This repository is about books I recommend in terms of cybersecurity.
Name | URL |
---|---|
Blue Team Handbook: SOC, SIEM, and Threat Hunting (V1.02): A Condensed Guide for the Security Operations Team and Threat Hunter | https://a.co/d/70y6LYf |
Visual Threat Intelligence: An Illustrated Guide For Threat Researchers | https://a.co/d/1qJZ12Q |
Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage 1st ed. 2020 Edition | https://a.co/d/dddsYKh |
Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs | https://a.co/d/23Ujg9g |
Mastering Cyber Intelligence: Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense | https://a.co/d/hCFw8ok |
Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership 1st Edition | https://a.co/d/5xTGhkX |
Name | URL |
---|---|
Adversarial AI Attacks, Mitigations, and Defense Strategies: A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps | https://a.co/d/gCwyYId |
Name | URL |
---|---|
The Pentester BluePrint: Starting a Career as an Ethical Hacker 1st Edition | https://a.co/d/alMTpYH |
Penetration Testing: A Hands-On Introduction to Hacking | https://a.co/d/1g7jeo7 |
Writing an Effective Penetration Testing Report: An Executive View | https://a.co/d/9iTBim5 |
WEB HACKING 101: Books for White Hat Hackers | https://a.co/d/dDxurJo |
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws 2nd Edition | https://a.co/d/3g1Q9gh |
Hacking APIs: Breaking Web Application Programming Interfaces | https://a.co/d/jf2SrJL |
Black Hat GraphQL: Attacking Next Generation APIs | https://a.co/d/ceCuepg |
Internal Security Assessment: Field Guide: Successful Techniques To Hack Your Way To Admin | https://a.co/d/ghRyNfe |
Network Security Assessment: Know Your Network 3rd Edition | https://a.co/d/52OhGW2 |
Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation 1st Edition | https://a.co/d/40tfWju |
Hash Crack: Password Cracking Manual | https://a.co/d/iomzCnO |
Name | URL |
---|---|
Rtfm: Red Team Field Manual | https://a.co/d/8Tdj2l0 |
RTFM: Red Team Field Manual v2 | https://a.co/d/i1SlxxR |
Red Team Development and Operations: A practical guide | https://a.co/d/dETyEaw |
Cybersecurity Attacks – Red Team Strategies: A practical guide to building a penetration testing program having homefield advantage 1st | https://a.co/d/99yuqFR |
Hands-On Red Team Tactics | https://a.co/d/7JRlZkh |
Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity 1st Edition | https://a.co/d/bRkN9Su |
Name | URL |
---|---|
Blue Team Field Manual (BTFM) (RTFM) | https://a.co/d/hCgSn1b |
Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder. | https://a.co/d/c5hPna7 |
Practical Threat Detection Engineering: A hands-on guide to planning, developing, and validating detection capabilities | https://a.co/d/6tU89bC |
Effective Threat Investigation for SOC Analysts: The ultimate guide to examining various threats and attacker techniques using security logs | https://a.co/d/3pwGljB |
Malware Data Science: Attack Detection and Attribution | https://a.co/d/2JvwJfy |
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software 1st Edition | https://a.co/d/13D6kwo |
Cybersecurity Analyst: Strategies and Techniques for a Safer Digital Future | https://a.co/d/hArFfF6 |
Defensive Security Handbook: Best Practices for Securing Infrastructure 1st Edition | https://a.co/d/5R8KyeK |
Zero Trust Networks: Building Secure Systems in Untrusted Networks | https://a.co/d/7L0JYws |
Tribe of Hackers Blue Team: Tribal Knowledge from the Best in Defensive Cybersecurity 1st Edition | https://a.co/d/iUoCbXE |
Name | URL |
---|---|
PTFM: Purple Team Field Manual | https://a.co/d/h9PwUbw |
Hands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming | https://a.co/d/9Ji4O5W |
Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition 6th | https://a.co/d/eS9EzMG |
Name | URL |
---|---|
Bug Bounty Collection: More than $$$$$ USD in rewards by legally hacking big companies | https://a.co/d/61zRglt |
Name | URL |
---|---|
Antivirus Bypass Techniques: Learn practical techniques and tactics to combat, bypass, and evade antivirus software | https://a.co/d/fKw9DWk |
Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems. | https://a.co/d/4soq09J |
Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity | https://a.co/d/dLrxPrf |
Black Hat Bash: Creative Scripting for Hackers and Pentesters | https://a.co/d/6T3Tzm5 |
Black Hat Python, 2nd Edition: Python Programming for Hackers and Pentesters 2nd Edition | https://a.co/d/3yq06Nn |
Gray Hat C#: A Hacker's Guide to Creating and Automating Security Tools | https://a.co/d/i5FBwdi |
Black Hat Go: Go Programming For Hackers and Pentesters | https://a.co/d/4ugktSV |
Name | URL |
---|---|
Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity (Rheinwerk Computing) First Edition | https://a.co/d/3l8xiH7 |
Hacking: The Art of Exploitation, 2nd Edition | https://a.co/d/8IMywXk |
VX Underground Black Mass: Volume 1 | https://a.co/d/3r2yJ1i |
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers | https://a.co/d/8bXmGs8 |
Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency | https://a.co/d/hm3oT41 |
Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World | https://a.co/d/gmaicVl |
Hacking Capitalism: Modeling, Humans, Computers, and Money. | https://a.co/d/gU3wP1E |
The Art of Cyberwarfare: An Investigator's Guide to Espionage, Ransomware, and Organized Cybercrime | https://a.co/d/1RqdH8L |
CYBERSECURITY DICTIONARY for Everyone: 1250 Terms Explained in Simple English | https://a.co/d/9drkN08 |
PoC or GTFO | https://a.co/d/5rtxras |
PoC or GTFO, Volume 2 | https://a.co/d/6RU0vop |
PoC or GTFO, Volume 3 | https://a.co/d/2uHTRoz |
xchg rax,rax | https://a.co/d/hzmEzw8 |
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World 1st Edition | https://a.co/d/hGCTCPy |