![[ICO]](/icons/blank.gif) | Name | Last modified | Size | Description |
|
![[PARENTDIR]](/icons/back.gif) | Parent Directory | | - | |
![[ ]](/icons/layout.gif) | wiresharkforsecurityprofessionals.pdf | 2025-04-18 10:48 | 15M | |
![[ ]](/icons/layout.gif) | whatcomputersstillcantdo_acritiqueofartificialreason.pdf | 2025-04-18 10:48 | 31M | |
![[ ]](/icons/layout.gif) | wehaveroot_evenmoreadvicefromschneieronsecurity.pdf | 2025-04-18 10:49 | 4.8M | |
![[ ]](/icons/layout.gif) | weekendhomesteader.pdf | 2025-04-18 10:49 | 12M | |
![[ ]](/icons/layout.gif) | webpenetrationtestingwithkalilinux_ebook.pdf | 2025-04-18 10:49 | 24M | |
![[ ]](/icons/layout.gif) | web_application_hackers_handbook_finding_and_exploiting_security_flaws.pdf | 2025-04-18 10:49 | 16M | |
![[ ]](/icons/layout.gif) | urbansurvivalguide.pdf | 2025-04-18 10:49 | 8.0M | |
![[ ]](/icons/layout.gif) | unixpowertools.pdf | 2025-04-18 10:49 | 6.5M | |
![[ ]](/icons/layout.gif) | understandingintelligence.pdf | 2025-04-18 10:49 | 32M | |
![[ ]](/icons/layout.gif) | ultimateself-sufficiencyhandbook.pdf | 2025-04-18 10:49 | 13M | |
![[ ]](/icons/layout.gif) | ultimatepreppershandbook.pdf | 2025-04-18 10:49 | 25M | |
![[ ]](/icons/layout.gif) | ultimateguidetoself-reliantlivingthe.pdf | 2025-04-18 10:49 | 64M | |
![[ ]](/icons/layout.gif) | ultimateguidetonavigatingwithoutacompass.pdf | 2025-04-18 10:49 | 13M | |
![[ ]](/icons/layout.gif) | ultimateguidetomushrooms.pdf | 2025-04-18 10:49 | 60M | |
![[ ]](/icons/layout.gif) | ultimatebookofeverydayknots.pdf | 2025-04-18 10:49 | 30M | |
![[ ]](/icons/layout.gif) | turingtest_verbalbehaviorasthehallmarkofintelligence.pdf | 2025-04-18 10:49 | 1.5M | |
![[ ]](/icons/layout.gif) | tribeofhackersredteam_tribalknowledgefromthebestinoffensivecybersecurity.pdf | 2025-04-18 10:49 | 12M | |
![[ ]](/icons/layout.gif) | tribeofhackers_cybersecurityadvicefromthebesthackersintheworld.pdf | 2025-04-18 10:49 | 13M | |
![[ ]](/icons/layout.gif) | trappersbible.pdf | 2025-04-18 10:49 | 62M | |
![[ ]](/icons/layout.gif) | totalsurvival.pdf | 2025-04-18 10:49 | 8.9M | |
![[ ]](/icons/layout.gif) | threat_modeling_designing_for_security.pdf | 2025-04-18 10:49 | 22M | |
![[ ]](/icons/layout.gif) | theultimatesh_thitsthefansurvivalguide.pdf | 2025-04-18 10:49 | 12M | |
![[ ]](/icons/layout.gif) | thepocketguidetoprepperknots.pdf | 2025-04-18 10:49 | 2.9M | |
![[ ]](/icons/layout.gif) | thepocketfirst-aidfieldguide.pdf | 2025-04-18 10:49 | 3.1M | |
![[ ]](/icons/layout.gif) | themachinequestion.pdf | 2025-04-18 10:50 | 6.5M | |
![[ ]](/icons/layout.gif) | thejoyofsmokingandsaltcuring.pdf | 2025-04-18 10:50 | 18M | |
