/awesome-hacking-books

A collection of tutorials(e-books, PDF) about cybersecurity and programming.

Hacking University

Awesome list of tutorials about being a hacker.
We collect books(PDF) all about pentest. The collection will keep updating, adding new books.
More projects: @theodorecooper
Reach me: Hi there!👋 I'm Theodore!

How to get books?

Method Ⅰ

Download from anonfiles.com Link: https://anonfiles.com/V223Y0Ceuc/awesome-hacking-books_zip

Method Ⅱ

Use bit torrent to get the books.
The torrent file will be in the repo.

Method Ⅲ

Use Resilio Sync to get books.

Resilio Sync by Resilio, Inc. is a proprietary peer-to-peer file synchronization tool. It can sync files between devices on a local network, or between remote devices over the Internet via a modified version of the BitTorrent protocol.

Resilio Sync synchronizes files using BitTorrent. The user's data is stored on the user's local device instead of in a "cloud", therefore requiring at least two user devices, or "nodes," to be online to synchronize files between them. Resilio Sync encrypts data with an Advanced Encryption Standard AES-128 key in counter mode which may either be randomly generated or set by the user. This key is derived from a "secret" which can be shared to other users to share data. Data is sent between devices directly unless the target device is unreachable (e.g. behind a firewall), in which case the data will first be relayed via an intermediary node. Many devices can be connected simultaneously and files shared between them in a mesh networking topology.

Book list:

  1. Cultrue of Hacking & Open Source
    • Eric Raymond-The Cathedral and the Bazaar--Musings on Linux and Open Source by an Accidental Revolutionary@2001
    • Karl Fogel-Producing Open Source Software--How to Run a Successful Free Software Project
    • Kevin Mitnick-Ghost in the Wires--My Adventures as the World's Most Wanted Hacker@2011
    • Kevin Mitnick-The Art of Intrusion--The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers@2005
    • Lawrence Lessig-Free Culture
    • Paul Graham-Hackers and Painters--Big Ideas from the Computer Age@2004
    • Richard Stallman-Free Software, Free Society--Selected Essays of Richard M. Stallman@2015
    • Sam Williams-Free as in Freedom--Richard Stallman's Crusade for Free Software@2010
    • Steven Levy-Hackers--Heroes of the Computer Revolution@2010
  2. Basic
    • Debian Handbook
    • Control_Systems
    • Kali-Linux-Revealed-1st-edition
    • Learning_the_vi_Editor
    • OWASP_Code_Review_Guide-V1_1
    • Arnold Robbins & Nelson Beebe-Classic Shell Scripting@2005
    • Mendel Cooper-Advanced Bash-Scripting Guide--An In-Depth Exploration of the Art of Shell Scripting@2014
    • William Shotts-The Linux Command Line
  3. Cryptography
    • Bruce Schneier-Applied Cryptography--Protocols, Algorithms, and Source Code in C@1996
    • Bruce Schneier-Applied Cryptography(code).zip
    • William Stallings-Cryptography and Network Security--Principles and Practice@2011
  4. Malware Analysis
    • Michael Sikorski & Andrew Honig-Practical Malware Analysis--The Hands-On Guide to Dissecting Malicious Software@2012
  5. System Security Manual
    • Red Hat Enterprise Linux 6 Security Guide@2011
    • Red Hat Enterprise Linux 7 Security Guide@2018
    • Red Hat Enterprise Linux 8 Security Hardening@2020
    • Securing Debian Manual@2015
  6. Social Engineering
    • Christopher Hadnagy-Social Engineering--The Science of Human Hacking@2018
    • Kevin Mitnick-The Art of Deception--Controlling the Human Element of Security
  7. Reverse Engineering
    • Dennis Yurichev-Reverse Engineering for Beginners--Understanding Assembly Language@2018
  8. The Art of Exploitation
    • Allen Harper-Gray Hat Hacking--The Ethical Hacker's Handbook@2011
    • Dafydd Stuttard & Marcus Pinto-The Web Application Hacker's Handbook--Finding and Exploiting Security Flaws@2011
    • Enrico Perla & Massimiliano Oldani-A Guide to Kernel Exploitation--Attacking the Core@2011
    • Jon Erickson-Hacking--The Art of Exploitation@2008
    • The Shellcoder's Handbook--Discovering and Exploiting Security Holes@2007
  9. HHS
    • HHS_en1_Being_a_Hacker.v2
    • HHS_en2_Essential_Commands.v2
    • HHS_en3_Beneath_the_Internet.v2
    • HHS_en4_Playing_With_Daemons.v2
    • HHS_en5_System_Identification.v2
    • HHS_en6_Hacking_Malware.v2
    • HHS_en7_Attack_Analysis.v2
    • HHS_en8_Forensics.v2
    • HHS_en9_Hacking.Email.v2
    • HHS_en10_Web_Security_and_Privacy.v2
    • HHS_en11_Hacking_Passwords.v2
    • HHS_en12_Legalities_and_Ethics
  10. Programming
    • C/C++
      • SEI CERT-C Coding Standard@2016
      • SEI CERT-C++ Coding Standard@2016
      • Andrew Koenig-C Traps and Pitfalls@1989
      • Brian Kernighan & Dennis Ritchie-The C Programming Language@1988
      • Mark Burgess-The GNU C Programming Tutorial@2002
      • Stephen Prata-C Primer Plus@2004
    • Python
      • Justin Seitz-Black Hat Python--Python Programming for Hackers and Pentesters@2015
      • Justin Seitz-Gray Hat Python--Python Programming for Hackers and Reverse Engineers@2009
      • TJ O'Connor-Violent Python--A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers@2013