|
| 1 | +# Free Security eBooks |
| 2 | +[](https://travis-ci.org/Hack-with-Github/Free-Security-eBooks) |
| 3 | + |
| 4 | +A curated list of free Security and Pentesting related E-Books available on the Internet. |
| 5 | + |
| 6 | +If you want to contribute to this list (please do), send a pull request. All contributors will be recognized and appreciated. |
| 7 | + |
| 8 | +#### Disclaimer: The contributor(s) cannot be held responsible for any misuse of the data. This repository is just a collection of URLs to download eBooks for free. Download the eBooks at your own risks. |
| 9 | + |
| 10 | +#### DMCA takedown cannot be possible as we are not republishing the books/infringement of code, but we are just hosting the links to 3rd party websites where these books can be downloaded. To know more on DMCA takedown policy [here](https://help.github.com/articles/dmca-takedown-policy/). |
| 11 | + |
| 12 | +The topics include: |
| 13 | + |
| 14 | +- [Android & iOS](#android--ios) |
| 15 | +- [Cloud Security](#cloud-security) |
| 16 | +- [Defensive Security](#defensive-security) |
| 17 | +- [IoT](#iot) |
| 18 | +- [Malware Analysis & Forensics](#malware-analysis--forensics) |
| 19 | +- [Network Pentesting](#network-pentesting) |
| 20 | +- [Offensive Security](#offensive-security) |
| 21 | +- [Programming Languages](#programming-languages) |
| 22 | +- [Reverse Engineering](#reverse-engineering) |
| 23 | +- [SysAdmin](#sysadmin) |
| 24 | +- [Virus Botnet and Malware](#virus-botnet-and-malware) |
| 25 | +- [Wireless Network Pentesting](#wireless-network-pentesting) |
| 26 | +- [Misc](#misc) |
| 27 | + |
| 28 | +---------- |
| 29 | + |
| 30 | +### Network Pentesting |
| 31 | +- [Wireshark Essentilals](https://github.com/cyberh3x/books/blob/master/9781783554638-WIRESHARK_ESSENTIALS.pdf) |
| 32 | +- [Mastering Wireshark](https://github.com/cyberh3x/books/blob/master/9781783989522-MASTERING_WIRESHARK.pdf) |
| 33 | + |
| 34 | +### Defensive Security |
| 35 | +- [Holistic Info-Sec for Web Developers - Fascicle 0](https://f0.holisticinfosecforwebdevelopers.com/) |
| 36 | +- [Holistic Info-Sec for Web Developers - Fascicle 1](https://f1.holisticinfosecforwebdevelopers.com/) |
| 37 | +- [OWASP Hacking Tutorials and Web App Protection](https://www.owasp.org/images/d/d0/Web_Services_Hacking_and_Hardening.pdf) |
| 38 | +- [Threat Modeling - Designing for Security](https://news.asis.io/sites/default/files/Threat%20Modeling.pdf) |
| 39 | + |
| 40 | +---------- |
| 41 | + |
| 42 | +### Offensive Security |
| 43 | + |
| 44 | +- **Backtrack** |
| 45 | + - [Hack your Friend using Backtrack](http://hackerspace.cs.rutgers.edu/library/bt5tutorials/HackYourFriend.pdf) |
| 46 | +- **Kali Linux** |
| 47 | + - [Kali Linux Revealed Book](https://kali.training/) |
| 48 | + - [Windows Pentesting with Kali Linux v2](https://github.com/cyberh3x/books/blob/master/9781782168492-KALI_LINUX_2_WINDOWS_PENETRATION_TESTING.pdf) |
| 49 | +- **Hacking** |
| 50 | + - [Advanced SQL Injection Hacking and Guide](https://defcon.org/images/defcon-17/dc-17-presentations/defcon-17-joseph_mccray-adv_sql_injection.pdf) |
| 51 | + - [A Beginners Guide To Hacking Computer Systems](http://www.mediafire.com/download/dyewn6f3r3olnuw/A+Beginners+Guide+To+Hacking+Computer+Systems.zip) |
| 52 | + - [Blind SQL Injection Discovery & Exploitation](http://blueinfy.com/wp/blindsql.pdf) |
| 53 | + - [CEH – Hacking Database Secrets and Exploit](http://repo.thehackademy.net/depot_cehv6/) |
| 54 | + - [Ethical Hacking Complete E-book for Beginners](http://pdf.textfiles.com/security/palmer.pdf) |
| 55 | + - [Hackers High School 13 Complete Hacking Ebooks](http://www.mediafire.com/download/u2akquvibe6ia13/Hackers+High+School+13+Complete+Hacking+E-books.rar) |
| 56 | + - [Hacking attacks and Examples Test](http://www.mediafire.com/download/dpysbzboord42lo/Hacking+attacks+and+Examples+Test.zip) |
