What books are you currently reading

ghost53574

Space Marshal
Oct 8, 2014
252
107
2,360
RSI Handle
https://robertsspaceindustries.com/citizens/xgh0st
Missing some books because of the 10,000 char limit.
Directory of D:\documents\Books

01/01/2015 12:22 AM <DIR> .
01/01/2015 12:22 AM <DIR> ..
07/09/2014 05:34 PM 99,028 0x01_local_linux_x86_shellcoding_without_any_high_level_language.pdf
07/09/2014 05:34 PM 112,888 0x02_bypassing_local_Linux_x86_ASLR_protection.pdf
07/09/2014 05:48 PM 866,969 1 Linux exploit writing tutorial part 1 - Stack overflow.pdf
07/09/2014 05:37 PM 3,224,622 1-Stack_Based_Overflows.pdf
07/09/2014 05:37 PM 6,217,632 10-Chaining_DEPwithROP.pdf
07/09/2014 05:38 PM 7,846,892 11-heap-spraying-demystified.pdf
05/24/2014 11:33 AM 9,576,960 123projectsFor124Sum09.doc
05/24/2014 11:33 AM 14,261,248 124LecturesSum09.doc
05/24/2014 11:33 AM 7,710,208 124ProjectsSum09.doc
07/12/2014 09:44 AM 840,846 1485_se-whitepaper-letter-scadaoverview-v005.pdf
05/23/2014 10:25 PM 133,275 1D barcode Encoding Guide 1 01.pdf
07/09/2014 05:49 PM 780,113 2 Linux exploit writing tutorial part 2 - Stack Overflow ASLR bypass usingret2reg.pdf
05/23/2014 10:19 PM 245,102 2011-2dbarcodeinfo.pdf
10/29/2014 02:10 AM <DIR> 2600 Collection
07/09/2014 05:49 PM 566,263 3 Linux exploit development part 3 - ret2libc.pdf
07/09/2014 05:38 PM 3,643,623 3-Writing_SEH_BasedExploits-A.pdf
07/09/2014 05:39 PM 1,386,538 3-Writing_SEH_BasedExploits-B.pdf
07/09/2014 05:39 PM 1,850,727 4-FromExploit_to_Metasploit_Basics.pdf
07/09/2014 05:49 PM 311,747 4a Linux exploit development part 3 (rev 2) - Real app demo.pdf
07/09/2014 05:49 PM 586,072 4b Linux exploit development part 2 (rev 2) - Real app demo (part 2).pdf
07/09/2014 05:49 PM 614,639 5 Linux exploit development part 4 - ASCII armor bypass + return-to-plt.pdf
07/09/2014 05:39 PM 2,585,775 5-Debugger modules_&_plugins_speedup.pdf
07/09/2014 05:39 PM 5,132,894 6-Bypassing_StackCookies_SafeSeh_SEHOP_HWDEP_ASLR.pdf
07/09/2014 05:39 PM 2,493,325 7-Unicode.pdf
10/29/2014 02:10 AM <DIR> 710 - Advanced Exploit Development
07/09/2014 05:39 PM 5,605,216 8-Win32_Egg_Hunting.pdf
07/09/2014 05:40 PM 5,137,479 9-Win32_shellcoding.pdf
07/09/2014 05:34 PM 496,484 A Buffer Overflow Study Attacks & Defenses.pdf
11/23/2014 11:58 PM 2,703,359 Accelerated C++ 2000.pdf
04/22/2014 05:34 PM 1,258,430 AcrosstheInternetSeas.pdf
10/29/2014 02:10 AM <DIR> Active Directory For Dummies
07/09/2014 05:35 PM 348,635 Advanced Windows Exploitation.pdf
07/02/2014 06:03 PM 47,381 Amazon_letter_FTC.pdf
07/09/2014 05:34 PM 264,886 ASLR - Address Space Layout Randomization.pdf
07/09/2014 05:34 PM 521,354 ASLR Smack_Reference.pdf
07/09/2014 05:35 PM 1,071,411 ASM_Language.pdf
10/29/2014 02:10 AM <DIR> Assembly_programming_book_collection
12/31/2014 11:42 AM 395,035 AStudio6_2sp1_1502-readme.pdf
07/09/2014 05:35 PM 300,717 Attacking the Windows Kernel.pdf
10/01/2014 02:28 PM 743,025 bgnet_USLetter.pdf
07/09/2014 05:35 PM 700,491 Bypassing Browser Memory Protections(BH08).pdf
07/09/2014 05:36 PM 341,862 Bypassing DEP with WPM & ROP.pdf
