0% found this document useful (0 votes)
270 views

Readme

This document provides a curated list of free security and pentesting eBooks available on the internet. It contains eBooks on topics such as network pentesting, defensive security, offensive security, programming languages, reverse engineering, and more. The list includes eBook links and descriptions. Contributors are encouraged to send pull requests to add to the list. Downloads are at the user's own risk as the contributors cannot be held responsible for any misuse.

Uploaded by

Diljit
Copyright
© © All Rights Reserved
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
270 views

Readme

This document provides a curated list of free security and pentesting eBooks available on the internet. It contains eBooks on topics such as network pentesting, defensive security, offensive security, programming languages, reverse engineering, and more. The list includes eBook links and descriptions. Contributors are encouraged to send pull requests to add to the list. Downloads are at the user's own risk as the contributors cannot be held responsible for any misuse.

Uploaded by

Diljit
Copyright
© © All Rights Reserved
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 3

# Free Security eBooks

[![Build Status](https://travis-ci.org/Hack-with-Github/Free-Security-eBooks.svg?
branch=master)](https://travis-ci.org/Hack-with-Github/Free-Security-eBooks)

A curated list of free Security and Pentesting related E-Books available on the
Internet.

If you want to contribute to this list (please do), send a pull request. All
contributors will be recognized and appreciated.

#### Disclaimer: The contributor(s) cannot be held responsible for any misuse of
the data. This repository is just a collection of URLs to download eBooks for free.
Download the eBooks at your own risks.

#### DMCA takedown cannot be possible as we are not republishing the


books/infringement of code, but we are just hosting the links to 3rd party websites
where these books can be downloaded. To know more on DMCA takedown policy [here]
(https://help.github.com/articles/dmca-takedown-policy/).

The topics include:

- [Android & iOS](#android--ios)


- [Cloud Security](#cloud-security)
- [Defensive Security](#defensive-security)
- [IoT](#iot)
- [Malware Analysis & Forensics](#malware-analysis--forensics)
- [Network Pentesting](#network-pentesting)
- [Offensive Security](#offensive-security)
- [Programming Languages](#programming-languages)
- [Reverse Engineering](#reverse-engineering)
- [SysAdmin](#sysadmin)
- [Virus Botnet and Malware](#virus-botnet-and-malware)
- [Wireless Network Pentesting](#wireless-network-pentesting)
- [Misc](#misc)

----------

### Network Pentesting


- [Wireshark Essentilals]
(https://github.com/cyberh3x/books/blob/master/9781783554638-
WIRESHARK_ESSENTIALS.pdf)
- [Mastering Wireshark]
(https://github.com/cyberh3x/books/blob/master/9781783989522-
MASTERING_WIRESHARK.pdf)

### Defensive Security


- [Holistic Info-Sec for Web Developers - Fascicle 0]
(https://f0.holisticinfosecforwebdevelopers.com/)
- [Holistic Info-Sec for Web Developers - Fascicle 1]
(https://f1.holisticinfosecforwebdevelopers.com/)
- [OWASP Hacking Tutorials and Web App Protection]
(https://www.owasp.org/images/d/d0/Web_Services_Hacking_and_Hardening.pdf)
- [Threat Modeling - Designing for Security]
(https://news.asis.io/sites/default/files/Threat%20Modeling.pdf)

