1- Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation Link You must be logged in to see this link. |
2- Black Hat Go: Go Programming For Hackers and Pentesters Link You must be logged in to see this link. |
3- Foundations of Information Security: A Straightforward Introduction Link You must be logged in to see this link. |
4- Hacking the Xbox: An Introduction to Reverse Engineering Link You must be logged in to see this link. |
5- Hacking: The Art of Exploitation, 2nd Edition Link You must be logged in to see this link. |
6- Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali Link You must be logged in to see this link. |
7- Malware Data Science: Attack Detection and Attribution Link You must be logged in to see this link. |
8- Metasploit: The Penetration Tester's Guide Link You must be logged in to see this link. |
9- Penetration Testing: A Hands-On Introduction to Hacking Link You must be logged in to see this link. |
10- Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly. Link You must be logged in to see this link. |
11- Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software Link You must be logged in to see this link. |
12- Practical Packet Analysis, 3rd Edition: Using Wireshark to Solve Real-World Network Problems Link You must be logged in to see this link. |
13- Real-World Bug Hunting: A Field Guide to Web Hacking Link You must be logged in to see this link. |
14- Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats Link You must be logged in to see this link. |
15- Serious Cryptography: A Practical Introduction to Modern Encryption Link You must be logged in to see this link. |
16- The Car Hacker's Handbook: A Guide for the Penetration Tester Link You must be logged in to see this link. |
17- The Hardware Hacker: Adventures in Making and Breaking Hardware Link You must be logged in to see this link. |
18- The Linux Command Line, 2nd Edition: A Complete Introduction Link You must be logged in to see this link. |
19- Web Security for Developers: Real Threats, Practical Defense Link You must be logged in to see this link. |
Last edited: