HackingBooks
here is the largest collection of hacking and pentesting books, for all my dudes who cant afford to buy them! feel free to join my Telegram Channel https://t.me/sudosuraz
Install / Use
/learn @sudosuraj/HackingBooksREADME
th3hack
It will be Launch soon! follow https://www.instagram.com/sudosuraj for further updates!
Hacking-Security-Ebooks
Top 100 Hacking & Security E-Books (Free Download) - Powered by <a href="https://th3hack.com">th3Hack.com</a>.
#<a href="https://mega.nz/#!jKxWyQha!qAcnzP4H5XgA5GDmQluO5bL3LznqvOJ0GM7cm3z_aD8">Download All</a>
<table width="100%" class="table"> <tr> <th>S.No</th> <th>E-Book (PDF Link)</th> <th>Total Pages</th> </tr> <tr><td>1.</td><td><a target="_blank" href="https://mega.nz/file/abI2jbxA#rLmfn-cda99y9VF9NaV53xQEzIY_wHVtyRodLU-qKyg">Advanced Penetration Testing</a></td><td>269 Pages</td></tr> <tr><td>2.</td><td><a target="_blank" href="https://mega.nz/file/ieYyXDYS#F7jKWnuYmiA31vI7AcUbOJ_8bpttxz4wDIDEjxzJBDc">The Basics of Web Hacking</a></td><td>179 Pages</td></tr> <tr><td>3.</td><td><a target="_blank" href="https://mega.nz/file/2WQ0gJIL#ctQd0e-yzb1QXoYk01yPTA9jl78TbNaZI4GoLdg6PSo">The Basics of Hacking and Penetration Testing</a></td><td>178 Pages</td></tr> <tr><td>4.</td><td><a target="_blank" href="https://mega.nz/file/bXYQ2JoR#yR6BzKz4sva2qAzRMCju1jpHphgwe12ssZLknBNk4yc">The Art of Deception by Kevin Mitnick</a></td><td>577 Pages</td></tr> <tr><td>5.</td><td><a target="_blank" href="https://mega.nz/file/bPYkjLhb#ZovQRMu6VMwkdLqOFhuUi4wCj7Pq0PJgiHZiItUt0DY">SQL Injection Attacks and Defense</a></td><td>761 Pages</td></tr> <tr><td>6.</td><td><a target="_blank" href="https://mega.nz/file/mfIkHZJZ#Y6ZftkyGJc8Rw2WI63v213iIl_SMEtY1qBsb7p2nQjs">Metasploit - The Penetration Tester's Guide</a></td><td>332 Pages</td></tr> <tr><td>7.</td><td><a target="_blank" href="https://mega.nz/file/HDYUzZAY#jQ0ohALFI2fKrO6S5JzRjOZn6YmAMqKgkCPQLM0Peew">Ethical Hacking and Penetration Testing Guide</a></td><td>523 Pages</td></tr> <tr><td>8.</td><td><a target="_blank" href="https://mega.nz/file/6WQGAD6Z#UGry-SnTLB3s4qMfh29s6jDromDGQc8I_fkWIqAY6rc">Network Attacks and Exploitation - A Framework</a></td><td>219 Pages</td></tr> <tr><td>9.</td><td><a target="_blank" href="https://difl.host/6e39ff5edc948cb1/09._Python_Web_Penetration_Testing_Cookbook.pdf">Python Web Penetration Testing Cookbook</a></td><td>224 Pages</td></tr> <tr><td>10.</td><td><a target="_blank" href="https://mega.nz/file/7TRUCZCZ#ZPFmeFnccvR4ltf_2lwTdi8PqHIArRx_bkqRP9wwq4k">Wireshark for Security Professionals</a></td><td>391 Pages</td></tr> <tr><td>11.</td><td><a target="_blank" href="https://openload.co/f/2tsVl0FU0Kc/11._Modern_Web_Penetration_Testing.pdf">Mastering Modern Web Penetration Testing</a></td><td>298 Pages</td></tr> <tr><td>12.</td><td><a target="_blank" href="https://mega.nz/file/3OZgwT6Z#8yNyiuSHVQ3gOib4rKJYtwsCwSfqAfoFj2lQtwUyI8o">The Shellcoder's Handbook</a></td><td>745 Pages</td></tr> <tr><td>13.</td><td><a target="_blank" href="https://mega.nz/file/SDICALSJ#3r2oy2AsGXR3P7f8K7xvL2kEVjR6ccze83cAmz9VIBc">The Little Black Book of Computer Viruses</a></td><td>183 Pages</td></tr> <tr><td>14.</td><td><a target="_blank" href="https://mega.nz/file/3XJCyD5C#qAda14pWUjd5u4wjOYmzCI52UMa1rUFulh7V0kBGZk8">XSS Attacks - Cross Site Scripting Exploits and Defense</a></td><td>482 Pages</td></tr> <tr><td>15.