----------

### Offensive Security


- **Backtrack**
- [Hack your Friend using Backtrack]
(http://hackerspace.cs.rutgers.edu/library/bt5tutorials/HackYourFriend.pdf)
- **Kali Linux**
- [Kali Linux Revealed Book](https://kali.training/)
- [Windows Pentesting with Kali Linux v2]
(https://github.com/cyberh3x/books/blob/master/9781782168492-
KALI_LINUX_2_WINDOWS_PENETRATION_TESTING.pdf)
- **Hacking**
- [Advanced SQL Injection Hacking and Guide](https://defcon.org/images/defcon-
17/dc-17-presentations/defcon-17-joseph_mccray-adv_sql_injection.pdf)
- [A Beginners Guide To Hacking Computer Systems]
(http://www.mediafire.com/download/dyewn6f3r3olnuw/A+Beginners+Guide+To+Hacking+Com
puter+Systems.zip)
- [Blind SQL Injection Discovery & Exploitation]
(http://blueinfy.com/wp/blindsql.pdf)
- [CEH – Hacking Database Secrets and Exploit]
(http://repo.thehackademy.net/depot_cehv6/)
- [Ethical Hacking Complete E-book for Beginners]
(http://pdf.textfiles.com/security/palmer.pdf)
- [Hackers High School 13 Complete Hacking Ebooks]
(http://www.mediafire.com/download/u2akquvibe6ia13/Hackers+High+School+13+Complete+
Hacking+E-books.rar)
- [Hacking attacks and Examples Test]
(http://www.mediafire.com/download/dpysbzboord42lo/Hacking+attacks+and+Examples+Tes
t.zip)
- [Hacking into Computer Systems]
(http://www.academia.edu/1153769/Hacking_into_computer_systems_-_a_beginners_guide)
- [Hackers' Secrets](http://www.onlinepot.org/security/HackersSecrets.pdf)
- **Operating Systems**
- **Windows**
- [Modern Windows Exploit Development](https://userscloud.com/9ifscj08wllu)
- **Web & WebApp**
- [501 Website Hacking Secrets]
(http://www.mediafire.com/download/da8nhq8oh5iddae/501+Website+Hacking+Secrets.zip)
- [Cross Site Scripting and Hacking Websites](http://www.objectif-
securite.ch/research/xss_security_days.pdf)
- [Dangerous Google Hacking Database and Attacks]
(http://www.mediafire.com/download/s3535s2yg1w26u7/Dangerours+Google+Hacking+Databa
se+and+Attacks.zip)
- [Hack any Website, Complete Web App Hacking]
(https://www.defcon.org/images/defcon-11/dc-11-presentations/dc-11-Gentil/dc-11-
gentil.pdf)
- [Hacking Website Database and owning systems]
(http://www.blackhat.com/presentations/bh-europe-07/Cerrudo/Whitepaper/bh-eu-07-
cerrudo-WP-up.pdf)
- [Internet Advanced Denial of Service (DDOS) Attack]
(http://www.mediafire.com/download/b4jmyl022rh48c0/Internet+Advanced+Denial+of+Serv
ice+%28DDOS%29+Attack.zip)
- [Internet Security Technology and Hacking]
(http://www.mediafire.com/download/7tk860o8n777iqa/Internet+Security+Technology+and
+Hacking.zip)
- [The Web Application Hacker's Handbook]
(https://leaksource.files.wordpress.com/2014/08/the-web-application-hackers-
handbook.pdf)
- [Vulnerability Exploit & website Hacking for Dummies]
(http://www.mediafire.com/download/j8cvosmvcb4vpw9/Vulnerability+Exploitation+
%26+website+Hacking+for+Dummies.rar)
- [Web App Hacking (Hackers Handbook)]
(http://www.mediafire.com/download/c7b18vtpc77sysi/Web+App+Hacking+
%28Hackers+Handbook%29.zip)
- [XSS, Vulnerability Exploitation & Website Hacking]
(http://www.cis.syr.edu/~wedu/seed/Labs/Attacks_XSS/XSS.pdf)

----------

### Programming Languages


- **Python**
- [Violent Python : A Cookbook for Hackers (2013)]
(https://github.com/reconSF/python/blob/master/Syngress.Violent.Python.a.Cookbook.f
or.Hackers.2013.pdf)

----------

### Reverse Engineering


- [Reverse Engineering Hacking and Cracking](https://media.blackhat.com/bh-dc-
11/Grand/BlackHat_DC_2011_Grand-Workshop.pdf)
- [Reverse Engineering for Beginners ](http://www.t-gr.com/fotis/books/re.pdf)

----------

### Virus Botnet and Malware


- [Black Book of Viruses and Hacking]
(http://www.mediafire.com/download/c8ilcobmyiqooyp/Black+Book+of+Viruses+and+Hackin
g.zip)
- [Computer Hacking & Malware Attacks for Dummies]
(http://www.mediafire.com/download/8derf9dueyq64i5/Computer+Viruses
%2C+Hacking+and+Malware+attacks+for+Dummies.zip)

----------

### Misc
- [Computer Hacking - Cyber Laws Harvard]
(https://cyber.harvard.edu/sites/cyber.law.harvard.edu/files/ComputerHacking.pdf)
- [Ethical Hacking Value and Penetration testing]
(https://www.certconf.org/presentations/2003/Wed/WM4.pdf)
- [Secrets of Super and Professional Hackers]
(http://www.mediafire.com/download/2sspb36u5gymd23/Secrets+of+Super+and+Professiona
l+Hackers.zip)
- [Ultimate Guide to Social Enginnering attacks]
(http://uwcisa.uwaterloo.ca/Biblio2/Topic/ACC626%20Social%20Engineering%20A
%20Cheung.pdf)

You might also like