![[ ]](/icons/layout.gif) | thejoyofhomedistilling.pdf | 2025-04-18 10:50 | 3.0M | |
![[ ]](/icons/layout.gif) | theidaprobook_2ndedition.pdf | 2025-04-18 10:50 | 9.1M | |
![[ ]](/icons/layout.gif) | theallureofmachiniclife.pdf | 2025-04-18 10:50 | 2.9M | |
![[ ]](/icons/layout.gif) | tensorflow2pocketprimer.pdf | 2025-04-18 10:50 | 7.4M | |
![[ ]](/icons/layout.gif) | tensorflow2.pdf | 2025-04-18 10:50 | 3.2M | |
![[ ]](/icons/layout.gif) | survivingtheapocalypse.pdf | 2025-04-18 10:50 | 14M | |
![[ ]](/icons/layout.gif) | survivalistshandbook.pdf | 2025-04-18 10:50 | 32M | |
![[ ]](/icons/layout.gif) | softwaretestingprinciplesandpractices.pdf | 2025-04-18 10:50 | 20M | |
![[ ]](/icons/layout.gif) | socialengineering_thescienceofhumanhacking_2ndedition.pdf | 2025-04-18 10:50 | 9.4M | |
![[ ]](/icons/layout.gif) | simplerlivingsecondedition-revisedandupdated.pdf | 2025-04-18 10:50 | 32M | |
![[ ]](/icons/layout.gif) | shellcoders_handbook_discovering_and_exploiting_security_holes.pdf | 2025-04-18 10:50 | 3.5M | |
![[ ]](/icons/layout.gif) | seriouscrytography_ebook.pdf | 2025-04-18 10:50 | 4.7M | |
![[ ]](/icons/layout.gif) | sedandawk.pdf | 2025-04-18 10:50 | 6.1M | |
![[ ]](/icons/layout.gif) | security_engineering_a_guide_to_building_dependable_distributed_systems.pdf | 2025-04-18 10:50 | 5.8M | |
![[ ]](/icons/layout.gif) | secrets_and_lies_digital_security_in_a_networked_world.pdf | 2025-04-18 10:50 | 3.8M | |
![[ ]](/icons/layout.gif) | sciencesoftheartificial.pdf | 2025-04-18 10:50 | 837K | |
![[ ]](/icons/layout.gif) | robotsex_socialandethicalimplications.pdf | 2025-04-18 10:50 | 2.7M | |
![[ ]](/icons/layout.gif) | reversing_secretsofreverseengineering.pdf | 2025-04-18 10:50 | 8.2M | |
![[ ]](/icons/layout.gif) | pythonbasics_aselfteachingintroduction.pdf | 2025-04-18 10:50 | 12M | |
![[ ]](/icons/layout.gif) | python_anintroductiontoprogramming.pdf | 2025-04-18 10:50 | 15M | |
![[ ]](/icons/layout.gif) | python3programmingpocketprimer.pdf | 2025-04-18 10:50 | 4.2M | |
![[ ]](/icons/layout.gif) | python3formachinelearning.pdf | 2025-04-18 10:50 | 3.0M | |
![[ ]](/icons/layout.gif) | python3_pocketprimer.pdf | 2025-04-18 10:50 | 3.9M | |
![[ ]](/icons/layout.gif) | programmingfundamentalsusingmatlab.pdf | 2025-04-18 10:50 | 31M | |
![[ ]](/icons/layout.gif) | programmingfundamentalsusingjava_agameapplicationapproach.pdf | 2025-04-18 10:50 | 10M | |
![[ ]](/icons/layout.gif) | prepperspantryhandbook.pdf | 2025-04-18 10:50 | 2.4M | |
![[ ]](/icons/layout.gif) | prepperspantry.pdf | 2025-04-18 10:50 | 5.5M | |
![[ ]](/icons/layout.gif) | prepperguns.pdf | 2025-04-18 10:50 | 17M | |
