AnonOps Leaks ‘A Pirates Guide To Anonymous’ – Complete Online Hacking, Security, Programming & Video Tutorial Handbook

In all my years online I have never quite seen anything like this, but earlier today members of the AnonOps IRC released a comprehensive hacking guide featuring full lectures, tutorials and online courses from various pirated sources. Included in the leaked files are full certified Ethical Hacking training courses from The International Council of Electronic Commerce Consultants, study guides on hardware, software and crypto-currencies from Coursera, programming tutorials from the the Computing Technology Industry Association (CompTIA), and IT certification courses from the Cisco Certified Network Associate programme (CCNA), along with a ton of miscellaneous information.

A hacker going by the name of “ClaudiaD” is said to have been the primary source behind the leaked information below, allowing for the pirated material to be downloaded and published online in the first place. The study guide itself was assembled and released to the pubic by a hacker going by the name of “J0rn,” with contributions from “Anominous” – both presumably working off the AnonOps IRC. Due to the sensitive nature of the content contained, for the purposes of this article I am choosing to keep the exact location of the leak redacted – contact me via email if you would like more information.


No automatic alt text available.

Leak 1 | EC-Council’s Certified Ethical Hacker (CEH) Course: 

SQL Injection:
Scanning Networks:
Hacking Web Servers:
Hacking Web Applications:
Session Hijacking:
Social Engineering:
System Hacking:
Denial of Service:
Hacking Wireless Networks:
Malware Threats:
Evading IDS, Firewalls, and Honeypots:
Hacking Mobile Platforms:

Leak 2 | More Hacking Courses:

Introduction to Pentesting and Ethical Hacking with Kali Linux:
Introduction to Firewalls:
Introduction to Browser Security Headers:
Introduction to Wireshark:
Troubleshooting with Wireshark:
Wireshark 2.0:
Network Security Testing with Nmap:
All about buffer Overflows:
Network Pentesting using Python and Kali Linux:
Metasploit Basics:
CloudFlare Security:
Hack your API First:
Risk Identification, Monitoring, and Analysis:
Check Point Certified Security Administrator; Install & Deploy:
Cloud Security:
Cloud Computing:
Introduction to Pentesting using Metasploit:

Leak 3 | Coursera Training Courses:

Software Security:
Hardware Security:
Bitcoin & Cryptocurrency Tech:[Princeton+University].7z

Leak 4 | Programming:

C++ Fundamentals:
C++ Advanced Topics:
C Fundamentals:
C In Action:
Java Fundamentals:
Java from Scratch:
Introduction to Java:
Introductions to HTML:
Introduction To JQuery:
Introduction To CSS:
Introduction To Arduino:
Getting Started with AngularJS:
Building Angular & Node JS Apps:
ExtJS Desktop Fundamentals:
Python Fundamentals:
Python, Beyong The Basics:
Ruby 2.0:
Getting Started with BackBone JS:
Introduction To Powershell:
Raspberry Pi Home Server:
Raspberry Pi for Developers:

Leak 5 | Cisco CCNA Security:

Introduction To Network Security:
AAA & IP Security:
Firewalls & VPN’s:

Leak 6 | # CompTIA A+:

Computer Hardware:
Peripherals & Best Practices:
Operating Systems:
Mobile Devices & Troubleshooting:

Leak 7 | CompTIA Security+:

Network & Domain Security:
Network Architecture:
Network Operations:
Network Security 2:

Leak 8 | Linux:

Linux Installation and Initial Configuration:
Introduction to the Bash Shell:
Shell Scripting with Bash:
Linux Command Line Interface Fundamentals:

Leak 9 | Video Editing:

Adobe Premiere Pro CC Fundamentals:
Animation and Video Editing in Photoshop:
Color Correction and Grading in Adobe Premiere Pro and SpeedGrade:
Action Scene Editing Techniques in Adobe Premiere Pro:
Adobe Premiere Pro CS6 Setup (Software Itself, Not A Course):

Leak 10 | Miscellaneous:

Clean Code:
Test Driven Development with Brad Wilson:
The Fundamentals of Scrum Methodology:
Building A Successful Blog:
Building A High Traffic Profitable Blog:

Leak 11 | Other Resources:

Hacking PDF’s Extracted from
Alternative Cloud Services:

Image may contain: night and text

Categories: Hacking News

Tags: , , , , , , , , , , , , , , , , , ,

Leave a Reply

Do NOT follow this link or you will be banned from the site!
%d bloggers like this: