{"id":13462755,"url":"https://github.com/Hack-with-Github/Free-Security-eBooks","last_synced_at":"2025-03-25T05:32:13.908Z","repository":{"id":39228809,"uuid":"56771677","full_name":"Hack-with-Github/Free-Security-eBooks","owner":"Hack-with-Github","description":"Free Security and Hacking eBooks","archived":true,"fork":false,"pushed_at":"2019-07-10T09:15:27.000Z","size":53,"stargazers_count":4392,"open_issues_count":3,"forks_count":1040,"subscribers_count":364,"default_branch":"master","last_synced_at":"2025-01-17T20:37:48.887Z","etag":null,"topics":["cloud-security","cyber-security","ebooks","forensics","hackers-handbook","hacking","hacking-ebooks","kali-linux","penetration-testing","security"],"latest_commit_sha":null,"homepage":"","language":null,"has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/Hack-with-Github.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null}},"created_at":"2016-04-21T12:26:50.000Z","updated_at":"2025-01-17T14:40:23.000Z","dependencies_parsed_at":"2022-07-18T03:00:43.442Z","dependency_job_id":null,"html_url":"https://github.com/Hack-with-Github/Free-Security-eBooks","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Hack-with-Github%2FFree-Security-eBooks","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Hack-with-Github%2FFree-Security-eBooks/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Hack-with-Github%2FFree-Security-eBooks/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Hack-with-Github%2FFree-Security-eBooks/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/Hack-with-Github","download_url":"https://codeload.github.com/Hack-with-Github/Free-Security-eBooks/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":245407577,"owners_count":20610227,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["cloud-security","cyber-security","ebooks","forensics","hackers-handbook","hacking","hacking-ebooks","kali-linux","penetration-testing","security"],"created_at":"2024-07-31T13:00:29.677Z","updated_at":"2025-03-25T05:32:13.564Z","avatar_url":"https://github.com/Hack-with-Github.png","language":null,"readme":"# Free Security eBooks\n[![Build Status](https://travis-ci.org/Hack-with-Github/Free-Security-eBooks.svg?branch=master)](https://travis-ci.org/Hack-with-Github/Free-Security-eBooks)\n\nA curated list of free Security and Pentesting related E-Books available on the Internet.\n\nIf you want to contribute to this list (please do), send a pull request. All contributors will be recognized and appreciated.\n\n#### Disclaimer: The contributor(s) cannot be held responsible for any misuse of the data. This repository is just a collection of URLs to download eBooks for free. Download the eBooks at your own risks. \n\n#### DMCA takedown cannot be possible as we are not republishing the books/infringement of code, but we are just hosting the links to 3rd party websites where these books can be downloaded. To know more on DMCA takedown policy [here](https://help.github.com/articles/dmca-takedown-policy/).\n\nThe topics include:\n\n- [Android \u0026 iOS](#android--ios)\n- [Cloud Security](#cloud-security)\n- [Defensive Security](#defensive-security)\n- [IoT](#iot)\n- [Malware Analysis \u0026 Forensics](#malware-analysis--forensics)\n- [Network Pentesting](#network-pentesting)\n- [Offensive Security](#offensive-security)\n- [Programming Languages](#programming-languages)\n- [Reverse Engineering](#reverse-engineering)\n- [SysAdmin](#sysadmin)\n- [Virus Botnet and Malware](#virus-botnet-and-malware)\n- [Wireless Network Pentesting](#wireless-network-pentesting)\n- [Misc](#misc)\n\n----------\n\n### Network Pentesting\n- [Wireshark Essentilals](https://github.com/cyberh3x/books/blob/master/9781783554638-WIRESHARK_ESSENTIALS.pdf)\n- [Mastering Wireshark](https://github.com/cyberh3x/books/blob/master/9781783989522-MASTERING_WIRESHARK.pdf)\n\n### Defensive Security\n- [Holistic Info-Sec for Web Developers - Fascicle 0](https://f0.holisticinfosecforwebdevelopers.com/)\n- [Holistic Info-Sec for Web Developers - Fascicle 1](https://f1.holisticinfosecforwebdevelopers.com/)\n- [OWASP Hacking Tutorials and Web App Protection](https://www.owasp.org/images/d/d0/Web_Services_Hacking_and_Hardening.pdf)\n- [Threat Modeling - Designing for Security](https://news.asis.io/sites/default/files/Threat%20Modeling.pdf)\n\n----------\n\n### Offensive Security\n\n- **Backtrack**\n  - [Hack your Friend using Backtrack](http://hackerspace.cs.rutgers.edu/library/bt5tutorials/HackYourFriend.pdf)\n- **Kali Linux**\n  - [Kali Linux Revealed Book](https://kali.training/)\n  - [Windows Pentesting with Kali Linux v2](https://github.com/cyberh3x/books/blob/master/9781782168492-KALI_LINUX_2_WINDOWS_PENETRATION_TESTING.pdf)\n- **Hacking**\n  - [Advanced SQL Injection Hacking and Guide](https://defcon.org/images/defcon-17/dc-17-presentations/defcon-17-joseph_mccray-adv_sql_injection.pdf)\n  - [A Beginners Guide To Hacking Computer Systems](http://www.mediafire.com/download/dyewn6f3r3olnuw/A+Beginners+Guide+To+Hacking+Computer+Systems.zip)\n  - [Blind SQL Injection Discovery \u0026 Exploitation](http://blueinfy.com/wp/blindsql.pdf)\n  - [CEH – Hacking Database Secrets and Exploit](http://repo.thehackademy.net/depot_cehv6/)\n  - [Ethical Hacking Complete E-book for Beginners](http://pdf.textfiles.com/security/palmer.pdf)\n  - [Hackers High School 13 Complete Hacking Ebooks](http://www.mediafire.com/download/u2akquvibe6ia13/Hackers+High+School+13+Complete+Hacking+E-books.rar)\n  - [Hacking attacks and Examples Test](http://www.mediafire.com/download/dpysbzboord42lo/Hacking+attacks+and+Examples+Test.zip)\n  - [Hacking into Computer Systems](http://www.academia.edu/1153769/Hacking_into_computer_systems_-_a_beginners_guide)\n  - [Hackers' Secrets](http://www.onlinepot.org/security/HackersSecrets.pdf)\n- **Operating Systems**\n  - **Windows**\n     - [Modern Windows Exploit Development](https://userscloud.com/9ifscj08wllu)\n- **Web \u0026 WebApp**\n  - [501 Website Hacking Secrets](http://www.mediafire.com/download/da8nhq8oh5iddae/501+Website+Hacking+Secrets.zip)\n  - [Cross Site Scripting and Hacking Websites](http://www.objectif-securite.ch/research/xss_security_days.pdf)\n  - [Dangerous Google Hacking Database and Attacks](http://www.mediafire.com/download/s3535s2yg1w26u7/Dangerours+Google+Hacking+Database+and+Attacks.zip)\n  - [Hack any Website, Complete Web App Hacking](https://www.defcon.org/images/defcon-11/dc-11-presentations/dc-11-Gentil/dc-11-gentil.pdf)\n  - [Hacking Website Database and owning systems](http://www.blackhat.com/presentations/bh-europe-07/Cerrudo/Whitepaper/bh-eu-07-cerrudo-WP-up.pdf)\n  - [Internet Advanced Denial of Service (DDOS) Attack](http://www.mediafire.com/download/b4jmyl022rh48c0/Internet+Advanced+Denial+of+Service+%28DDOS%29+Attack.zip)\n  - [Internet Security Technology and Hacking](http://www.mediafire.com/download/7tk860o8n777iqa/Internet+Security+Technology+and+Hacking.zip)\n  - [The Web Application Hacker's Handbook](https://leaksource.files.wordpress.com/2014/08/the-web-application-hackers-handbook.pdf)\n  - [Vulnerability Exploit \u0026 website Hacking for Dummies](http://www.mediafire.com/download/j8cvosmvcb4vpw9/Vulnerability+Exploitation+%26+website+Hacking+for+Dummies.rar)\n  - [Web App Hacking (Hackers Handbook)](http://www.mediafire.com/download/c7b18vtpc77sysi/Web+App+Hacking+%28Hackers+Handbook%29.zip)\n  - [XSS, Vulnerability Exploitation \u0026 Website Hacking](http://www.cis.syr.edu/~wedu/seed/Labs/Attacks_XSS/XSS.pdf)\n\n----------\n\n### Programming Languages\n- **Python**\n  - [Violent Python : A Cookbook for Hackers (2013)](https://github.com/reconSF/python/blob/master/Syngress.Violent.Python.a.Cookbook.for.Hackers.2013.pdf)\n\n----------\n\n### Reverse Engineering\n- [Reverse Engineering Hacking and Cracking](https://media.blackhat.com/bh-dc-11/Grand/BlackHat_DC_2011_Grand-Workshop.pdf)\n- [Reverse Engineering for Beginners ](http://www.t-gr.com/fotis/books/re.pdf)\n\n----------\n\n### Virus Botnet and Malware\n- [Black Book of Viruses and Hacking](http://www.mediafire.com/download/c8ilcobmyiqooyp/Black+Book+of+Viruses+and+Hacking.zip)\n- [Computer Hacking \u0026 Malware Attacks for Dummies](http://www.mediafire.com/download/8derf9dueyq64i5/Computer+Viruses%2C+Hacking+and+Malware+attacks+for+Dummies.zip)\n\n----------\n\n### Misc\n- [Computer Hacking - Cyber Laws Harvard](https://cyber.harvard.edu/sites/cyber.law.harvard.edu/files/ComputerHacking.pdf)\n- [Ethical Hacking Value and Penetration testing](https://www.certconf.org/presentations/2003/Wed/WM4.pdf)\n- [Secrets of Super and Professional Hackers](http://www.mediafire.com/download/2sspb36u5gymd23/Secrets+of+Super+and+Professional+Hackers.zip)\n- [Hackers High School 13Complete Hacking E-books](http://www.mediafire.com/download/u2akquvibe6ia13/Hackers+High+School+13+Complete+Hacking+E-books.rar)\n- [Network Hacking and Shadows Hacking Attacks](http://www.mediafire.com/download/utp50jqd25ngw3q/Network_Hacking_and_Shadows_Hacking_Attacks.zip)\n","funding_links":[],"categories":["E-books","Security","Others","Others (1002)","其他_安全与渗透","🌟 Credit To All Below","Education Best Practices"],"sub_categories":["Programming","资源传输下载","Secure OSes"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FHack-with-Github%2FFree-Security-eBooks","html_url":"https://awesome.ecosyste.ms/projects/github.com%2FHack-with-Github%2FFree-Security-eBooks","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FHack-with-Github%2FFree-Security-eBooks/lists"}