close
WANT SWEET DEALS? JOIN OUR MAILING LIST

Hacking & Computer Security

Evasion Engineering

Evasion Engineering

Build offensive tools the defender hasn't catalogued. Then learn how they'd catch you.

Dennis Chow and Michael LaSalvia
Fall 2026
The Spacecraft Hacker's Handbook

The Spacecraft Hacker's Handbook

Satellites power our internet, GPS, weather forecasts, defense systems—and they’re all at risk.

Andrzej Olchawa and Milenko Starcik
Fall 2026
Red Teaming AI

Red Teaming AI

AI is in everything now. So are the attackers. Learn to find the vulnerabilities before someone else does.

Philip A. Dursey
Spring 2027
Red Team Engineering

Red Team Engineering

Pentesters run other people's tools. Learn to build your own: credential harvesters, custom malware, C2 infrastructure.

Casey Erdmann
March 2026
Heavy Wizardry 101

Heavy Wizardry 101

Most hackers borrow their spells. Pico teaches you to write your own, from shellcode to worms across four architectures.

David Martínez Oliveira, aka Pico
April 2026
Microcontroller Exploits

Microcontroller Exploits

The attack surface nobody talks about. Learn to find and exploit vulnerabilities in embedded systems.

Travis Goodspeed
August 2024
Cybersecurity Tabletop Exercises

Cybersecurity Tabletop Exercises

Run tabletop exercises that actually prepare your team for the real thing.

Robert Lelewski and John Hollenberger
September 2024
Black Hat Bash

Black Hat Bash

Bash is already on every system. Learn to use it offensively.

Dolev Farhi, Nick Aleks
August 2024
Windows Security Internals

Windows Security Internals

What Windows is actually doing under the hood, and where the vulnerabilities hide.

James Forshaw
April 2024
Evasive Malware

Evasive Malware

The first-ever guide to analyzing malicious Windows software designed to avoid detection and forensic tools.

 

Kyle Cucci
July 2024
The Android Malware Handbook

The Android Malware Handbook

An all-star guide to tackling the analysis and detection of malware that targets the Android operating system.

Qian Han, Salvador Mandujano, Sebastian Porst, V.S. Subrahmanian, Sai Deep Tetali, and Yanhai Xiong
September 2023
Evading EDR

Evading EDR

A guide to understanding the attack-detection software running on Microsoft systems, and how to evade it.

Matt Hand
September 2023
Black Hat GraphQL

Black Hat GraphQL

Written by hackers for hackers, this hands-on book shows how to identify vulnerabilities in apps that use GraphQL.

Dolev Farhi, Nick Aleks
April 2023
Hacks, Leaks, and Revelations

Hacks, Leaks, and Revelations

Learn the tools and develop the skills for uncovering big secrets hiding in public datasets.

Micah Lee
November 2023
Metasploit, 2nd Edition

Metasploit, 2nd Edition

The second edition of the international bestseller Metasploit is written by some of the world’s best hackers and is the only introduction you’ll ever need to the legendary Framework.

David Kennedy, Mati Aharoni, Devon Kearns, Jim O’Gorman, and Daniel Graham
December 2024
Codebreaking

Codebreaking

A tour through history’s real codes and ciphers written by two of today’s best cipher crackers.

Elonka Dunin and Klaus Schmeh
August 2023
Hacking APIs

Hacking APIs

Learn how to test APIs for security vulnerabilities so you can uncover high-payout bugs and improve the security of web apps.

Corey Ball
April 2022
The Art of Cyberwarfare

The Art of Cyberwarfare

A detailed guide to nation-state hacking methods that shows how to track, analyze, and attribute advanced attacks.

Jon DiMaggio
March 2022
Locksport

Locksport

This hands-on guide to the art of lockpicking will take you from noob to competition-ready.

Jos Weyers, Matt Burrough, Walter Belgers, BandEAtoZ, and Nigel K. Tolley
January 2024
Designing Secure Software

Designing Secure Software

An elegant, team-oriented guide for building security into the software design process.

Loren Kohnfelder
November 2021
Practical Doomsday

Practical Doomsday

Outlines a model for evaluating risks in your life, as well as preparing for a wide range of potential crises.

Michal Zalewski
January 2022
Go H*ck Yourself

Go H*ck Yourself

A hands-on intro to hacking that guides you through executing every major type of attack (from the safety of a virtual lab).

