- The Hacker Playbook, Practical Guide To Penetration Testing
- The.IDA.Pro.Book.2nd.Edition.Jun.2011
- The Shellcoder 039 s Handbook Discovering and Exploiting Security Holes 2nd Edition
- The Web Application Hacker 039 s Handbook Finding and Exploiting Security Flaws
- Violent_Python_A_Cookbook_for_Hackers_Forensic_Ana
- Writing Security Tools and Exploits
- X86 Assembly Language and C Fundamentals 2013
- XML Security
- Reversing - Secrets of Reverse Engineering.
- SQL Injection Attacks and Defense
- Sockets Shellcode Porting and Coding Reverse Engineering Exploits and Tool Coding for Security Professionals
- Prentice Hall - Thinking in C++ Volume 1, 2nd Edition.pdf
- Prentice Hall - Thinking in C++ Volume 2, 2nd Edition.pdf
- Professional Assembly Language (Programmer to Programmer).pdf
- Professional Penetration Testing Creating and Operating a Formal Hacking Lab.pdf
- Programming in C (3rd Edition)
- MASM_Programmers_Guide.chm
- Metasploit Penetration Testers Guide.pdf
- Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability.pdf
- Algorithms and Data Structures in C++ 1993.chm
- Algorithms in a Nutshell.pdf
- Algorithms in C++, Parts 1-4.chm
- Art Of Intel x86 Assembly.pdf
- Assembly Language Step-by-step: Programming with DOS and Linux.chm
- Assembly Language Step-by-Step: Programming with Linux.pdf
- A.Bug.Hunters.Diary.pdf
- Addison Wesley - C++ FAQs (1998) .chm
- Addison Wesley - C++ Standard Library. A Tutorial And Reference.chm
- Addison Wesley - Fuzzing Brute Force Vulnerability Discovery 2007.pdf
- A Guide to Kernel Exploitation Attacking the Core.pdf
- Algorithms and Data Structures in C++ 1993.chm
- Nmap 6 Network Exploration and Security Auditing Cookbook
- Foster - Buffer Overflow Attacks - Detect, Exploit, Prevent (Syngress, 2005)
- Hacking The Art Of Exploitation
Sites :
-
https://www.corelan.be/-
http://fuzzysecurity.com/-
https://www.vulnhub.com/-
http://resources.infosecinstitute.com/-
http://www.opensecuritytraining.info/Training.html