Hacking & Computer Security

Black Hat Bash cover

Black Hat Bash

Dolev Farhi, Nick Aleks

Master the art of offensive bash scripting. This highly practical hands-on guide covers chaining commands together, automating tasks, crafting living-off-the-land attacks, and more!

Black Hat Go

Black Hat Go

Tom Steele, Chris Patten, and Dan Kottmann

Black Hat Go will help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset.

Black Hat GraphQL Cover

Black Hat GraphQL

Dolev Farhi, Nick Aleks

Written by hackers for hackers, this hands-on book shows how to identify vulnerabilities in apps that use GraphQL.

Bug Bounty Bootcamp

Bug Bounty Bootcamp

Vickie Li

A beginner's guide to web hacking, bug hunting, reporting vulnerabilities – and getting paid for it.

Codebreaking cover

Codebreaking

Elonka Dunin and Klaus Schmeh

A tour through history’s real codes and ciphers written by two of today’s best cipher crackers.

Cyberjutsu

Cyberjutsu

Ben McCarty

Based on techniques adapted from authentic Japanese ninja scrolls, Cyberjutsu teaches ancient approaches to modern security problems.

Cybersecurity for Small Networks Cover

Cybersecurity for Small Networks

Seth Enoka

A guide to implementing DIY security solutions and readily available technologies to protect home and small-office networks from attack.

Tabletop Exercises placeholder cover

Cybersecurity Tabletop Exercises

Robert Lelewski and John Hollenberger

The complete start-to-finish guide for planning and delivering successful cybersecurity tabletop exercises.

Designing BSD Rootkits

Designing BSD Rootkits

Joseph Kong

"If you understand C and want to learn how to manipulate the FreeBSD kernel, Designing BSD Rootkits is for you. Peer into the depths of a powerful operating system and bend it to your will!"
—Richard Bejtlich, TaoSecurity

Designing Secure Software

Designing Secure Software

Loren Kohnfelder

An elegant, team-oriented guide for building security into the software design process.

Engineering Secure Devices cover

Engineering Secure Devices

Dominik Merli

An essential resource for current and future developers tasked with protecting users from the potential threats of these ubiquitous devices.

Ethical Hacking Cover

Ethical Hacking

Daniel G. Graham

A crash course in modern hacking techniques, with lots of hands-on labs for aspiring offensive security experts.

Evading EDR cover

Evading EDR

Matt Hand

A guide to understanding the attack-detection software running on Microsoft systems, and how to evade it.

Evasive Malware Cover

Evasive Malware

Kyle Cucci

The first-ever guide to analyzing malicious Windows software designed to avoid detection and forensic tools.

 

Go H*ck Yourself Cover

Go H*ck Yourself

Bryson Payne

A hands-on intro to hacking that guides you through executing every major type of attack (from the safety of a virtual lab).

Gray Hat C#

Gray Hat C#

Brandon Perry

Gray Hat C# shows you how to use C#'s powerful set of core libraries to create and automate security tools.

Gray Hat Python

Gray Hat Python

Justin Seitz

The first Python book written for security analysts, Gray Hat Python explains the intricacies of using Python to assist in security analysis tasks. You'll learn how to design your own debuggers, create powerful fuzzers, utilize open source libraries to automate tedious tasks, interface with security tools, and more.

Hacking APIs Cover

Hacking APIs

Corey Ball

Learn how to test APIs for security vulnerabilities so you can uncover high-payout bugs and improve the security of web apps.

How to Hack Like a Legend Cover

How to Hack Like a Legend

Sparc Flow

Puts you in the mind of a master hacker, as you plan and launch a stealth attack on Microsoft’s best security systems.

IDA Pro Book, 2nd Edition

IDA Pro Book, 2nd Edition

Chris Eagle

No source code? No problem! This second edition of the The IDA Pro Book is the definitive guide to IDA Pro, arguably the most sophisticated disassembler in the world.

Linux Firewalls

Linux Firewalls

Michael Rash

"Between 2000 and mid-2008, I've read and reviewed nearly 250 technical books. I've also written several books, so I believe I can recognize a great book when I see it. Linux Firewalls is a great book."
Richard Bejtlich, TaoSecurity.com, from the foreword to Linux Firewalls

View a sample chapter, Chapter 10: Deploying fwsnort

Locksport Cover

Locksport

Jos Weyers, Matt Burrough, Walter Belgers, BandEAtoZ, and Nigel K. Tolley

This hands-on guide to the art of lockpicking will take you from noob to competition-ready.