</td><td><a target="_blank" href="https://mega.nz/file/jTBwVL6T#hVGYbGKJCcbUh83yztODz-8aMZZbJMWPoCdmr5Z4C9w">The Web Application Hacker's Handbook</a></td><td>771 Pages</td></tr> <tr><td>16.</td><td><a target="_blank" href="https://mega.nz/file/2fAyRb4C#tpFivx91Ips2rR3UnVdtlgvx1oOmi-qEtCu29DlO9uQ">Ethical Hacking and Countermeasures</a></td><td>239 Pages</td></tr> <tr><td>17.</td><td><a target="_blank" href="https://mega.nz/file/LGRUzLIC#MB5a5s9wpaWEEGnhi5j_73kMtPIQx0rEuQXv5_Y_gd4">Reversing - Secrets of Reverse Engineering</a></td><td>619 Pages</td></tr> <tr><td>18.</td><td><a target="_blank" href="https://mega.nz/file/mLAUEbDQ#PXzqsNN2PPc-PUVyAwbfknTHEA-QBvjwvpjjQgZnYMo">Network Security Bible</a></td><td>697 Pages</td></tr> <tr><td>19.</td><td><a target="_blank" href="https://mega.nz/file/LCYWWRYI#QQ8O9k6lp7vmYWzrbxbs8ItSVbYpSluYfktCxWURZGs">Hacking Web Applications - Hacking Exposed</a></td><td>416 Pages</td></tr> <tr><td>20.</td><td><a target="_blank" href="https://mega.nz/file/iKQ2jZSQ#ur1W05ChW7_ipTYtEK6QKpIlyoqLyS82RGsEUEzFQDQ">Hacking for Dummies</a></td><td>387 Pages</td></tr> <tr><td>21.</td><td><a target="_blank" href="https://mega.nz/file/6LI20T7B#TvvIUOn5TQ4HsS4qrTAX6dOD0JG4tZ9FtLj6bEFGg2M">Hacking Wireless Network for Dummies</a></td><td>387 Pages</td></tr> <tr><td>22.</td><td><a target="_blank" href="https://mega.nz/file/SDAikR4I#b018YKF4UZ2xRh0mqouRm6pssXd0lbWRuwCoPepxW2Q">Ninja Hacking - Unconventional Penetration Testing Tacting and Techniques</a></td><td>314 pages</td></tr> <tr><td>23.</td><td><a target="_blank" href="https://mega.nz/file/3PYElRpL#GWFniwOY738v8URo3HsnQwVV5h957-Ppx7FxMwYmJCI">Professional Penetration Testing</a></td><td>525 Pages</td></tr> <tr><td>24.</td><td><a target="_blank" href="https://mega.nz/file/yGYihB7I#8bmNXXPvSgIotZTsPbGaR-dSj9MfyOoNmm7iZ2me798">Gray Hat Hacking - The Ethical Hacker's Handbook</a></td><td>577 Pages</td></tr> <tr><td>25.</td><td><a target="_blank" href="https://mega.nz/file/mGIC2TBD#pkJBqjgeN_BJWe8PRveaA4nwRICK7WQ80BUowDSVfXI">Hack Attacks Testing</a></td><td>561 Pages</td></tr> <tr><td>26.</td><td><a target="_blank" href="https://mega.nz/file/6GIAHb4B#oh0fxNYfOqiyCNoeyqayetg_e2G3B8ZF7M3lr3NMCgU">Basic Security Testing with Kali Linux</a></td><td>242 Pages</td></tr> <tr><td>27.</td><td><a target="_blank" href="https://difl.host/ba9765fffecd1e25/27._Mastering_Kali_Linux_For_Advanced_Penetration_Testing.pdf">Mastering Kali Linux for Advanced Penetration Testing</a></td><td>356 Pages</td></tr> <tr><td>28.</td><td><a target="_blank" href="https://difl.host/ab3e7a5e5a023fdc/28._Kali_Linux_CTF_Blueprints.pdf">Kali Linux CTF Blueprints</a></td><td>190 Pages</td></tr> <tr><td>29.</td><td><a target="_blank" href="https://difl.host/f152e4b334a4d268/29._Kali_Linux_Cookbook.pdf">Kali Linux Cookbook</a></td><td>261 Pages</td></tr> <tr><td>30.</td><td><a target="_blank" href="https://difl.host/670feaf53fca0080/30._Kali_Linux-_Assuring_Security_by_Penetration_Testing.pdf">Kali Linux - Assuring Security by Penetration Testing</a></td><td>454 Pages</td></tr> <tr><td>31.</td><td><a target="_blank" href="https://mega.nz/file/uDZGSDoA#vZXeBRcG7poaDNMaNd9XXe7FYWAO8MIk4DYmglq1tBQ">Information Security Management Handbook</a></td><td>3206 Pages</td></tr> <tr><td>32.</td><td><a target="_blank" href="https://mega.nz/file/PfIyiRaD#wjKpxiT-qi9r5W8px3-aDqiglZMr1fyh3ThkwPPyrRQ">Computer and Information Security Handbook</a></td><td>877 Pages</td></tr> <tr><td>33.