Bryson Payne
January 2022
Practical Linux Forensics

Practical Linux Forensics

A practitioner’s guide focused on postmortem analysis of modern Linux installations.

Bruce Nikkel
November 2021
Bug Bounty Bootcamp

Bug Bounty Bootcamp

A beginner's guide to web hacking, bug hunting, reporting vulnerabilities – and getting paid for it.

Vickie Li
November 2021
Ethical Hacking

Ethical Hacking

A crash course in modern hacking techniques, with lots of hands-on labs for aspiring offensive security experts.

Daniel G. Graham
October 2021
How to Hack Like a Legend

How to Hack Like a Legend

Puts you in the mind of a master hacker, as you plan and launch a stealth attack on Microsoft’s best security systems.

Sparc Flow
September 2022
Cybersecurity for Small Networks

Cybersecurity for Small Networks

A guide to implementing DIY security solutions and readily available technologies to protect home and small-office networks from attack.

Seth Enoka
October 2022
Crypto Dictionary

Crypto Dictionary

Crypto Dictionary is your full reference resource for all things cryptography.

Jean-Philippe Aumasson
March 2021
Black Hat Python, 2nd Edition

Black Hat Python, 2nd Edition

The Python tools hackers actually use, fully updated. Fully on the darker side.

Justin Seitz and Tim Arnold
April 2021
How to Hack Like a Ghost

How to Hack Like a Ghost

How to Hack Like a Ghost is a fast-paced adventure that lets you shadow a master hacker targeting a shady foe with advanced cloud security.

Sparc Flow
May 2021
Practical IoT Hacking

Practical IoT Hacking

Written by all-star security experts, Practical IoT Hacking is a quick-start conceptual guide to testing and exploiting IoT systems and devices.

Fotios Chantzis, Ioannis Stais, Paulino Calderon, Evangelos Deirmentzoglou, Beau Woods
March 2021
PoC||GTFO, Volume 3 Cover

PoC||GTFO, Volume 3

PoC||GTFO (Proof of Concept or Get The Fuck Out), Volume 3 continues the series of wildly popular collections of this hacker journal.

Manul Laphroaig
January 2021
Cyberjutsu

Cyberjutsu

Based on techniques adapted from authentic Japanese ninja scrolls, Cyberjutsu teaches ancient approaches to modern security problems.

Ben McCarty
April 2021
Practical Social Engineering

Practical Social Engineering

A hands-on look at the cyber attacks that target human nature, with pentesting templates for performing SE ops, and tips for defending against them.

Joe Gray
May 2022
Practical Vulnerability Management

Practical Vulnerability Management

Practical Vulnerability Management shows you how to weed out system security weaknesses and squash cyber threats in their tracks.

Andrew Magnusson
September 2020
Web Security for Developers

Web Security for Developers

Web Security for Developers explores the most common ways websites get hacked and how web developers can defend themselves.

Malcolm McDonald
June 2020
The Hardware Hacker

The Hardware Hacker (Paperback edition)

The Hardware Hacker is an illuminating career retrospective from Andrew “bunnie” Huang, one of the world’s most esteemed hackers.

Andrew “bunnie” Huang
August 2019
Practical Binary Analysis

Practical Binary Analysis

Practical Binary Analysis covers advanced binary analysis topics like binary instrumentation, dynamic taint analysis, and symbolic execution.

Dennis Andriesse
December 2018
PoC GTFO, Volume 2

PoC||GTFO, Volume 2

PoC||GTFO (Proof of Concept or Get The Fuck Out), Volume 2 follows-up the wildly popular first volume with issues 9 through 13 of the eponymous hacker zine. Contributions range from humorous poems to deeply technical essays.

Manul Laphroaig
August 2018
Malware Data Science

Malware Data Science

Malware Data Science explains how to identify, analyze, and classify large-scale malware using machine learning and data visualization.

Joshua Saxe with Hillary Sanders
September 2018
The Hardware Hacking Handbook

The Hardware Hacking Handbook

Cracks open embedded security to show how hardware attacks work from the inside out.

Jasper van Woudenberg and Colin O'Flynn
November 2021
Pentesting Azure Applications

Pentesting Azure Applications

Pentesting Azure Applications is a comprehensive guide to penetration testing cloud services deployed in Microsoft Azure.