![[ ]](/icons/layout.gif) | practiceofnetworksecuritymonitoring.pdf | 2025-04-18 10:50 | 29M | |
![[ ]](/icons/layout.gif) | practicalpacketanalysis.pdf | 2025-04-18 10:50 | 15M | |
![[ ]](/icons/layout.gif) | practicalmobileforensics_ebook.pdf | 2025-04-18 10:50 | 17M | |
![[ ]](/icons/layout.gif) | practicalcyberintelligence_ebook.pdf | 2025-04-18 10:50 | 35M | |
![[ ]](/icons/layout.gif) | practicalbinaryanalysis.pdf | 2025-04-18 10:50 | 33M | |
![[ ]](/icons/layout.gif) | practical_reverse_engineering_x86_x64_arm_windows_kernel_reversing_tools_and_obfuscation.pdf | 2025-04-18 10:50 | 4.5M | |
![[ ]](/icons/layout.gif) | pocorgtfobible_vol2.pdf | 2025-04-18 10:50 | 148M | |
![[ ]](/icons/layout.gif) | pocorgtfobible.pdf | 2025-04-18 10:50 | 51M | |
![[ ]](/icons/layout.gif) | pentestingazureapplications_ebook.pdf | 2025-04-18 10:51 | 5.0M | |
![[ ]](/icons/layout.gif) | officialusarmysurvivalmanualupdated.pdf | 2025-04-18 10:51 | 39M | |
![[ ]](/icons/layout.gif) | norbertwiener_alifeincyberneticsexprodigymychildhoodandyouthandi.pdf | 2025-04-18 10:51 | 3.2M | |
![[ ]](/icons/layout.gif) | no-diggardening.pdf | 2025-04-18 10:51 | 22M | |
![[ ]](/icons/layout.gif) | networksecurityandcryptography.pdf | 2025-04-18 10:51 | 5.1M | |
![[ ]](/icons/layout.gif) | multimediawebdesignanddevelopment.pdf | 2025-04-18 10:51 | 6.4M | |
![[ ]](/icons/layout.gif) | msexcel2019programmingbyexample.pdf | 2025-04-18 10:51 | 51M | |
![[ ]](/icons/layout.gif) | msexcel2016.pdf | 2025-04-18 10:51 | 5.5M | |
![[ ]](/icons/layout.gif) | minifarmingbible.pdf | 2025-04-18 10:51 | 35M | |
![[ ]](/icons/layout.gif) | microsoftoffice2013_365andbeyond.pdf | 2025-04-18 10:51 | 72M | |
![[ ]](/icons/layout.gif) | microsoftexcelfunctionsandformulas_5e.pdf | 2025-04-18 10:51 | 54M | |
![[ ]](/icons/layout.gif) | microsoftexcel2019programmingwithvbaxmlandasp.pdf | 2025-04-18 10:51 | 50M | |
![[ ]](/icons/layout.gif) | microsoftaccess2019programmingwithvbaxmlandasp.pdf | 2025-04-18 10:51 | 50M | |
![[ ]](/icons/layout.gif) | microsoftaccess2019programmingpocketprimer.pdf | 2025-04-18 10:51 | 7.6M | |
![[ ]](/icons/layout.gif) | mathematicsforcomputergraphicsandgameprogramming.pdf | 2025-04-18 10:51 | 3.5M | |
![[ ]](/icons/layout.gif) | masteringregularexpressions.pdf | 2025-04-18 10:51 | 4.4M | |
![[ ]](/icons/layout.gif) | masteringlinuxsecurityandhardening.pdf | 2025-04-18 10:51 | 9.4M | |
![[ ]](/icons/layout.gif) | masteringkalilinuxforadvancedpenetrationtesting.pdf | 2025-04-18 10:51 | 36M | |
![[ ]](/icons/layout.gif) | malwaredatascience.pdf | 2025-04-18 10:51 | 8.1M | |
