Sort by:
Hacking, The Art of Exploitation
Hacking: The Art of Exploitation teaches how software vulnerabilities work and how to exploit them at a technical level. Buffer overflows and memory corruption Shellcode writing and execution Network and...
the web application hacker's handbook
The Web Application Hacker's Handbook is the essential guide to discovering and exploiting security flaws in web applications. Mapping, attacking, and exploiting web apps SQL injection, XSS, CSRF, and more...
Bug Bounty Bootcamp
Bug Bounty Bootcamp is a practical guide to finding security vulnerabilities and submitting successful bug bounty reports. Reconnaissance and attack surface mapping XSS, SSRF, SQL injection, and IDOR Writing professional...
Real-World Bug Hunting
Real-World Bug Hunting teaches how to find security bugs using real vulnerability reports and practical techniques. IDOR, SSRF, XXE, and template injection OAuth and authentication vulnerabilities Real HackerOne and Bugcrowd...
Penetration Testing, A Hands-On Introduction to Hacking
Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman teaches pentesting from the ground up. Lab setup with Kali Linux and VMs Exploitation with Metasploit Network and web application...
Social Engineering, The Science of Human Hacking
Social Engineering: The Science of Human Hacking explores how attackers manipulate people and how to defend against it. Psychology of influence and manipulation Phishing, pretexting, and vishing attacks Building human-layer...
Hacking APIs
Hacking APIs is a hands-on guide to API security testing, covering reconnaissance to exploitation of REST and GraphQL APIs. API reconnaissance and mapping Authentication and authorization attacks Injection, fuzzing, and...
Practical Cybersecurity Architecture
Practical Cybersecurity Architecture guides security professionals in designing effective security architectures for modern organizations. Zero-trust architecture principles Network, cloud, and identity security design Threat modeling and risk-based design For security...
Getting Started Becoming a Master Hacker
Getting Started: Becoming a Master Hacker introduces beginners to ethical hacking and cybersecurity fundamentals. Reconnaissance and target enumeration Basic exploitation techniques Tools: Kali Linux, Nmap, Metasploit For beginners entering cybersecurity...
Effective Threat Investigation for SOC Analysts
Effective Threat Investigation for SOC Analysts provides practical techniques for investigating and responding to security incidents in a SOC. Threat detection and alert triage Log analysis and SIEM investigation Incident...
the ai playbook
The AI Playbook provides business leaders a practical framework for adopting and scaling artificial intelligence. Identifying high-value AI opportunities Building AI teams and data strategy Managing AI projects and measuring...