Hacking University
Awesome list of tutorials about being a hacker.
We collect books(PDF) all about pentest. The collection will keep updating, adding new books.
More projects: @theodorecooper
Reach me: Hi there!👋 I'm Theodore!
How to get books?
Method Ⅰ
Download from anonfiles.com Link: https://anonfiles.com/V223Y0Ceuc/awesome-hacking-books_zip
Method Ⅱ
Use bit torrent to get the books.
The torrent file will be in the repo.
Method Ⅲ
Use Resilio Sync to get books.
Resilio Sync by Resilio, Inc. is a proprietary peer-to-peer file synchronization tool. It can sync files between devices on a local network, or between remote devices over the Internet via a modified version of the BitTorrent protocol.
Resilio Sync synchronizes files using BitTorrent. The user's data is stored on the user's local device instead of in a "cloud", therefore requiring at least two user devices, or "nodes," to be online to synchronize files between them. Resilio Sync encrypts data with an Advanced Encryption Standard AES-128 key in counter mode which may either be randomly generated or set by the user. This key is derived from a "secret" which can be shared to other users to share data. Data is sent between devices directly unless the target device is unreachable (e.g. behind a firewall), in which case the data will first be relayed via an intermediary node. Many devices can be connected simultaneously and files shared between them in a mesh networking topology.
- So, first download and install Resilio Sync(I'll also put a installer in the repo): https://www.resilio.com/individuals/
- The sync key is in the key.txt
Book list:
- Cultrue of Hacking & Open Source
- Eric Raymond-The Cathedral and the Bazaar--Musings on Linux and Open Source by an Accidental Revolutionary@2001
- Karl Fogel-Producing Open Source Software--How to Run a Successful Free Software Project
- Kevin Mitnick-Ghost in the Wires--My Adventures as the World's Most Wanted Hacker@2011
- Kevin Mitnick-The Art of Intrusion--The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers@2005
- Lawrence Lessig-Free Culture
- Paul Graham-Hackers and Painters--Big Ideas from the Computer Age@2004
- Richard Stallman-Free Software, Free Society--Selected Essays of Richard M. Stallman@2015
- Sam Williams-Free as in Freedom--Richard Stallman's Crusade for Free Software@2010
- Steven Levy-Hackers--Heroes of the Computer Revolution@2010
- Basic
- Debian Handbook
- Control_Systems
- Kali-Linux-Revealed-1st-edition
- Learning_the_vi_Editor
- OWASP_Code_Review_Guide-V1_1
- Arnold Robbins & Nelson Beebe-Classic Shell Scripting@2005
- Mendel Cooper-Advanced Bash-Scripting Guide--An In-Depth Exploration of the Art of Shell Scripting@2014
- William Shotts-The Linux Command Line
- Cryptography
- Bruce Schneier-Applied Cryptography--Protocols, Algorithms, and Source Code in C@1996
- Bruce Schneier-Applied Cryptography(code).zip
- William Stallings-Cryptography and Network Security--Principles and Practice@2011
- Malware Analysis
- Michael Sikorski & Andrew Honig-Practical Malware Analysis--The Hands-On Guide to Dissecting Malicious Software@2012
- System Security Manual
- Red Hat Enterprise Linux 6 Security Guide@2011
- Red Hat Enterprise Linux 7 Security Guide@2018
- Red Hat Enterprise Linux 8 Security Hardening@2020
- Securing Debian Manual@2015
- Social Engineering
- Christopher Hadnagy-Social Engineering--The Science of Human Hacking@2018
- Kevin Mitnick-The Art of Deception--Controlling the Human Element of Security
- Reverse Engineering
- Dennis Yurichev-Reverse Engineering for Beginners--Understanding Assembly Language@2018
- The Art of Exploitation
- Allen Harper-Gray Hat Hacking--The Ethical Hacker's Handbook@2011
- Dafydd Stuttard & Marcus Pinto-The Web Application Hacker's Handbook--Finding and Exploiting Security Flaws@2011
- Enrico Perla & Massimiliano Oldani-A Guide to Kernel Exploitation--Attacking the Core@2011
- Jon Erickson-Hacking--The Art of Exploitation@2008
- The Shellcoder's Handbook--Discovering and Exploiting Security Holes@2007
- HHS
- HHS_en1_Being_a_Hacker.v2
- HHS_en2_Essential_Commands.v2
- HHS_en3_Beneath_the_Internet.v2
- HHS_en4_Playing_With_Daemons.v2
- HHS_en5_System_Identification.v2
- HHS_en6_Hacking_Malware.v2
- HHS_en7_Attack_Analysis.v2
- HHS_en8_Forensics.v2
- HHS_en9_Hacking.Email.v2
- HHS_en10_Web_Security_and_Privacy.v2
- HHS_en11_Hacking_Passwords.v2
- HHS_en12_Legalities_and_Ethics
- Programming
- C/C++
- SEI CERT-C Coding Standard@2016
- SEI CERT-C++ Coding Standard@2016
- Andrew Koenig-C Traps and Pitfalls@1989
- Brian Kernighan & Dennis Ritchie-The C Programming Language@1988
- Mark Burgess-The GNU C Programming Tutorial@2002
- Stephen Prata-C Primer Plus@2004
- Python
- Justin Seitz-Black Hat Python--Python Programming for Hackers and Pentesters@2015
- Justin Seitz-Gray Hat Python--Python Programming for Hackers and Reverse Engineers@2009
- TJ O'Connor-Violent Python--A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers@2013
- C/C++