![[ ]](/icons/layout.gif) | malware_analysts_cookbook_and_dvd_tools_and_techniques_for_fighting_malicious_code.pdf | 2025-04-18 10:51 | 19M | |
![[ ]](/icons/layout.gif) | madeupmindsa_constructivistapproachtoartificialintelligence.pdf | 2025-04-18 10:51 | 9.5M | |
![[ ]](/icons/layout.gif) | linuxsystemprogramming.pdf | 2025-04-18 10:51 | 8.1M | |
![[ ]](/icons/layout.gif) | linuxpocketguide_3rdedition.pdf | 2025-04-18 10:51 | 3.0M | |
![[ ]](/icons/layout.gif) | linuxinanutshell.pdf | 2025-04-18 10:51 | 5.7M | |
![[ ]](/icons/layout.gif) | linuxdevicedrivers.pdf | 2025-04-18 10:51 | 5.2M | |
![[ ]](/icons/layout.gif) | linuxbasicsforhackers.pdf | 2025-04-18 10:51 | 7.5M | |
![[ ]](/icons/layout.gif) | learningtheviandvimeditors_7thedition.pdf | 2025-04-18 10:51 | 5.7M | |
![[ ]](/icons/layout.gif) | learningthebashshell_3rdedition.pdf | 2025-04-18 10:51 | 2.0M | |
![[ ]](/icons/layout.gif) | learningmalwareanalysis_ebook.pdf | 2025-04-18 10:51 | 31M | |
![[ ]](/icons/layout.gif) | learninginembeddedsystems.pdf | 2025-04-18 10:51 | 7.2M | |
![[ ]](/icons/layout.gif) | learninggnuemacs_3rdedition.pdf | 2025-04-18 10:51 | 9.7M | |
![[ ]](/icons/layout.gif) | kalilinuxwebpenetrationtestingcookbook.pdf | 2025-04-18 10:51 | 22M | |
![[ ]](/icons/layout.gif) | kalilinux2018_assuringsecuritybypenetrationtesting.pdf | 2025-04-18 10:51 | 47M | |
![[ ]](/icons/layout.gif) | investigatingcryptocurrencies.pdf | 2025-04-18 10:51 | 18M | |
![[ ]](/icons/layout.gif) | introductionto3dgameprogrammingwithdirectx12.pdf | 2025-04-18 10:51 | 18M | |
![[ ]](/icons/layout.gif) | introducingregularexpressions.pdf | 2025-04-18 10:51 | 8.5M | |
![[ ]](/icons/layout.gif) | intro3dgameprogrammingdx12.pdf | 2025-04-18 10:51 | 19M | |
![[ ]](/icons/layout.gif) | illustratedencyclopediaofnaturalremedies.pdf | 2025-04-18 10:51 | 86M | |
![[ ]](/icons/layout.gif) | horizonsofevolutionaryrobotics.pdf | 2025-04-18 10:51 | 7.3M | |
![[ ]](/icons/layout.gif) | hdlwithdigitaldesign.pdf | 2025-04-18 10:51 | 6.8M | |
![[ ]](/icons/layout.gif) | handsonredteamtactics.pdf | 2025-04-18 10:51 | 90M | |
![[ ]](/icons/layout.gif) | handsonawspenetrationtestingwithkalilinux.pdf | 2025-04-18 10:52 | 36M | |
![[ ]](/icons/layout.gif) | hackingthexbox.pdf | 2025-04-18 10:52 | 24M | |
![[ ]](/icons/layout.gif) | guidetomakingfirewithoutmatches.pdf | 2025-04-18 10:52 | 17M | |
![[ ]](/icons/layout.gif) | greppocketref.pdf | 2025-04-18 10:52 | 1.6M | |
![[ ]](/icons/layout.gif) | greenberetsurvivalguide.pdf | 2025-04-18 10:52 | 14M | |
![[ ]](/icons/layout.gif) | gametestingthirdedition.pdf | 2025-04-18 10:52 | 7.3M | |
![[ ]](/icons/layout.gif) | gamedevelopmentusingpython.pdf | 2025-04-18 10:52 | 6.5M | |