</td><td><a target="_blank" href="https://mega.nz/file/WfRWkJIT#Z0ox5K8qeLeobE6VoBeXsrO5mxu68HeaczcCFRg5hC8">CISSP - Certified Information Systems Security Professional</a></td><td>804 Pages</td></tr> <tr><td>34.</td><td><a target="_blank" href="https://mega.nz/file/WKAERJqY#nnLb6e1SWgEL6D3kqdY2FLmHhK8wuxHUyJM-ghiC4JI">Computer Security and Cryptography</a></td><td>542 Pages</td></tr> <tr><td>35.</td><td><a target="_blank" href="https://mega.nz/file/6eRkDLya#BlJ7rynz9UHI74hTmlJzroUgbOiy1O-cpFun5qeNjVg">Python for Kids</a></td><td>348 Pages</td></tr> <tr><td>36.</td><td><a target="_blank" href="https://mega.nz/file/TPBQyZCR#vvwYa_Z95mtaWhWSPDBot7fINfoQ8cpnH4qm9xus1TY">End to End Network Security - Defense-in-Depth</a></td><td>469 Pages</td></tr> <tr><td>37.</td><td><a target="_blank" href="https://mega.nz/file/bXZEhTAY#Qx7oHuIWzeUjBMxRKMFo-lUkiKnliQOJUAjoFJfSLDM">A Guide to Computer Network Security</a></td><td>483 Pages</td></tr> <tr><td>38.</td><td><a target="_blank" href="https://mega.nz/file/2CAU2JAY#R16cOg64vgZxs02bTFD7dYSXRgZDLcog2lcb5CJ33k8">Essential Computer Security</a></td><td>321 Pages</td></tr> <tr><td>39.</td><td><a target="_blank" href="https://mega.nz/file/qbJiBJoB#6HKrc6AA3oMLl5GB5CnwmXtbH9cVkqqU-4PBdJZcNaE">Security in Wireless Mesh Networks</a></td><td>548 Pages</td></tr> <tr><td>40.</td><td><a target="_blank" href="https://mega.nz/file/DOY2nJ6B#Lfw_qx1ljqzXmJnnl0x68v_4iR3B2AIIOr-LaPRzLm0">Hacking Windows XP (OLD)</a></td><td>379 Pages</td></tr> <tr><td>41.</td><td><a target="_blank" href="https://mega.nz/file/aLImDJCZ#nrX0SEvIU_LJB8UNQwn7xCmnMAoELGGS69lVRehN6T4">Hacking Exposed - Windows Security, Secrets and Solutions</a></td><td>482 Pages</td></tr> <tr><td>42.</td><td><a target="_blank" href="https://mega.nz/file/iSIgDZZQ#o3ZyT0v2NK1PjxeGtynIw8v3gS7g_0Yk4AN3ofXIWdc">Hacking Exposed - Network Security, Secrets and Solutions</a></td><td>736 Pages</td></tr> <tr><td>43.</td><td><a target="_blank" href="https://mega.nz/file/CeIkBJKa#YmsoJD1cT0hpl3d3No7HnAFIlrdYe7qDpDP4UkgQ25U">Information Security - Principles and Pratice</a></td><td>413 Pages</td></tr> <tr><td>44.</td><td><a target="_blank" href="https://mega.nz/file/SKAiwJxa#nu3Tm3jGmNunHmXmo4JfC42DlqFMppgvPTlD0ej_rkA">Nessus, Snort and Ethereal Power Tools</a></td><td>472 Pages</td></tr> <tr><td>45.</td><td><a target="_blank" href="https://mega.nz/file/qLQkDDaT#xTwUl8VcecQrj7_R_HatjES5oeyVT-v0TbQlBEkHrk8">Active Defense - A Comprehensive Guide to Network Security</a></td><td>374 Pages</td></tr> <tr><td>46.</td><td><a target="_blank" href="https://mega.nz/file/6DZQjTKa#X3pfvBocXuVnPdbX12X9vJMy3fFPf3JdRJP9fDDE6U0">Information Security Fundamentals</a></td><td>262 Pages</td></tr> <tr><td>47.</td><td><a target="_blank" href="https://mega.nz/file/vGBGTZxT#NdoHXh5mnLFVk6e1_qtXiofBOId35IdhgZw-84f856E">Wireless Network Security</a></td><td>422 Pages</td></tr> <tr><td>48.</td><td><a target="_blank" href="https://mega.nz/file/2PQAyBjI#C26PIIc3-vbTdX0LkULGKce4Pfn8Z7jlVxKYQJIYdSk">Red Hat Linux Security and Optimization</a></td><td>721 Pages</td></tr> <tr><td>49.</td><td><a target="_blank" href="https://mega.nz/file/rGIkCTBI#ZCrYRdy5fXF6RwrDu8XsQoE0xXGkH88iTNcTg9Zlv6U">Windows Forensics Analysis</a></td><td>386 Pages</td></tr> <tr><td>50.</td><td><a target="_blank" href="https://mega.nz/file/XeA0jLJa#9jGzTWQUVkyIHRKaSLH5ej6kiR6s0CKAsU76zuA32q4">Mobile and Wireless Network Security