Hacking & Computer Security

The Art of Mac Malware Volume 2 cover

The Art of Mac Malware, Volume 2

Patrick Wardle

The Art of Mac Malware, Volume 2 is a comprehensive guide to the programmatic approaches you can use to detect and protect against macOS malware. 

Black Hat Bash cover

Black Hat Bash

Dolev Farhi, Nick Aleks

Master the art of offensive bash scripting. This highly practical hands-on guide covers chaining commands together, automating tasks, crafting living-off-the-land attacks, and more!

Windows Security Internals placeholder cover

Windows Security Internals

James Forshaw

Power up your Windows security skills with expert guidance, in-depth technical insights, and lots of real-world vulnerability examples.

Cover coming soon

Engineering Secure Devices

Dominik Merli

An essential resource for current and future developers tasked with protecting users from the potential threats of these ubiquitous devices.

Evasive Malware Placeholder Cover

Evasive Malware

Kyle Cucci

The first-ever guide to analyzing malicious Windows software designed to avoid detection and forensic tools.

 

The Android Malware Handbook cover

The Android Malware Handbook

Qian Han, Salvador Mandujano, Sebastian Porst, V.S. Subrahmanian, Sai Deep Tetali, and Yanhai Xiong

An all-star guide to tackling the analysis and detection of malware that targets the Android operating system.

Evading EDR cover

Evading EDR

Matt Hand

A guide to understanding the attack-detection software running on Microsoft systems, and how to evade it.

Black Hat GraphQL Cover

Black Hat GraphQL

Dolev Farhi, Nick Aleks

Written by hackers for hackers, this hands-on book shows how to identify vulnerabilities in apps that use GraphQL.

Codebreaking cover

Codebreaking

Elonka Dunin and Klaus Schmeh

A tour through history’s real codes and ciphers written by two of today’s best cipher crackers.

Hacking APIs Cover

Hacking APIs

Corey Ball

Learn how to test APIs for security vulnerabilities so you can uncover high-payout bugs and improve the security of web apps.

The Art of Cyberwarfare Cover

The Art of Cyberwarfare

Jon DiMaggio

A detailed guide to nation-state hacking methods that shows how to track, analyze, and attribute advanced attacks.

Locksport Cover

Locksport

Jos Weyers, Matt Burrough, Walter Belgers, BandEAtoZ, and Nigel K. Tolley

This hands-on guide to the art of lockpicking will take you from noob to competition-ready.

Designing Secure Software

Designing Secure Software

Loren Kohnfelder

An elegant, team-oriented guide for building security into the software design process.

Practical Doomsday

Practical Doomsday

Michal Zalewski

Outlines a model for evaluating risks in your life, as well as preparing for a wide range of potential crises.

The Art of Mac Malware Cover

The Art of Mac Malware

Patrick Wardle

A handbook for Apple infection methods, malicious script analysis, and Mach-O malware.

Go H*ck Yourself Cover

Go H*ck Yourself

Bryson Payne

A hands-on intro to hacking that guides you through executing every major type of attack (from the safety of a virtual lab).

Practical Linux Forensics Cover

Practical Linux Forensics

Bruce Nikkel

A practitioner’s guide focused on postmortem analysis of modern Linux installations.

Bug Bounty Bootcamp

Bug Bounty Bootcamp

Vickie Li

A beginner's guide to web hacking, bug hunting, reporting vulnerabilities – and getting paid for it.

Ethical Hacking Cover

Ethical Hacking

Daniel G. Graham

A crash course in modern hacking techniques, with lots of hands-on labs for aspiring offensive security experts.

How to Hack Like a Legend Cover

How to Hack Like a Legend

Sparc Flow

Puts you in the mind of a master hacker, as you plan and launch a stealth attack on Microsoft’s best security systems.

Cybersecurity for Small Networks Cover

Cybersecurity for Small Networks

Seth Enoka

A guide to implementing DIY security solutions and readily available technologies to protect home and small-office networks from attack.

Practical IoT Hacking

Practical IoT Hacking

Fotios Chantzis, Ioannis Stais, Paulino Calderon, Evangelos Deirmentzoglou, Beau Woods

Written by all-star security experts, Practical IoT Hacking is a quick-start conceptual guide to testing and exploiting IoT systems and devices.

Cyberjutsu

Cyberjutsu

Ben McCarty

Based on techniques adapted from authentic Japanese ninja scrolls, Cyberjutsu teaches ancient approaches to modern security problems.

Practical Social Engineering Cover

Practical Social Engineering

Joe Gray

A hands-on look at the cyber attacks that target human nature, with pentesting templates for performing SE ops, and tips for defending against them.

The Ghidra Book

The Ghidra Book

Chris Eagle and Kara Nance

The Ghidra Book is a practical introduction to Ghidra, a comprehensive, open-source tool suite for reverse engineers.

The Hardware Hacking Handbook

The Hardware Hacking Handbook

Colin O'Flynn and Jasper van Woudenberg

Cracks open embedded security to show how hardware attacks work from the inside out.

Black Hat Go

Black Hat Go

Tom Steele, Chris Patten, and Dan Kottmann

Black Hat Go will help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset.

PoC||GTFO

PoC||GTFO

Manul Laphroaig

PoC||GTFO (Proof of Concept or Get The Fuck Out) is a compilation of the wildly popular hacker zine of the same name. Contributions range from humorous poems to deeply technical essays.

Gray Hat C#

Gray Hat C#

Brandon Perry

Gray Hat C# shows you how to use C#'s powerful set of core libraries to create and automate security tools.

Penetration Testing: A Hands-on Introduction to Hacking

Penetration Testing

Georgia Weidman

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses. In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs.

The Tangled Web

Tangled Web

Michal Zalewski

The Tangled Web sheds light on the security challenges that engineers, developers, and users face on the Web today. Join security expert Michal Zalewski for an in-depth look at how browsers actually work, and what pitfalls lurk in the shadows.

IDA Pro Book, 2nd Edition

IDA Pro Book, 2nd Edition

Chris Eagle

No source code? No problem! This second edition of the The IDA Pro Book is the definitive guide to IDA Pro, arguably the most sophisticated disassembler in the world.

Metasploit Cover

Metasploit

David Kennedy, Jim O’Gorman, Devon Kearns, and Mati Aharoni

Whether your goal is to secure your own network or discover vulnerabilities for a client, Metasploit: The Penetration Tester's Guide is the definitive guide to using this dynamic and powerful tool.
 

Linux Firewalls

Linux Firewalls

Michael Rash

"Between 2000 and mid-2008, I've read and reviewed nearly 250 technical books. I've also written several books, so I believe I can recognize a great book when I see it. Linux Firewalls is a great book."
Richard Bejtlich, TaoSecurity.com, from the foreword to Linux Firewalls

View a sample chapter, Chapter 10: Deploying fwsnort

Designing BSD Rootkits

Designing BSD Rootkits

Joseph Kong

"If you understand C and want to learn how to manipulate the FreeBSD kernel, Designing BSD Rootkits is for you. Peer into the depths of a powerful operating system and bend it to your will!"
—Richard Bejtlich, TaoSecurity

Gray Hat Python

Gray Hat Python

Justin Seitz

The first Python book written for security analysts, Gray Hat Python explains the intricacies of using Python to assist in security analysis tasks. You'll learn how to design your own debuggers, create powerful fuzzers, utilize open source libraries to automate tedious tasks, interface with security tools, and more.