10/16/2014 05:28 AM 1,527,453 cacti.pdf
10/29/2014 02:10 AM <DIR> CCNA
10/29/2014 02:10 AM <DIR> CCNP
11/09/2014 09:39 PM 1,234,552 ClassifiedApplication7.30.13.pdf
10/29/2014 02:10 AM <DIR> Code The Hidden Language of Computer Hardware and Software by Ch
07/08/2014 03:53 PM 9,576,512 Code_The_Hidden_Language_of_Computer_Hardware_and_.pdf
11/19/2014 03:03 AM <DIR> CRYENGINE GAME PROGRAMMING WITH C++, Csharp, AND LUA-PACKT pdf-ke
07/10/2014 05:08 PM 129,815 CSE331-02.pdf
07/10/2014 05:31 PM 3,909,025 CSV7.0_Qs_eng.pdf
04/22/2014 05:34 PM 113,753 CS_Language_Basics.pdf
12/31/2014 05:49 AM 442,777 datasheet.pdf
07/09/2014 05:37 PM 1,096,207 Debugging with gdb.pdf
10/29/2014 02:10 AM <DIR> Defcon21
07/09/2014 05:37 PM 1,302,541 Defeating DEP and ASLR.pdf
07/09/2014 05:50 PM 2,070,794 Defeating DEP, the Immunity Debugger way.pdf
07/09/2014 05:36 PM 608,908 DEPinDepth.pdf
07/09/2014 05:37 PM 505,503 Detecting and exploiting integer overflows.pdf
10/01/2014 02:35 PM 1,076,136 Digital Credential Analysis.pdf
04/22/2014 05:35 PM 1,613,047 disassembly_deskto_201210261621.pdf
04/22/2014 05:35 PM 4,099,330 DIY-Cellular-IDS_2013-08-01.pdf
04/22/2014 05:35 PM 8,516,466 E7246_Sabertooth_Z77.pdf
04/22/2014 05:35 PM 7,927,431 EGO9-MANUAL-EN.pdf
10/04/2014 10:27 AM 152,347 ELF_Format.pdf
07/09/2014 05:37 PM 1,073,346 Ensamblador(SPA).pdf
07/09/2014 05:40 PM 234,388 Exploiting Format String Vulnerabilities.pdf
07/09/2014 05:40 PM 296,270 Exploiting Stack Overflows in the Linux Kernel.pdf
07/09/2014 05:40 PM 222,089 Format String Attacks.pdf
07/09/2014 05:40 PM 124,032 FormatStringAttack.pdf
04/22/2014 05:35 PM 1,939,168 forWeb_8.5inx11in_H100.pdf
04/22/2014 05:35 PM 8,495,114 Foundations of Circuits.pdf
05/31/2014 09:42 AM 788,701 free-tool-attachment-filtering-with-exchange-2007-custom-transport-agent.pdf
05/26/2014 09:26 PM 25,147,026 Fundamentals of Electric Circuits 5e.pdf
07/09/2014 05:41 PM 29,826,816 Fuzzing Brute Force Vulnerability Discovery.pdf
07/09/2014 05:41 PM 79,838 Fuzzing Making software Dumber.pdf
07/09/2014 05:42 PM 4,694,444 Fuzzing.pdf
07/09/2014 05:43 PM 175,871 Fuzzing_ Grammar-based Whitebox Fuzzing.pdf
07/09/2014 05:46 PM 5,871,627 Fuzzing_for_software_vulnerability_discovery.pdf
07/09/2014 05:46 PM 1,523,496 Generic Anti Exploitation Technology for Windows.pdf
04/22/2014 05:33 PM 103,511 Getting Started with Adobe Reader.pdf
04/22/2014 05:35 PM 311,657 geuvers.pdf
10/29/2014 02:10 AM <DIR> Gray Hat Python.epub
07/09/2014 05:46 PM 4,565,121 Hacking - The Art of Exploitation_2nd Ed.pdf
05/31/2014 09:12 AM 1,095,291 Hacking the Industry.pdf
06/17/2014 04:10 PM 18,625,251 HackingTheXbox_Free.pdf
07/09/2014 05:46 PM 209,401 Hacking_ The Art of Exploitation - 0x3 (Exploitation).pdf
10/29/2014 02:10 AM <DIR> Handbook of Applied Cryptography (Crc Press Series on Discrete M
10/29/2014 02:10 AM <DIR> Heard of the Dragon Queen
10/29/2014 02:10 AM <DIR> How to Cheat at Installing, Configuring and Troubleshooting ActiveDirectory and DNS
04/22/2014 05:35 PM 330,275 howto.pdf
07/10/2014 05:01 PM 738,191 https___www_ethicalhacker_net_columns_heffner_smashing-the-modern-stack-for-fun-and-profit.pdf
