Good security books – Thanks to meir888 for writing this page


Information Security – Principles and Practice by Mark Stamp, 2nd Edition, 2011 (very good book!!)

Reverse engineering, assembly, exploitation, shell code

The IDA Pro Book – The Unofficial Guide to the World’s Most Popular Disassembler, 2nd Edition, 2011

Reverse Engineering for Beginners – FREE eBook

Practical Reverse Engineering – x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation, 2014

A Guide to Kernel Exploitation – Attacking the Core, 2010

Hacking – The Art of Exploitation, 2nd Edition, 2008

The Shellcoder’s Handbook – Discovering and Exploiting Security Holes, 2nd Edition, 2007

Writing Security Tools and Exploits, 2006

Cyber, Hacking, Penetration Testing
Cybersecurity – Managing Systems, Conducting Testing, and Investigating Intrusions, 2013

Penetration Testing – A Hands-On Introduction to Hacking, 2014

The Hacker Playbook 2 – Practical Guide To Penetration Testing, 2015

Web Application

The Web Application Hacker’s Handbook – Finding and Exploiting Security Flaws, 2nd Edition, 2011

Malware Analysis

Practical Malware Analysis – The Hands-On Guide to Dissecting Malicious Software, 2012

The Art of Memory Forensics – Detecting Malware and Threats in Windows, Linux, and Mac Memory, 2014

Cuckoo Malware Analysis, 2013

Advanced Malware Analysis, 2015

Malware Analyst’s Cookbook and DVD – Tools and Techniques for Fighting Malicious Code, 2010


The Rootkit Arsenal – Escape and Evasion in the Dark Corners of the System, 2nd Edition, 2012

Rootkits, Subverting the Windows Kernel, 2005

Managed Code Rootkits – Hooking into Runtime Environments, 2010


EnCase Computer Forensics – The Official EnCE – EnCase Certified Examiner Study Guide, 3rd Edition, 2012

Kali Linux, Metasploit

Metasploit – The Penetration Tester’s Guide, 2011

Basic Security Testing with Kali Linux, 2014


Nmap 6 Cookbook, The Fat Free Guide to Network Security Scanning, 2015

Practical Packet Analysis – Using Wireshark to Solve Real-World Network Problems, 2nd Edition, 2011

Wireshark 101 – Essential Skills for Network Analysis, 2013


Android Malware and Analysis, 2014

Secure Coding

Secure Coding in C and C++, 2nd Edition, 2013

24 Deadly Sins of Software Security – Programming Flaws and How to Fix Them, 2009


Black Hat Python – Python Programming for Hackers and Pentesters, 2014

Violent Python – A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers, 2012

Windows Internals

Windows Internals by Mark E. Russinovich, Part 1, 6th Edition

Windows Internals by Mark E. Russinovich, Part 2, 6th Edition

Native WinAPI

Undocumented Windows 2000 Secrets – The Programmers Cookbook, 2001

Windows NT-2000 Native API Reference, 2000

Cheat Sheet

RTFM – Red Team Field Manual, 2014

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s