Books on Programming and Cybersecurity recommended by Zero Salarium Researchers


Books Recommended by Zero Salarium

Programming is the backbone of the digital world. If you want to sharpen your cybersecurity skills, it's the cornerstone you need to lay first.

Product

Advanced Techniques for Exploit Writing, Malware Development, and Obfuscation

Advanced Techniques for Exploit Writing, Malware Development, and Obfuscation is a cutting-edge guide designed for security professionals, advanced programmers, and curious learners who want to understand how offensive techniques are developed and applied in real systems.

Product

C++ Crash Course: A Fast-Paced Introduction

A fast-paced, thorough introduction to modern C++ written for experienced programmers. After reading C++ Crash Course, you'll be proficient in the core language concepts, the C++ Standard Library, and the Boost Libraries.

Product

Reverse Engineering, Malware Development, and Privilege Escalation with Modern C++

Unlock the Power of C++ for Real-World Offensive Security and Malware Engineering.

Product

The Art of Mac Malware, Volume 2: Detecting Malicious Software

This first-of-its-kind guide to detecting stealthy Mac malware gives you the tools and techniques to counter even the most sophisticated threats targeting the Apple ecosystem.

Product

Metasploit, 2nd Edition

Metasploit: The Penetration Tester’s Guide has been the definitive security assessment resource for over a decade. The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless, but using it can be challenging for newcomers.

Product

Black Hat Python, 2nd Edition: Python Programming for Hackers and Pentesters

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts.

Product

Black Hat Bash: Creative Scripting for Hackers and Pentesters

Master the art of offensive bash scripting. This highly practical hands-on guide covers chaining commands together, automating tasks, crafting living-off-the-land attacks, and more!

Product

Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities

Bug Bounty Bootcampteaches you how to hack web applications. You will learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them.


Comments