Metasploit Cover

Metasploit

David Kennedy, Jim O’Gorman, Devon Kearns, and Mati Aharoni

Whether your goal is to secure your own network or discover vulnerabilities for a client, Metasploit: The Penetration Tester's Guide is the definitive guide to using this dynamic and powerful tool.
 

Metasploit, 2nd Edition cover

Metasploit, 2nd Edition

David Kennedy, Mati Aharoni, Devon Kearns, Jim O’Gorman, and Daniel Graham

The second edition of the international bestseller Metasploit is written by some of the world’s best hackers and is the only introduction you’ll ever need to the legendary Framework.

Microcontroller Exploits cover

Microcontroller Exploits

Travis Goodspeed

A deep dive into advanced hardware hacking with detailed examples of real-world techniques and a comprehensive survey of vulnerabilities.

 

Penetration Testing: A Hands-on Introduction to Hacking

Penetration Testing

Georgia Weidman

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses. In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs.

PoC||GTFO

PoC||GTFO

Manul Laphroaig

PoC||GTFO (Proof of Concept or Get The Fuck Out) is a compilation of the wildly popular hacker zine of the same name. Contributions range from humorous poems to deeply technical essays.

Practical Doomsday

Practical Doomsday

Michal Zalewski

Outlines a model for evaluating risks in your life, as well as preparing for a wide range of potential crises.

Practical IoT Hacking

Practical IoT Hacking

Fotios Chantzis, Ioannis Stais, Paulino Calderon, Evangelos Deirmentzoglou, Beau Woods

Written by all-star security experts, Practical IoT Hacking is a quick-start conceptual guide to testing and exploiting IoT systems and devices.

Practical Linux Forensics Cover

Practical Linux Forensics

Bruce Nikkel

A practitioner’s guide focused on postmortem analysis of modern Linux installations.

Practical Social Engineering Cover

Practical Social Engineering

Joe Gray

A hands-on look at the cyber attacks that target human nature, with pentesting templates for performing SE ops, and tips for defending against them.

Serious Cryptography, 2nd Edition placeholder cover

Serious Cryptography, 2nd Edition

Jean-Philippe Aumasson

Serious Cryptography, 2nd edition, is a practical guide to the past, present, and future of cryptographic systems and algorithms.

The Tangled Web

Tangled Web

Michal Zalewski

The Tangled Web sheds light on the security challenges that engineers, developers, and users face on the Web today. Join security expert Michal Zalewski for an in-depth look at how browsers actually work, and what pitfalls lurk in the shadows.

The Android Malware Handbook cover

The Android Malware Handbook

Qian Han, Salvador Mandujano, Sebastian Porst, V.S. Subrahmanian, Sai Deep Tetali, and Yanhai Xiong

An all-star guide to tackling the analysis and detection of malware that targets the Android operating system.

The Art of Cyberwarfare Cover

The Art of Cyberwarfare

Jon DiMaggio

A detailed guide to nation-state hacking methods that shows how to track, analyze, and attribute advanced attacks.

The Art of Mac Malware Cover

The Art of Mac Malware

Patrick Wardle

A handbook for Apple infection methods, malicious script analysis, and Mach-O malware.

The Art of Mac Malware Volume 2 cover

The Art of Mac Malware, Volume 2

Patrick Wardle

The Art of Mac Malware, Volume 2 is a comprehensive guide to the programmatic approaches you can use to detect and protect against macOS malware. 

The Ghidra Book

The Ghidra Book

Chris Eagle and Kara Nance

The Ghidra Book is a practical introduction to Ghidra, a comprehensive, open-source tool suite for reverse engineers.

The Hardware Hacking Handbook

The Hardware Hacking Handbook

Colin O'Flynn and Jasper van Woudenberg

Cracks open embedded security to show how hardware attacks work from the inside out.

Windows Security Internals placeholder cover

Windows Security Internals

James Forshaw

Power up your Windows security skills with expert guidance, in-depth technical insights, and lots of real-world vulnerability examples.