![[ ]](/icons/layout.gif) | foragingforsurvival.pdf | 2025-04-18 10:52 | 14M | |
![[ ]](/icons/layout.gif) | flowchartandalgorithmbasics.pdf | 2025-04-18 10:52 | 8.9M | |
![[ ]](/icons/layout.gif) | farmmadeessentialskillsbook.pdf | 2025-04-18 10:52 | 9.3M | |
![[ ]](/icons/layout.gif) | everydaywoodworking.pdf | 2025-04-18 10:52 | 15M | |
![[ ]](/icons/layout.gif) | essentialguidetoself-sufficientliving.pdf | 2025-04-18 10:52 | 7.8M | |
![[ ]](/icons/layout.gif) | embeddedvision.pdf | 2025-04-18 10:52 | 36M | |
![[ ]](/icons/layout.gif) | effectiveawk.pdf | 2025-04-18 10:52 | 4.5M | |
![[ ]](/icons/layout.gif) | disasterpreparednesshandbook.pdf | 2025-04-18 10:52 | 10M | |
![[ ]](/icons/layout.gif) | digitalmindhowscienceisredefininghumanity.pdf | 2025-04-18 10:52 | 6.6M | |
![[ ]](/icons/layout.gif) | designingbsdrootkits.pdf | 2025-04-18 10:52 | 8.8M | |
![[ ]](/icons/layout.gif) | deeplearningrevolution.pdf | 2025-04-18 10:52 | 23M | |
![[ ]](/icons/layout.gif) | datastructuresandprogramdesignusingpython.pdf | 2025-04-18 10:52 | 26M | |
![[ ]](/icons/layout.gif) | datastructuresandprogramdesignusingjava.pdf | 2025-04-18 10:52 | 13M | |
![[ ]](/icons/layout.gif) | datasetshiftinmachinelearning.pdf | 2025-04-18 10:52 | 2.1M | |
![[ ]](/icons/layout.gif) | datasciencetoolsr-excel-knime-openoffice.pdf | 2025-04-18 10:52 | 31M | |
![[ ]](/icons/layout.gif) | datacleaning_pocketprimer.pdf | 2025-04-18 10:52 | 1.4M | |
![[ ]](/icons/layout.gif) | dataanalysisforbusinessdecisionssecondedition.pdf | 2025-04-18 10:52 | 43M | |
![[ ]](/icons/layout.gif) | cybersecurityblueteamtoolkit.pdf | 2025-04-18 10:52 | 16M | |
![[ ]](/icons/layout.gif) | cybersecurityaself-teachingintroduction.pdf | 2025-04-18 10:52 | 5.3M | |
![[ ]](/icons/layout.gif) | cybersecurity_attackanddefensestrategies_ebook.pdf | 2025-04-18 10:52 | 27M | |
![[ ]](/icons/layout.gif) | cybernetics_orthecontrolandcommunicationintheanimalandthemachine.pdf | 2025-04-18 10:52 | 4.1M | |
![[ ]](/icons/layout.gif) | cryptographyapocalypse_preparingforthedaywhenquantumcomputingbreakstodayscrypto.pdf | 2025-04-18 10:52 | 5.2M | |
![[ ]](/icons/layout.gif) | cryptography_engineering_design_principles_and_practical_applications.pdf | 2025-04-18 10:52 | 2.8M | |
![[ ]](/icons/layout.gif) | cprogramming_pocketprimer.pdf | 2025-04-18 10:52 | 879K | |
![[ ]](/icons/layout.gif) | cprogramming_aselfteachingintroduction.pdf | 2025-04-18 10:52 | 1.9M | |
![[ ]](/icons/layout.gif) | computergraphicsprogrammminginopenglusingcplusplussecondedition.pdf | 2025-04-18 10:52 | 56M | |
![[ ]](/icons/layout.gif) | completeguidetoediblewildplants.pdf | 2025-04-18 10:52 | 15M | |
![[ ]](/icons/layout.gif) | cloudcomputingbasics_aselfteachingintroduction.pdf | 2025-04-18 10:52 | 6.6M | |
![[ ]](/icons/layout.gif) | classicshellscripting.pdf | 2025-04-18 10:52 | 7.5M | |
![[ ]](/icons/layout.gif) | classicgamedesign.pdf | 2025-04-18 10:52 | 32M | |
![[ ]](/icons/layout.gif) | canitandfermentit.pdf | 2025-04-18 10:52 | 28M | |
![[ ]](/icons/layout.gif) | camperssurvivalguide.pdf | 2025-04-18 10:52 | 1.9M | |
![[ ]](/icons/layout.gif) | bushcraftbasics.pdf | 2025-04-18 10:52 | 16M | |
![[ ]](/icons/layout.gif) | bigbookofbackyardmedicine.pdf | 2025-04-18 10:52 | 79M | |
![[ ]](/icons/layout.gif) | becomingthehacker.pdf | 2025-04-18 10:52 | 11M | |
![[ ]](/icons/layout.gif) | bashcookbook.pdf | 2025-04-18 10:53 | 7.0M | |
![[ ]](/icons/layout.gif) | bashcommandlineandshellscriptspocketprimer.pdf | 2025-04-18 10:53 | 17M | |
![[ ]](/icons/layout.gif) | backtobasics.pdf | 2025-04-18 10:53 | 79M | |
![[ ]](/icons/layout.gif) | autodeskrevit2020architecture.pdf | 2025-04-18 10:53 | 29M | |
![[ ]](/icons/layout.gif) | autocad20203dmodeling.pdf | 2025-04-18 10:53 | 34M | |
![[ ]](/icons/layout.gif) | autocad2019beginningandintermediate.pdf | 2025-04-18 10:53 | 45M | |
![[ ]](/icons/layout.gif) | attackingnetworkprotocols_ebook.pdf | 2025-04-18 10:53 | 7.3M | |
![[ ]](/icons/layout.gif) | artificialminds.pdf | 2025-04-18 10:53 | 18M | |
![[ ]](/icons/layout.gif) | artificialintelligenceinthe21stcentury.pdf | 2025-04-18 10:53 | 50M | |
![[ ]](/icons/layout.gif) | artificialintelligence_theveryidea.pdf | 2025-04-18 10:53 | 97M | |
![[ ]](/icons/layout.gif) | art_of_memory_forensics_detecting_malware_and_threats_in_windows_linux_and_mac_memory.pdf | 2025-04-18 10:53 | 14M | |
![[ ]](/icons/layout.gif) | applied_cryptography_protocols_algorithms_and_source_code_in_c.pdf | 2025-04-18 10:53 | 56M | |
![[ ]](/icons/layout.gif) | angularandmachinelearningpocketprimer.pdf | 2025-04-18 10:53 | 4.2M | |
![[ ]](/icons/layout.gif) | angularanddeeplearningpocketprimer.pdf | 2025-04-18 10:53 | 3.8M | |
![[ ]](/icons/layout.gif) | adventuresinedibleplantforaging.pdf | 2025-04-18 10:53 | 5.3M | |
![[ ]](/icons/layout.gif) | advancedpenetrationtesting.pdf | 2025-04-18 10:53 | 10M | |
![[ ]](/icons/layout.gif) | abughuntersdiary.pdf | 2025-04-18 10:53 | 7.1M | |
![[ ]](/icons/layout.gif) | SBAHJ_and_the_Quest_for_the_Missing_Spoon.pdf | 2025-04-18 10:53 | 152M | |
![[ ]](/icons/layout.gif) | 150survivalsecrets.pdf | 2025-04-18 10:53 | 7.7M | |
![[ ]](/icons/layout.gif) | 52prepperprojects.pdf | 2025-04-18 10:53 | 9.4M | |
![[ ]](/icons/layout.gif) | 3dprinting.pdf | 2025-04-18 10:53 | 27M | |
|