A curated list of free Security and Pentesting related E-Books available on the Internet.
If you want to contribute to this list (please do), send a pull request. All contributors will be recognized and appreciated.
Disclaimer: The contributor(s) cannot be held responsible for any misuse of the data. This repository is just a collection of URLs to download eBooks for free. Download the eBooks at your own risks.
The topics include:
- Android & iOS
- Cloud Security
- Defensive Security
- IoT
- Malware Analysis & Forensics
- Network Pentesting
- Offensive Security
- Programming Languages
- Reverse Engineering
- SysAdmin
- Virus Botnet and Malware
- Wireless Network Pentesting
- Misc
- Android
- iOS
- Cyber Operations - Building, Defending, and Attacking Modern Computer Networks
- Cyber-Physical Attack Recovery Procedures
- Cyber Threat!
- Cyber Security
- Cyber Security Policy Guidebook
- Essential Cybersecurity Science
- Identity and Data Security for Web Development : Best Practices
- Identity, Authentication, and Access Management in OpenStack
- OWASP Hacking Tutorials and Web App Protection
- Pattern and Security Requirements
- Practical Intrusion Analysis
- Security for Web Developers
- Threat Modeling - Designing for Security
- Mastering Python Forensics
- Big Data Forensics: Learning Hadoop Investigations
- Windows Malware Analysis Essentials
- Cuckoo Malware Analysis
- Practical Malware Analysis
- Hacking Exposed Computer Forensics, 2nd Edition
- Learning iOS Forensics
- Network Attacks and Exploitation
- Networking All-in-One For Dummies, 6th Edition
- Nmap Essentials
- The Book of PF, 2nd Edition
- Wireshark Essentials
- Wireshark Starter
- Antivirus Evasion
- Backtrack
- Browser Hacking
- Embedded Devices
- Hacking
- Advanced Penetration Testing for Highly-Secured Environments
- Advanced SQL Injection Hacking and Guide
- A Beginners Guide To Hacking Computer Systems
- Blind SQL Injection Discovery & Exploitation
- CEH – Hacking Database Secrets and Exploit
- Ethical Hacking Complete E-book for Beginners
- Hackers High School 13 Complete Hacking Ebooks
- Hacking : The Art of Exploitation, 2nd Edition
- Hacking attacks and Examples Test
- Hacking into Computer Systems
- Hackers' Secrets
- The Hackers Underground Handbook
- Metasploit Penetration Testing Cookbook
- Operating Systems
- Web & WebApp
- 501 Website Hacking Secrets
- Cross Site Scripting and Hacking Websites
- Dangerous Google Hacking Database and Attacks
- Hack any Website, Complete Web App Hacking
- Hacking Exposed Web 2.0
- Hacking Exposed Web Applications, 3rd Edition
- Hacking Website Database and owning systems
- Internet Advanced Denial of Service (DDOS) Attack
- Internet Security Technology and Hacking
- The Web Application Hacker's Handbook
- Vulnerability Exploit & website Hacking for Dummies
- Web App Hacking (Hackers Handbook)
- Web Penetration Testing with Kali Linux
- Web Penetration Testing with Kali Linux, 2nd Edition
- XSS, Vulnerability Exploitation & Website Hacking
- Bash
- Java
- Node.js
- PHP
- Python
- SQL
- Practical Reverse Engineering
- Reverse Engineering Hacking and Cracking
- Reverse Engineering for Beginners
- Beginning the Linux Command Line, 2nd edition
- Junos Security
- Learning Puppet Security
- Mastering Linux Network Administration
- Microsoft Windows XP Networking and Security Inside Out
- The Accidental SysAdmin Handbook, 2nd Edition
- The InfoSec Handbook
- The Practice of Network Security Monitoring
- 802.11 Wireless Networks: The Definitive Guide, 2nd Edition
- Hacking Exposed Wireless, 2nd Edition
- Kali Linux Wireless Penetration Testing
- Mastering Kali Linux Wireless Pentesting
- Mastering Wireless Penetration Testing for Highly Secured Environments
- Beautiful Security
- Building Virtual Pentesting Labs for Advanced Penetration Testing
- Computer Hacking - Cyber Laws Harvard
- Computer Security - ESORICS 2013
- Computer Security Handbook, 6th Edition
- Cybersecurity for Executives
- Data-Driven Security
- Ethical Hacking Value and Penetration testing
- Getting an Information Security Job For Dummies
- Hacking Point of Sale
- Hyper-V Security
- Protecting Yourself Online For Dummies
- Secrets of Super and Professional Hackers
- Security Intelligence
- The Myths of Security
- Ultimate Guide to Social Enginnering attacks