Hi guys,

I would like to share a book that goes through a real life hacking scenario : From building phishing malware to hacking a Mainframe (while of course p0wning some Windows Domains :-) )
It showcases up to date content with custom scripts and unique hacking techniques
It is different and refreshing from your regular old metasploit how-to tutorials

Enjoy !

Sparc F.