The Art of Mac Malware, Volume 2
The Art of Mac Malware, Volume 2 is a comprehensive guide to the programmatic approaches you can use to detect and protect against macOS malware.
The Art of Mac Malware, Volume 2 is a comprehensive guide to the programmatic approaches you can use to detect and protect against macOS malware.
Master the art of offensive bash scripting. This highly practical hands-on guide covers chaining commands together, automating tasks, crafting living-off-the-land attacks, and more!
Power up your Windows security skills with expert guidance, in-depth technical insights, and lots of real-world vulnerability examples.
An essential resource for current and future developers tasked with protecting users from the potential threats of these ubiquitous devices.
The first-ever guide to analyzing malicious Windows software designed to avoid detection and forensic tools.
An all-star guide to tackling the analysis and detection of malware that targets the Android operating system.
A guide to understanding the attack-detection software running on Microsoft systems, and how to evade it.
Written by hackers for hackers, this hands-on book shows how to identify vulnerabilities in apps that use GraphQL.
Learn the tools and develop the skills for uncovering big secrets hiding in public datasets.
A tour through history’s real codes and ciphers written by two of today’s best cipher crackers.
Learn how to test APIs for security vulnerabilities so you can uncover high-payout bugs and improve the security of web apps.
A detailed guide to nation-state hacking methods that shows how to track, analyze, and attribute advanced attacks.
This hands-on guide to the art of lockpicking will take you from noob to competition-ready.
An elegant, team-oriented guide for building security into the software design process.
Outlines a model for evaluating risks in your life, as well as preparing for a wide range of potential crises.
A handbook for Apple infection methods, malicious script analysis, and Mach-O malware.
A hands-on intro to hacking that guides you through executing every major type of attack (from the safety of a virtual lab).
A practitioner’s guide focused on postmortem analysis of modern Linux installations.
A beginner's guide to web hacking, bug hunting, reporting vulnerabilities – and getting paid for it.
A crash course in modern hacking techniques, with lots of hands-on labs for aspiring offensive security experts.
Puts you in the mind of a master hacker, as you plan and launch a stealth attack on Microsoft’s best security systems.
A guide to implementing DIY security solutions and readily available technologies to protect home and small-office networks from attack.
Crypto Dictionary is your full reference resource for all things cryptography.
Explore the stealthier side of programming with Black Hat Python, 2nd Edition – fully updated for Python 3, with all new strategies for your hacking projects!
How to Hack Like a Ghost is a fast-paced adventure that lets you shadow a master hacker targeting a shady foe with advanced cloud security.
A hands-on guide targeted at total beginners, How Cybersecurity Really Works will teach you everything you need to know about cyber defenses.
Written by all-star security experts, Practical IoT Hacking is a quick-start conceptual guide to testing and exploiting IoT systems and devices.
PoC||GTFO (Proof of Concept or Get The Fuck Out), Volume 3 continues the series of wildly popular collections of this hacker journal.
Based on techniques adapted from authentic Japanese ninja scrolls, Cyberjutsu teaches ancient approaches to modern security problems.
A hands-on look at the cyber attacks that target human nature, with pentesting templates for performing SE ops, and tips for defending against them.
The Ghidra Book is a practical introduction to Ghidra, a comprehensive, open-source tool suite for reverse engineers.
Practical Vulnerability Management shows you how to weed out system security weaknesses and squash cyber threats in their tracks.
Web Security for Developers explores the most common ways websites get hacked and how web developers can defend themselves.
Foundations of Information Security provides a high-level overview of the information security field.
The Hardware Hacker is an illuminating career retrospective from Andrew “bunnie” Huang, one of the world’s most esteemed hackers.
Practical Binary Analysis covers advanced binary analysis topics like binary instrumentation, dynamic taint analysis, and symbolic execution.
PoC||GTFO (Proof of Concept or Get The Fuck Out), Volume 2 follows-up the wildly popular first volume with issues 9 through 13 of the eponymous hacker zine. Contributions range from humorous poems to deeply technical essays.
Malware Data Science explains how to identify, analyze, and classify large-scale malware using machine learning and data visualization.
Linux Basics for Hackers uses the Kali Linux distribution to explain core Linux topics like filesystems, networking, package management, and BASH.
Cracks open embedded security to show how hardware attacks work from the inside out.
Pentesting Azure Applications is a comprehensive guide to penetration testing cloud services deployed in Microsoft Azure.
Black Hat Go will help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset.
Real-World Bug Hunting uses real-world bug reports to teach programmers how to discover and protect vulnerabilities in web applications.
Serious Cryptography is a practical guide to the past, present, and future of cryptographic systems and algorithms.
PoC||GTFO (Proof of Concept or Get The Fuck Out) is a compilation of the wildly popular hacker zine of the same name. Contributions range from humorous poems to deeply technical essays.
Practical Packet Analysis, 3rd Ed. teaches you how to use Wireshark for packet capture and analysis.
Gray Hat C# shows you how to use C#'s powerful set of core libraries to create and automate security tools.
Attacking Network Protocols is a deep dive into network protocol security from James Forshaw, one of the world’s leading bug hunters.
Practical Forensic Imaging takes a detailed look at how to secure digital evidence using Linux-based command line tools.
The Car Hacker’s Handbook shows how to identify and exploit vulnerabilities in modern vehicles.
Rootkits and Bootkits shows you how to analyze, identify, and defend against rootkits and bootkits.
Game Hacking shows programmers how to dissect computer games and create bots.
The Smart Girl's Guide to Privacy teaches you how to protect yourself online.
iOS Application Security covers everything you need to know to design secure iOS apps from the ground up.
The Book of PF, 3rd Edition is the essential guide to building a secure network with PF, the OpenBSD packet filtering tool.
Android Security Internals gives you a complete understanding of the security internals of Android devices.
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses. In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs.
The Practice of Network Security Monitoring teaches IT and security staff how to leverage powerful NSM tools to identify threats quickly and effectively.
The Tangled Web sheds light on the security challenges that engineers, developers, and users face on the Web today. Join security expert Michal Zalewski for an in-depth look at how browsers actually work, and what pitfalls lurk in the shadows.
A Bug Hunter's Diary follows security expert Tobias Klein as he tracks down and exploits bugs in some of the world's most popular software.
"The book every malware analyst should keep handy." —Richard Bejtlich, CSO of Mandiant & Founder of TaoSecurity
No source code? No problem! This second edition of the The IDA Pro Book is the definitive guide to IDA Pro, arguably the most sophisticated disassembler in the world.
Whether your goal is to secure your own network or discover vulnerabilities for a client, Metasploit: The Penetration Tester's Guide is the definitive guide to using this dynamic and powerful tool.
"Between 2000 and mid-2008, I've read and reviewed nearly 250 technical books. I've also written several books, so I believe I can recognize a great book when I see it. Linux Firewalls is a great book."
—Richard Bejtlich, TaoSecurity.com, from the foreword to Linux Firewalls
View a sample chapter, Chapter 10: Deploying fwsnort
View a sample chapter, Chapter 5: Blinkenlights
"If you understand C and want to learn how to manipulate the FreeBSD kernel, Designing BSD Rootkits is for you. Peer into the depths of a powerful operating system and bend it to your will!"
Richard Bejtlich, TaoSecurity
The first Python book written for security analysts, Gray Hat Python explains the intricacies of using Python to assist in security analysis tasks. You'll learn how to design your own debuggers, create powerful fuzzers, utilize open source libraries to automate tedious tasks, interface with security tools, and more.