I am often asked by other individuals and professionals about technical books I read and use when it comes to learning new hacking techniques and improving my hacking skills.
I have created the following list for everybody to have access to it.
Disclaimer: These are ebooks which are available online and i’m just sharing the name.
The contributor(s) cannot be held responsible for any misuse of the data.
TOPICS
- OFFENSIVE SECURITY
- DEFENSIVE SECURITY
- PENETRATION TESTING TOOLS
- PROGRAMMING LANGUAGES
- REVERSE ENGINEERING
- VIRUS BOTNETS AND MALWARES
- CYBER LAWS
OFFENSIVE SECURITY
Kali Linux
-
-
- Instant Kali Linux Abhinav Singh | October 25, 2013
-
-
-
- Mastering Kali Linux for Advanced Penetration Testing Robert W. Beggs | June 24, 2014
-
-
-
- Web Penetration Testing with Kali Linux | 2nd Ed, Juned Ahmed Ansari | December 1, 2015
-
-
-
- Kali Linux Web Penetration Testing Cookbook | Gilberto Najera-Gutierrez | 2016
-
Hacking
-
-
- The Web Aplication Hackers Handbook 2nd Ed, Dafydd Stuttard & Marcus Pinto | August 31, 2011
-
-
-
- Ethical Hacking and Penetration Testing Guide Rafay Baloch | Jul 28 2014
-
-
-
- Dangerours Google Hacking Database and Attacks Michał Piotrowski | 04, 2005
- Advanced Penetration Testing- Hacking the Worlds most secure networks – Will Allsop
-
-
-
- Google Hacking For Penetration Testers Johnny Long | February 20, 2005
-
-
-
- Penetration Testing with Raspberry Pi Joseph Muniz | 2015
-
-
-
- The Hacker Playbook 2nd Ed, Peter Kim | 2014
-
-
-
- Rtfm Red Team Field Manual, v3 2014
-
-
-
- Mobile Hacking Exposed Neil Bergman, Mike Stanfield, Jason Rouse, Joel Scambray | 2013
-
-
-
- Wireless Hackin Exposed – Wireless Security Secrets & Solutions 2014
-
-
-
- The Shellcoder’s Handbook: Discovering and Exploiting Security Holes 2nd Ed, Chris Anley, John Heasman, Felix Linder, Gerardo Recharte | 2017
-
DEFENSIVE SECURITY
-
-
- Web Services Hardening Adam Vincent | March 8, 2007
-
-
-
- Threat Modeling – Designing for Security Adam Shostack | 2014
-
PENETRATION TESTING TOOLS
-
-
- Wireless Hackin Exposed – Wireless Security Secrets & Solutions 2nd Ed, Johnny Cache, Joshua Wright, and Vincent Liu | 2010
-
-
-
- Wireshark Essentials James H. Baxter | October, 2014
-
-
-
- Metasploit The Penetration Tester’s Guide David Kennedy, Jim O’gorman, Devon Kearns, and Aharoni| July 25, 2011
-
-
-
- Mastering Metasploit Nipun Jaswal| May 26, 2014
-
PROGRAMMING LANGUAGES
-
-
- Black Hat Python – Python Programming for Hackers and Pentesters Justin Seitz | September 2014
- GrayHat Python – Python Programming for Hackers and Reverse Engineers –Justin Seitz | September 2009
- Violent Python A Cookbook for Hackers TJ. ‘OCONNOR | September 2013
-
REVERSE ENGINEERING
VIRUS BOTNETS AND MALWARES
CYBER LAWS
-
-
- Computer Hacking: Making the Case for a National Reporting Requirement Jason V. Chang | 04, 2004
-
Tip: You can search on google by the name and you should be able to find the pdf version.
All link die :((
Reup please!!
Thank you for reporting this.
There seems to be an issue with the hosting provider. I will check on this and update.
Thanks!
***Update***
My content was flagged for DMCA Violations and my file hosting account was suspended.
Considering this I permanently removed the links and now i’m just sharing the names.
If you search by name of the book on google and add “.pdf”, you should be able to find the pdf version.
Sorry for the inconvenience.