This repository contains a curated collection of Linux-related PDF documents that I've accumulated over the years. I've gathered them here for easy access, making it convenient for myself and others to quickly find or revisitt these valuable resources. Some of these documents might be new or unfamiliar to you, but rest assured, each one is tied to Linux in some way. Although this is just a small contribution, it represents my first meaningful step in giving back to a community I truly respect. Always free as in freedom. Keep learning and stay Fresh!
Here are some of the many pdf's available in this repo, organized according to content.
-
LPI-Learning-Material-102-500-en.pdf - Study Material For LPIC-1 - Second Exam
-
LPI-Learning-Material-101-500-en.pdf - Study Material For LPIC-1 - First Exam
-
LPI-Learning-Material-030-100-en.pdf - Study Material For Web Development Essentials - Version 1.0
-
LPI-Learning-Material-010-160-en.pdf - Study Material For Linux Essentials - Version 1.6
-
LPI-Security-Essentials-Study-Guide-Exam-020-100-2023.pdf - Study Guide For LPI Security Essentials Exam
-
A-Hacker-Manifesto-McKenzie-Wark.pdf - A philosophical look at hacking culture.
-
BH2018_REMOTELY_ATACKING_SYSTEM_FIRMWARE_FINAL.pdf - Exploiting system firmware vulnerabilities remotely.
-
DC26_UEFI_EXPLOITATION_MASSES_FINAL.pdf - Exploiting UEFI firmware.
-
The-Hacker-Playbook-2.pdf - A practical guide to penetration testing techniques.
-
Penetration-Testing-A-Hands-On-Intro-To-Hacking.pdf - Introduction to penetration testing with hands-on examples.
-
Connecting-to-the-internet-with-pico-w.pdf - A guide to connecting devices to the internet using Raspberry Pi Pico W.
-
car_hacking_poories.pdf - Insights into car hacking and securing vehicles.
-
learn-how-to-hack-cars.pdf - A beginner's guide to car hacking.
-
towards-automated-dynamic-analysis-linux-based-embedded-firmware.pdf - Techniques for dynamic analysis of embedded firmware.
-
Dominic-Chell-The-Mobile-Application-Hackers-Handbook-2015.pdf - A deep dive into mobile app security and exploitation.
-
android_app_vulnerability_classes.pdf - Common vulnerabilities in Android applications.
-
Spy-vs-Spy_A-modern-study-of-microphone-bugs-operation-and-detection._Valeros-Garcia.pdf - Detection and operation of microphone bugs.
-
Mickey-and-Jesse-DEFCON-29-High-Stakes-Updates-BIOSRCEOMGWTFBBQ.pdf - BIOS hacking techniques discussed at DEFCON 29.
-
Firmware_Security_Testing_Methodology_Version.1.pdf - A methodology for testing firmware security.
-
Jtagsploitation.pdf - Exploiting JTAG interfaces for debugging and hacking.
-
HardwareHackerPaperback_Ch2_Sample.pdf - Sample chapter from a hardware hacking book.
-
RECON-BRX-2017-Breaking_CRP_on_NXP_LPC_Microcontrollers_slides.pdf - Breaking CRP on NXP LPC microcontrollers.
-
LinuxLeo.pdf - Comprehensive Intro into using Linux as a Forensic Workstation
-
R2book.pdf - A Complete Guide to Using Radare2 for Reverse Engineering
-
Kali-Linux-Revealed-2021-edition.pdf - A comprehensive guide to Kali Linux.
-
Metasploit-Unleashed_Combined.pdf - A detailed guide on using Metasploit for penetration testing.
-
README.md - A guide to the repository and how to use the materials.
-
TOR_Everything_01r.pdf - A comprehensive guide on using Tor for privacy and anonymity.
-
Kevin-Mitnick-Ghost-in-the-wires-2011.pdf - The autobiography of hacker Kevin Mitnick.
-
Jon-Erickson-Hacking-The-Art-of-Exploitation-2008.pdf - A classic on hacking and exploitation techniques.