Books Recommended by Zero Salarium
Programming is the backbone of the digital world. If you want to sharpen your cybersecurity skills, it's the cornerstone you need to lay first.
Advanced Techniques for Exploit Writing, Malware Development, and Obfuscation
Advanced Techniques for Exploit Writing, Malware Development, and Obfuscation is a cutting-edge guide designed for security professionals, advanced programmers, and curious learners who want to understand how offensive techniques are developed and applied in real systems.
C++ Crash Course: A Fast-Paced Introduction
A fast-paced, thorough introduction to modern C++ written for experienced programmers. After reading C++ Crash Course, you'll be proficient in the core language concepts, the C++ Standard Library, and the Boost Libraries.
Reverse Engineering, Malware Development, and Privilege Escalation with Modern C++
Unlock the Power of C++ for Real-World Offensive Security and Malware Engineering.
The Art of Mac Malware, Volume 2: Detecting Malicious Software
This first-of-its-kind guide to detecting stealthy Mac malware gives you the tools and techniques to counter even the most sophisticated threats targeting the Apple ecosystem.
Metasploit, 2nd Edition
Metasploit: The Penetration Tester’s Guide has been the definitive security assessment resource for over a decade. The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless, but using it can be challenging for newcomers.
Black Hat Python, 2nd Edition: Python Programming for Hackers and Pentesters
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts.
Black Hat Bash: Creative Scripting for Hackers and Pentesters
Master the art of offensive bash scripting. This highly practical hands-on guide covers chaining commands together, automating tasks, crafting living-off-the-land attacks, and more!
Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities
Bug Bounty Bootcampteaches you how to hack web applications. You will learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them.
Comments
Post a Comment