Infosec TODOS Link to heading

TODOs Link to heading

Some other TODOs Link to heading

Books to read Link to heading

  • The web aplication hackers handbook, dafydd stuttard
  • Metasploit, david kennedy
  • Hacking, jon erickson
  • Applied cryptography, bruce schneier
  • Network security assessment, chris mcnab
  • Practical malware analysis, michael sikorski
  • Ghost in the wires, kevin mitnick
  • CISSP all-in-one exam guide, shon harris
  • Threat modeling, adam shostack
  • Black hat python, justin seitz
  • Sql injection attacks and defenses syngress
  • Metasploit penetration testing, Abhimav Singh
  • The practice of network security monitoring,
  • Cissp, official study guide
  • Practical reverse engineering, dang gazel
  • The art of memory forensics, hale ligh
  • The shellcoders handbook, richarte
  • Buffer overflows, foster
  • Windows privilege escalation, Alan Wang
  • Metasploit: The Penetration Tester’s Guide" by David Kennedy, Jim O’Gorman, Devon Kearns, and Mati Aharoni
  • Hacking: The Art of Exploitation, 2nd Edition" by Jon Erickson
  • Black Hat Python: Python Programming for Hackers and Pentesters" by Justin Seitz
  • Real-World Bug Hunting: A Field Guide to Web Hacking" by Peter Yaworski
  • Penetration Testing: A Hands-On Introduction to Hacking" by Georgia Weidman
  • “Mastering Modern Web Penetration Testing” by Prakhar Prasad

Online reading Link to heading

Books to read (kindle) Link to heading

  • Black Hat Python: Python Programming for Hackers and Pentesters
  • Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
  • The IDA Pro Book: The Unofficial Guide to the World’s Most Popular Disassembler
  • CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide
  • The Practice of Network Security Monitoring: Understanding Incident Detection and Response
  • CISSP All-in-One Exam Guide, Seventh Edition
  • Risk Analysis and Security Countermeasure Selection, Second Edition
  • Thinking Security: Stopping Next Year’s Hackers (Addison-Wesley Professional Computing Series)
  • Defensive Security Handbook: Best Practices for Securing Infrastructure
  • Hacking Exposed 7: Network Security Secrets and Solutions
  • Cybersecurity for Beginners
  • Professional Penetration Testing: Creating and Learning in a Hacking Lab
  • Network Security Assessment: Know Your Network
  • Metasploit: The Penetration Tester’s Guide
  • Managed Code Rootkits: Hooking into Runtime Environments
  • Network Forensics: Tracking Hackers through Cyberspace
  • Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
  • Nmap 6: Network exploration and security auditing Cookbook
  • The Database Hacker’s Handbook: Defending Database Servers
  • A Bug Hunter’s Diary: A Guided Tour Through the Wilds of Software Security
  • Red Team: How to Succeed By Thinking Like the Enemy
  • Hacking: The Art of Exploitation: The Art of Exploitation
  • The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
  • The Hacker Playbook 2: Practical Guide To Penetration Testing
  • The Art of Deception: Controlling the Human Element of Security
  • The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
  • Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker
  • Security Automation with Ansible 2: Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis
  • A Concise Introduction to DevSecOps
  • DevSecOps A Complete Guide - 2019 Edition
  • Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps
  • A Guide to Kernel Exploitation: Attacking the Core

Resources RE Link to heading