04/22/2014 06:39 PM 7,651,790 ICND2.pdf
10/29/2014 02:10 AM <DIR> Identifying.Malicious.Code.Through.Reverse.Engineering.PDF.2009-IPT
07/09/2014 05:20 PM 202,176 insecure_org_stf_smashstack_html.pdf
04/22/2014 05:35 PM 3,018,600 intel-pentium-m-processor-and-intel-855pm-ddr-333-266-200-mhz-chipset-platform-design-guide-update.pdf
07/09/2014 05:46 PM 2,550,384 Intel32-1-Basic Architecture.pdf
07/09/2014 05:47 PM 2,294,426 Intel32-2-Instruction Set ReferenceA.pdf
07/09/2014 05:47 PM 1,792,113 Intel32-2-Instruction Set ReferenceB.pdf
07/09/2014 05:48 PM 4,657,968 Intel32-3-System Programming Guide.pdf
07/09/2014 05:48 PM 482,419 Introduccion al Cracking en Linux 01 - Introduccion.pdf
07/09/2014 05:48 PM 351,371 Introduccion al Cracking en Linux 02 - GDB.pdf
07/09/2014 05:48 PM 290,818 Introduccion al Cracking en Linux 03 - Instalacion Radare.pdf
07/09/2014 05:48 PM 565,108 Introduccion-Explotacion-Software-Linux.pdf
10/29/2014 02:10 AM <DIR> Introduction to 64 Bit Intel Assembly Language Programming for Linux
12/31/2014 02:36 AM 60,534,386 Introduction to Computer Science Using Python.pdf
07/10/2014 05:17 PM 1,280,000 killerbee_1_0.tar
04/22/2014 05:35 PM 2,236,962 latitude-d600_user's guide_en-us.pdf
04/22/2014 06:32 PM 946,927 learn-c-the-hard-way.pdf
04/22/2014 06:34 PM 516,014 LearnPythonTheHardWay2ndEdition.pdf
05/24/2014 11:44 AM 1,710,200 LFS-BOOK-7.5.pdf
04/22/2014 05:34 PM 955,657 libpcapandc.pdf
07/09/2014 05:49 PM 5,112,178 Linux_Kernel_Crash_Book.pdf
11/18/2014 11:58 PM <DIR> m45
10/01/2014 06:44 PM 12,355,056 Matching Properties of Deep Sub-Micron MOS Transistors.pdf
10/29/2014 02:29 AM <DIR> Math.Tutor.DVD.Complete.Collection
11/18/2014 11:55 PM 12,800,340 Microsoft.Press.CLR.via.Csharp.4th.Edition.Oct.2012.pdf
07/09/2014 05:50 PM 235,771 Non-Executable Stack ARM Exploitation(def18).pdf
07/09/2014 05:49 PM 84,050 No_NX.pdf
04/22/2014 05:35 PM 2,908,625 nuvi350_owners-manual.pdf
10/29/2014 02:29 AM <DIR> Offensive Security - Advanced Windows Exploitation (AWE) v 1.1
05/27/2014 08:18 PM 3,664,834 Offensive Security - BackTrack to the Max Cracking the Perimeter V 1.0.pdf
05/27/2014 08:18 PM 15,188,752 Offensive Security - Wireless Attacks ( WiFu) v2.0.pdf
10/29/2014 02:29 AM <DIR> Offensive Security Labs
07/09/2014 05:50 PM 150,380 On the Effectiveness of Address-Space Randomization.pdf
07/09/2014 05:50 PM 262,615 OpenBSD Remote Exploiting.pdf
07/09/2014 05:52 PM 477,592 Packed, Printable, and Polymorphic Return-Oriented Programming.pdf
04/22/2014 05:35 PM 596,950 paper-twofish-paper.pdf
04/22/2014 05:35 PM 100,652 part9.pdf
07/09/2014 05:38 PM 221,103 perlref-5.004.1.pdf
07/09/2014 05:50 PM 826,331 Practical Windows XP-2003 Heap Exploitation BH09.pdf
10/15/2014 06:14 PM 5,630,471 progit.en.pdf
09/11/2014 07:59 PM 1,820,400 Programming in C (3rd Edition) True PDF.pdf
09/10/2014 10:36 PM 1,820,400 ProgrammingC.pdf
07/09/2014 05:50 PM 1,383,853 Programming_from_the_Ground_Up.pdf
10/29/2014 02:29 AM <DIR> Ready Player One
04/22/2014 05:35 PM 455,254 Request to Surrender Certificate.pdf
...