| 57 | + - [Hacking into Computer Systems](http://www.academia.edu/1153769/Hacking_into_computer_systems_-_a_beginners_guide) |
| 58 | + - [Hackers' Secrets](http://www.onlinepot.org/security/HackersSecrets.pdf) |
| 59 | +- **Operating Systems** |
| 60 | + - **Windows** |
| 61 | + - [Modern Windows Exploit Development](https://userscloud.com/9ifscj08wllu) |
| 62 | +- **Web & WebApp** |
| 63 | + - [501 Website Hacking Secrets](http://www.mediafire.com/download/da8nhq8oh5iddae/501+Website+Hacking+Secrets.zip) |
| 64 | + - [Cross Site Scripting and Hacking Websites](http://www.objectif-securite.ch/research/xss_security_days.pdf) |
| 65 | + - [Dangerous Google Hacking Database and Attacks](http://www.mediafire.com/download/s3535s2yg1w26u7/Dangerours+Google+Hacking+Database+and+Attacks.zip) |
| 66 | + - [Hack any Website, Complete Web App Hacking](https://www.defcon.org/images/defcon-11/dc-11-presentations/dc-11-Gentil/dc-11-gentil.pdf) |
| 67 | + - [Hacking Website Database and owning systems](http://www.blackhat.com/presentations/bh-europe-07/Cerrudo/Whitepaper/bh-eu-07-cerrudo-WP-up.pdf) |
| 68 | + - [Internet Advanced Denial of Service (DDOS) Attack](http://www.mediafire.com/download/b4jmyl022rh48c0/Internet+Advanced+Denial+of+Service+%28DDOS%29+Attack.zip) |
| 69 | + - [Internet Security Technology and Hacking](http://www.mediafire.com/download/7tk860o8n777iqa/Internet+Security+Technology+and+Hacking.zip) |
| 70 | + - [The Web Application Hacker's Handbook](https://leaksource.files.wordpress.com/2014/08/the-web-application-hackers-handbook.pdf) |
| 71 | + - [Vulnerability Exploit & website Hacking for Dummies](http://www.mediafire.com/download/j8cvosmvcb4vpw9/Vulnerability+Exploitation+%26+website+Hacking+for+Dummies.rar) |
| 72 | + - [Web App Hacking (Hackers Handbook)](http://www.mediafire.com/download/c7b18vtpc77sysi/Web+App+Hacking+%28Hackers+Handbook%29.zip) |
| 73 | + - [XSS, Vulnerability Exploitation & Website Hacking](http://www.cis.syr.edu/~wedu/seed/Labs/Attacks_XSS/XSS.pdf) |
| 74 | + |
| 75 | +---------- |
| 76 | + |
| 77 | +### Programming Languages |
| 78 | +- **Python** |
| 79 | + - [Violent Python : A Cookbook for Hackers (2013)](https://github.com/reconSF/python/blob/master/Syngress.Violent.Python.a.Cookbook.for.Hackers.2013.pdf) |
| 80 | + |
| 81 | +---------- |
| 82 | + |
| 83 | +### Reverse Engineering |
| 84 | +- [Reverse Engineering Hacking and Cracking](https://media.blackhat.com/bh-dc-11/Grand/BlackHat_DC_2011_Grand-Workshop.pdf) |
| 85 | +- [Reverse Engineering for Beginners ](http://www.t-gr.com/fotis/books/re.pdf) |
| 86 | + |
| 87 | +---------- |
| 88 | + |
| 89 | +### Virus Botnet and Malware |
| 90 | +- [Black Book of Viruses and Hacking](http://www.mediafire.com/download/c8ilcobmyiqooyp/Black+Book+of+Viruses+and+Hacking.zip) |
| 91 | +- [Computer Hacking & Malware Attacks for Dummies](http://www.mediafire.com/download/8derf9dueyq64i5/Computer+Viruses%2C+Hacking+and+Malware+attacks+for+Dummies.zip) |
| 92 | + |
| 93 | +---------- |
| 94 | + |
| 95 | +### Misc |
| 96 | +- [Computer Hacking - Cyber Laws Harvard](https://cyber.harvard.edu/sites/cyber.law.harvard.edu/files/ComputerHacking.pdf) |
| 97 | +- [Ethical Hacking Value and Penetration testing](https://www.certconf.org/presentations/2003/Wed/WM4.pdf) |
| 98 | +- [Secrets of Super and Professional Hackers](http://www.mediafire.com/download/2sspb36u5gymd23/Secrets+of+Super+and+Professional+Hackers.zip) |
| 99 | +- [Hackers High School 13Complete Hacking E-books](http://www.mediafire.com/download/u2akquvibe6ia13/Hackers+High+School+13+Complete+Hacking+E-books.rar) |
| 100 | +- [Network Hacking and Shadows Hacking Attacks](http://www.mediafire.com/download/utp50jqd25ngw3q/Network_Hacking_and_Shadows_Hacking_Attacks.zip) |
0 commit comments