A list of cool cybersecurity e-books for absolutely free :)
- Python for Offensive PenTest-A guide to ethical hacking and penetration testing
- Violent Python for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
- Learning Python
- Black Hat Python Programming for Hackers and Pentesters.
- Modern Python Cookbook
- Hacking with Python Ultimate Beginner ’ s Guide
- Python Web Penetration Testing Cookbook- Over 60 indispensable Python recipes to ensure you always have the right code on hand for web application testing.
- Mastering Python Networking- Utilize Python packages and frameworks for network automation,monitoring, cloud, and management.
- Machine Learning and Security
- Malware Analysis Fundamentals – MALWARE ANALYSIS TOOLS AND TECHNIQUES.
- THE IDA PRO BOOK -THE UNOFFICIAL GUIDE TO THE WORLD'S MOST POPULAR DISASSEMBLER
- Advanced Malware Analysis.
- Detection of Intrusions and Malware, and Vulnerability Assessment.
- Learning Malware Analysis- Explore the concepts, tools, and techniques to analyze and investigate Windows malware.
- Malware Analyst’s- Tools and Techniques for Fighting Malicious Code.
- Malware Detection Advances in Information Security
- The Rootkit ARSENAL-Escape and Evasion in the Dark Corners of the System
- Windows Malware Analysis Essentials- Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set
- PRACTICAL MALWARE ANALYSIS
- Writing Security Tools And Exploits.
- Windows Virus and Malware Troubleshooting.
- Rootkits and bootkits Reversing Modern Malware and Next Generation Threats.
- Malware Analysis Techniques Tricks for the triage of adversarial software.
- Malware Data Science Attack Detection and Attribution.
- The Art of Memory Forensics.
- Practical Forensic Imaging.
- Malware Forensics Field Guide for Windows Systems
- Cyber Forensics. A Field Manual for Collecting.
- Attacking Network Protocols.
- Digital Forensics With Open Source Tools.
- Cyber Forensics.
- Hacking Exposed Malware And Rootkit
- Digital Forensics.
- Windows Forensic.
- Windows Malware Analysis Accelerated with Memory Dumps.
- Computer Viruses and Malware
- WIRESHARK FOR SECURITY PROFESSIONALS: Using Wireshark and the Metasploit Framework
- Reverse Engineering for Beginners
- Computer and Information Security Handbook
- Windows Forensic Analysis.
- Computer Viruses FOR DUMmIES.
- BINARY INSTRUMENTATION FOR SECURITY PROFESSIONALS.
- HACKING EXPOSED COMPUTER FORENSICS
- Learn Computer Forensics - analyzing, acquiring, and securing digital evidence.
- Linux Malware Incident Response: A Practitioner’s Guide to Forensic Collection and Examination of Volatile Data.
- The Basics of Digital Forensics.
- Digital Forensics Basics A Practical Guide Using Windows OS.
- PowerShell and Python Together Targeting Digital Investigations.
- Incident Response & Computer Forensics, Third Edition.
- COMPUTER FORENSICS Cybercriminals, Laws, and Evidence.
- Guide to Computer Forensics and Investigations: Processing Digital Evidence.
- Basic Security Testing with Kali Linux.
- Kali Linux Network Scanning Cookbook.
- Kali Linux - Assuring Security by Penetration Testing.
- Kali Linux 2 Windows Penetration Testing.
- Kali Linux Cookbook.
- Web Penetration Testing with Kali Linux.
- The Ultimate Kali Linux book: Perform advanced penetration testing
- Gray Hat Hacking The Ethical Hacker’s Handbook.
- Gray Hat Hacking: The Ethical Hacker’s Handbook, Fifth Edition
- Gray Hat Hacking: The Ethical Hacker’s Handbook, Fourth Edition
- Gray Hat Hacking: The Ethical Hacker’s Handbook, Second Edition.
- Penetration Testing: A Survival Guide.
- Mastering Modern Web Penetration Testing.
- THE HACKER PLAYBOOK 2 Practical Guide To Penetration Testing.
- The Basics of hacking and penetration testing.
- Quick Start Guide to Penetration Testing.
- ETHICAL HACKING AND PENETRATION TESTING GUIDE.
- ETHICAL HACKING 101 How to conduct professional pentestings in 21 days or less!
- HackLOG Security & Ethical Hacking Handbook VOLUME 1 ANONYMITY
- THE HACKER PLAYBOOK 3 Practical Guide to Penetration Testing. (Much acclaimed updated version)
- Hacking The Ultimate Hacking for Beginners How to Hack Hacking Intelligence.
- Prophet Hacker Android Hacking Book
- Hacking Bible
- Web App Hacking (Hackers Handbook)
- Pentesting Azure Applications.
- Gray Hat C# a Hacker’s Guide to Creating and automating Security tools by Brandon Perry
- Antivirus Hackers handbook.
- Android Hacker's Handbook.
- iOS ApplicAtiOn Securitythe Definitive Guide for Hackers and Developers.
- Mobile Pentesting with FRIDA
- Mobile Security For Dummies
- Android Application Security
- Mobile Device Exploitation Cookbook
- Hacking Android
- Mobile Exploitation - The past, present, and the future.
- ANDROID SECURITY INTERNALS -An In-Depth Guide to Android’s Security Architecture.
- Extreme Networks Security API Reference Guide
- Advanced API Security Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE.
- Pro ASP-NET Web API Security Securing ASP-NET Web API LEARN TO SECURE YOUR ASP-NET WEB API SERVICES EFFECTIVELY.
- Cyber Security on Azure An IT Professional’s Guide to Microsoft Azure Security Center.
- Practical Cloud Security A Guide for Secure Design and Deployment
- The Tangled Web. A Guide to Securing Modern Web Applications
- Linux Command Line and Shell Scripting Bible (Massive Guide 1052 pags)
- Nmap Official Guide+ Scripts.
- Network Security Bible.
- Anti-Hacker Tool Kit