Actual books are Expert C# 5.0, Malware Analyst's Cookbook and DVD, Programming Perl, Electronics for Dummies, Applied Cryptography, Sams Teach Yourself C++ in 24 hours, and many more books that are currently kept in a plastic bin for storage that I've already read...

Note these books are books that I'm going through, aka reading slowly.
 
Last edited:
  • Like
Reactions: Dank Commander

RomulusMinimus

Captain
Jan 4, 2015
75
40
250
RSI Handle
Romulus-Minimus
Thud! By Terry Pratchett for the third time. I highly recommend Pratchett for just about anyone.
 

RomulusMinimus

Captain
Jan 4, 2015
75
40
250
RSI Handle
Romulus-Minimus
I have read Carpe Jugulum and Night Watch from Pratchett, maybe i read next that Thud! after im done my current book.
Night watch is easily my favourite Pratchett book, I also highly recommend Snuff, Pyramids, Guards! Guards! And reaper man. I may be a bit biased though as Pratchett is my favourite author.
 

Dalarast

Space Marshal
Oct 29, 2014
1,309
2,228
2,660
RSI Handle
Dalarast
Been reading Dune by Frank Herbert for two weeks now during down time at work or when stuck waiting for something...

And I been reading Christopher Nuttall's book The Shadows of Cincinnatus for some more fast paced sci-fi action. Dune is so sllloww and I can't bite into it...
 

CaptainRichard

Stream Meister
Staff member
Officer
Donor
Sep 29, 2014
1,077
1,238
2,000
RSI Handle
CaptainRichard
Reading the old extended universe star wars books and marveling at the lack of continuity.
Now officially known as "Alternate Universe Star Wars" books by decree of Lucas himself, no doubt due to the new movies coming out.

I, for one, am glad they've officially been declared non-canon. I was never a big fan of some of the directions they went with them.
 
  • Like
Reactions: CrashMan054

Huegpaynis

Space Marshal
May 28, 2014
1,277
1,254
2,520
RSI Handle
Huegpaynis
Rainbow Six, in my yearly tribute to our fallen hero, Tom Clancy.
I'm also reading an essay concerning human understanding by John Locke, The Prince by Niccolo Machiavelli, and Sir Arthur Conan Doyle's The hound of the baskervilles.
 

deathstrike

Vice Admiral
Donor
May 8, 2014
154
148
460
RSI Handle
deathstrike
Honour Harrington Series, Kick arse space opera! Defiantly recommend to anyone into sci fi books.
I loved the main series Honor books up until about book 9. The spinoff series are pretty good too.

Currently I'm on book 3 of ASOIAF in fiction and I'm also reading One Summer America 1927 by Bill Bryson. His stuff is always extremely interesting.
 

GrammarGestapo

Pro Chat Necromancer
Jun 8, 2014
814
761
2,370
RSI Handle
TheGrammarpolice
I have a library of several hundred dragon lance, forgotten realms, and general fantasy and sci fi spanning the last 100 years at my fingertips. I read 1-2 books a week, so it honestly depends on just what looks interesting at the time. I recently read The Worm Ouroboros by Eric Rücker Eddison, written in 1922. Good read :)
 
Forgot your password?