# Free Security eBooks
[]([Link]
A curated list of free Security and Pentesting related E-Books available on the
Internet.
If you want to contribute to this list (please do), send a pull request. All
contributors will be recognized and appreciated.
#### Disclaimer: The contributor(s) cannot be held responsible for any misuse of
the data. This repository is just a collection of URLs to download eBooks for free.
Download the eBooks at your own risks.
#### DMCA takedown cannot be possible as we are not republishing the
books/infringement of code, but we are just hosting the links to 3rd party websites
where these books can be downloaded. To know more on DMCA takedown policy [here]
([Link]
The topics include:
- [Android & iOS](#android--ios)
- [Cloud Security](#cloud-security)
- [Defensive Security](#defensive-security)
- [IoT](#iot)
- [Malware Analysis & Forensics](#malware-analysis--forensics)
- [Network Pentesting](#network-pentesting)
- [Offensive Security](#offensive-security)
- [Programming Languages](#programming-languages)
- [Reverse Engineering](#reverse-engineering)
- [SysAdmin](#sysadmin)
- [Virus Botnet and Malware](#virus-botnet-and-malware)
- [Wireless Network Pentesting](#wireless-network-pentesting)
- [Misc](#misc)
----------
### Network Pentesting
- [Wireshark Essentilals]
([Link]
WIRESHARK_ESSENTIALS.pdf)
- [Mastering Wireshark]
([Link]
MASTERING_WIRESHARK.pdf)
### Defensive Security
- [Holistic Info-Sec for Web Developers - Fascicle 0]
([Link]
- [Holistic Info-Sec for Web Developers - Fascicle 1]
([Link]
- [OWASP Hacking Tutorials and Web App Protection]
([Link]
- [Threat Modeling - Designing for Security]
([Link]
----------
### Offensive Security
- **Backtrack**
- [Hack your Friend using Backtrack]
([Link]
- **Kali Linux**
- [Kali Linux Revealed Book]([Link]
- [Windows Pentesting with Kali Linux v2]
([Link]
KALI_LINUX_2_WINDOWS_PENETRATION_TESTING.pdf)
- **Hacking**
- [Advanced SQL Injection Hacking and Guide]([Link]
17/dc-17-presentations/defcon-17-joseph_mccray-adv_sql_injection.pdf)
- [A Beginners Guide To Hacking Computer Systems]
([Link]
puter+[Link])
- [Blind SQL Injection Discovery & Exploitation]
([Link]
- [CEH – Hacking Database Secrets and Exploit]
([Link]
- [Ethical Hacking Complete E-book for Beginners]
([Link]
- [Hackers High School 13 Complete Hacking Ebooks]
([Link]
Hacking+[Link])
- [Hacking attacks and Examples Test]
([Link]
[Link])
- [Hacking into Computer Systems]
([Link]
- [Hackers' Secrets]([Link]
- **Operating Systems**
- **Windows**
- [Modern Windows Exploit Development]([Link]
- **Web & WebApp**
- [501 Website Hacking Secrets]
([Link]
- [Cross Site Scripting and Hacking Websites]([Link]
[Link]/research/xss_security_days.pdf)
- [Dangerous Google Hacking Database and Attacks]
([Link]
se+and+[Link])
- [Hack any Website, Complete Web App Hacking]
([Link]
[Link])
- [Hacking Website Database and owning systems]
([Link]
[Link])
- [Internet Advanced Denial of Service (DDOS) Attack]
([Link]
ice+%28DDOS%29+[Link])
- [Internet Security Technology and Hacking]
([Link]
+[Link])
- [The Web Application Hacker's Handbook]
([Link]
[Link])
- [Vulnerability Exploit & website Hacking for Dummies]
([Link]
%26+website+Hacking+for+[Link])
- [Web App Hacking (Hackers Handbook)]
([Link]
%28Hackers+Handbook%[Link])
- [XSS, Vulnerability Exploitation & Website Hacking]
([Link]
----------
### Programming Languages
- **Python**
- [Violent Python : A Cookbook for Hackers (2013)]
([Link]
[Link])
----------
### Reverse Engineering
- [Reverse Engineering Hacking and Cracking]([Link]
11/Grand/BlackHat_DC_2011_Grand-[Link])
- [Reverse Engineering for Beginners ]([Link]
----------
### Virus Botnet and Malware
- [Black Book of Viruses and Hacking]
([Link]
[Link])
- [Computer Hacking & Malware Attacks for Dummies]
([Link]
%2C+Hacking+and+Malware+attacks+for+[Link])
----------
### Misc
- [Computer Hacking - Cyber Laws Harvard]
([Link]
- [Ethical Hacking Value and Penetration testing]
([Link]
- [Secrets of Super and Professional Hackers]
([Link]
l+[Link])
- [Ultimate Guide to Social Enginnering attacks]
([Link]
%[Link])