Matt Burrough
July 2018
Black Hat Go

Black Hat Go

Black Hat Go will help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset.

Tom Steele, Chris Patten, and Dan Kottmann
February 2020
Real-World Bug Hunting

Real-World Bug Hunting

Real-World Bug Hunting uses real-world bug reports to teach programmers how to discover and protect vulnerabilities in web applications.

Peter Yaworski
July 2019
PoC||GTFO

PoC||GTFO

PoC||GTFO (Proof of Concept or Get The Fuck Out) is a compilation of the wildly popular hacker zine of the same name. Contributions range from humorous poems to deeply technical essays.

Manul Laphroaig
August 2017
Gray Hat C#

Gray Hat C#

Gray Hat C# shows you how to use C#'s powerful set of core libraries to create and automate security tools.

Brandon Perry
June 2017
Attacking Network Protocols

Attacking Network Protocols

Attacking Network Protocols is a deep dive into network protocol security from James Forshaw, one of the world’s leading bug ­hunters.

James Forshaw
December 2017
Practical Forensic Imaging

Practical Forensic Imaging

Practical Forensic Imaging takes a detailed look at how to secure digital evidence using Linux-based command line tools.

Bruce Nikkel
September 2016
The Car Hacker's Handbook

Car Hacker's Handbook

The Car Hacker’s Handbook shows how to identify and exploit vulnerabilities in modern vehicles.

Craig Smith
March 2016
Rootkits and Bootkits

Rootkits and Bootkits

Rootkits and Bootkits shows you how to analyze, identify, and defend against rootkits and bootkits.

Alex Matrosov, Eugene Rodionov, and Sergey Bratus
May 2019
Game Hacking

Game Hacking

Game Hacking shows programmers how to dissect computer games and create bots.

Nick Cano
July 2016
iOS Application Security

iOS Application Security

iOS Application Security covers everything you need to know to design secure iOS apps from the ground up.

David Thiel
February 2016
Android Security Internals

Android Security Internals

Android Security Internals gives you a complete understanding of the security internals of Android devices.

Nikolay Elenkov
October 2014
Penetration Testing

Penetration Testing

Georgia Weidman wrote the book on pentesting. Literally. Start here.

Georgia Weidman
June 2014
The Practice Of Network Security Monitoring

The Practice of Network Security Monitoring

The Practice of Network Security Monitoring teaches IT and security staff how to leverage powerful NSM tools to identify threats quickly and effectively.

Richard Bejtlich
July 2013
The Tangled Web

Tangled Web

Browsers are doing a lot of strange things under the hood. Security expert Michal Zalewski explains what and why.

Michal Zalewski
November 2011
A Bug Hunter's Diary

A Bug Hunter's Diary

A Bug Hunter's Diary follows security expert Tobias Klein as he tracks down and exploits bugs in some of the world's most popular software.

Tobias Klein
November 2011
Practical Malware Analysis

Practical Malware Analysis

Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.

Michael Sikorski and Andrew Honig
February 2012
IDA Pro Book, 2nd Edition

IDA Pro Book, 2nd Edition

No source code? No problem! This second edition of the The IDA Pro Book is the definitive guide to IDA Pro, arguably the most sophisticated disassembler in the world.

Chris Eagle
July 2011
Linux Firewalls

Linux Firewalls

If you're responsible for keeping a network secure, you'll find Linux Firewalls invaluable in your attempt to understand attacks and to detect and even prevent compromises.

Michael Rash
October 2007
Silence on the Wire

Silence on the Wire

Your network is leaking information and you probably don't know it. Michal Zalewski does.

Michal Zalewski
April 2005
Steal This Computer Book 4.0

Steal This Computer Book 4.0

If you thought hacking was just about mischief-makers hunched over computers in the basement, think again.

Wallace Wang
May 2006
Hacking VoIP

Hacking VoIP

Hacking VoIP is your map and guidebook to where VoIP's biggest weaknesses lie and how to shore up your security

Himanshu Dwivedi
October 2008
Gray Hat Python

Gray Hat Python

Security analysts write code too. This is the Python book they've been waiting for.

Justin Seitz
April 2009
Hacking: The Art of Exploitation (2nd Edition)

Hacking, 2nd Edition

Hacking is creative problem solving: unconventional solutions, exploited weaknesses, and the technical foundation to pull it off.

Jon Erickson
February 2008