul-Laphroaig/dp/1593279345/ref=pd_sim_14_1/146-3560802-7928156?_encoding=UTF8&pd_rd_i=1593279345&pd_rd_r=56387d74-8cb6-11e9-9657-19c495c5efa1&pd_rd_w=fVVMm&pd_rd_wg=KupOY&pf_rd_p=90485860-83e9-4fd9-b838-b28a9b7fda30&pf_rd_r=V9V2XCPZMR8JKVVQX2XP&psc=1&refRID=V9V2XCPZMR8JKVVQX2XP">PoC or GTFO Volume 2</a></li>
<li><a href="https://www.amazon.com/Social-Engineering-Art-Human-Hacking/dp/0470639539/ref=tmm_pap_swatch_0?_encoding=UTF8&qid=1560305948&sr=1-5">Social Engineering: The Art of Human Hacking</a></li>
<li><a href="https://www.amazon.com/Open-Source-Intelligence-Techniques-Information/dp/1984201573/ref=pd_sim_14_10?_encoding=UTF8&pd_rd_i=1984201573&pd_rd_r=7d148a88-8cb8-11e9-a0b4-b1880fe3900a&pd_rd_w=ZyFi6&pd_rd_wg=WYVsC&pf_rd_p=90485860-83e9-4fd9-b838-b28a9b7fda30&pf_rd_r=8YDQWW6DBAMYCW1CJGKR&psc=1&refRID=8YDQWW6DBAMYCW1CJGKR">Open Source intelligence Techniques</a></li>
<li><a href="https://www.amazon.com/Black-Hat-Python-Programming-Pentesters/dp/1593275900/ref=pd_sim_14_5/146-3560802-7928156?_encoding=UTF8&pd_rd_i=1593275900&pd_rd_r=b4ea2881-8cb3-11e9-8154-9f1dd9ddcc5a&pd_rd_w=qLy5v&pd_rd_wg=pgywx&pf_rd_p=90485860-83e9-4fd9-b838-b28a9b7fda30&pf_rd_r=GJ8GRDJ37A1JHD8PKAY1&psc=1&refRID=GJ8GRDJ37A1JHD8PKAY1">Black Hat Python</a></li>
</ul>
<footer> <!-- if you author something, add yourself here-->
<p>Authored By:</p>
<p><a href="https://twitter.com/last_person">LP</a></p>
</footer>
</body>
</html>