Grab a book and relax. Some of the best books in the industry.
Wiley:
Advanced Penetration Testing: Hacking the World's Most Secure Networks by Wil Allsopp (2017)arrow-up-right
Android Hacker's Handbook by Joshua J. Drake et al. (2014)arrow-up-right
iOS Hacker's Handbook by Charlie Miller et al. (2012)arrow-up-right
The Browser Hacker's Handbook by Wade Alcorn et al. (2014)arrow-up-right
The Database Hacker's Handbook, David Litchfield et al. (2005)arrow-up-right
The Mac Hacker's Handbook by Charlie Miller & Dino Dai Zovi (2009)arrow-up-right
The Mobile Application Hacker's Handbook by Dominic Chell et al. (2015)arrow-up-right
The Shellcoders Handbook by Chris Anley et al. (2007)arrow-up-right
The Web Application Hackers Handbook by D. Stuttard, M. Pinto (2011)arrow-up-right
Leanpub:
Breaking into Information Security: Learning the Ropes 101 - Andrew Gillarrow-up-right
Web Hacking 101 - How to Make Money Hacking Ethically by Peter Yaworski (2018)arrow-up-right
Other:
Black Hat Rust: Applied offensive security with the Rust programming language by Sylvain Kerkourarrow-up-right
Hacking: The Art of Exploitation by Jon Erickson (2004)arrow-up-right
OWASP Testing Guide: Stablearrow-up-right
The Hacker Playbook 1: Practical Guide To Penetration Testing by Peter Kim (2014)arrow-up-right
The Hacker Playbook 2: Practical Guide to Penetration Testing by Peter Kim (2015)arrow-up-right
The Hacker Playbook 3: Practical Guide to Penetration Testing (Red Team Edition) by Peter Kim (2018)arrow-up-right
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers by T.J. O'Connor (2012)arrow-up-right
No Starch Press:
A Bug Hunter's Diary by Tobias Klein (2011)arrow-up-right
Android Security Internals: An In-Depth Guide to Android's Security Architecture by Nikolay Elenkov (2015)arrow-up-right
Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation by James Forshaw (2018)arrow-up-right
Black Hat Go: Go Programming for Hackers and Pentesters by Tom Steele, Chris Patten, and Dan Kottmann (2020)arrow-up-right
Black Hat GraphQL by Dolev Farhi, Nick Aleks (2023)arrow-up-right
Black Hat Python: Python Programming for Hackers and Pentesters by Justin Seitz (2014)arrow-up-right
Bug Bounty Bootcamp by Vickie Li (2021)arrow-up-right
Car Hacker's Handbook by Craig Smith (2016)arrow-up-right
Cyberjutsu: Cybersecurity for the Modern Ninja by Ben McCarty (2021)arrow-up-right
Evading EDR by Matt Hand (2023)arrow-up-right
Foundations of Information Security: A Straightforward Introduction by Jason Andress (2019)arrow-up-right
Game Hacking: Developing Autonomous Bots for Online Games by Nick Cano (2016)arrow-up-right
Gray Hat Python: Python Programming for Hackers and Reverse Engineers by Justin Seitz (2009)arrow-up-right
Hacking APIs by Corey Ball (2022)arrow-up-right
Metasploit: The Penetration Tester's Guide by David Kennedy (2011)arrow-up-right
Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman (2014)arrow-up-right
Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments by Matt Burrough (2018)arrow-up-right
PoC||GTFO, Volume 1 by Manul Laphroaig (2017)arrow-up-right
PoC||GTFO, Volume 2 by Manul Laphroaig (2018)arrow-up-right
PoC||GTFO, Volume 3 by Manul Laphroaig (2021)arrow-up-right
Practical Binary Analysis: Build Your Own Linux Tools for Binary instrumentation, Analysis, and Disassembly by Dennis Andriesse (2019)arrow-up-right
Practical Doomsday: A User's Guide to the End of the World by Michal Zalewski (2022)arrow-up-right
Practical Forensic Imaging: Securing Digital Evidence with Linux Tools by Bruce Nikkel (2016)arrow-up-right
Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things by Fotios Chantzis, Ioannis Stais, Paulino Calderon, Evangelos Deirmentzoglou and Beau Woods (2021)arrow-up-right
Practical Social Engineering: A Primer for the Ethical Hacker by Joe Gray (2022)arrow-up-right
Real-World Bug Hunting: A Field Guide to Web Hacking by Peter Yaworski (2019)arrow-up-right
Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats by Alex Matrosov, Eugene Rodionov, and Sergey Bratus (2019)arrow-up-right
The Art of Cyberwarfare: An Investigator's Guide to Espionage, Ransomware, and Organized Cybercrime by Jon DiMaggio (2022)arrow-up-right
The Car Hacker's Handbook: A Guide for the Penetration Tester by Craig Smith (2016)arrow-up-right
The Hardware Hacking Handbook by Jasper van Woudenberg & Colin O'Flynn (2022)arrow-up-right
Windows Security Internals with PowerShell by James Forshaw (2024)arrow-up-right
Last updated 5 months ago