{"id":13538365,"url":"https://github.com/yeahhub/hacking-security-ebooks","last_synced_at":"2026-02-12T11:49:00.066Z","repository":{"id":38628686,"uuid":"159030980","full_name":"yeahhub/Hacking-Security-Ebooks","owner":"yeahhub","description":"Top 100 Hacking \u0026 Security E-Books (Free Download) ","archived":false,"fork":false,"pushed_at":"2024-07-26T09:05:17.000Z","size":31,"stargazers_count":5853,"open_issues_count":45,"forks_count":1185,"subscribers_count":234,"default_branch":"master","last_synced_at":"2025-03-13T01:35:17.454Z","etag":null,"topics":["books","ebooks","hacking","hacking-security-ebooks","kali-linux","penetration-testing","security"],"latest_commit_sha":null,"homepage":"","language":null,"has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/yeahhub.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2018-11-25T12:48:33.000Z","updated_at":"2025-03-12T07:02:01.000Z","dependencies_parsed_at":"2024-08-01T09:21:44.863Z","dependency_job_id":"00d127af-b090-4a4c-b8ce-732ecc8025d2","html_url":"https://github.com/yeahhub/Hacking-Security-Ebooks","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/yeahhub%2FHacking-Security-Ebooks","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/yeahhub%2FHacking-Security-Ebooks/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/yeahhub%2FHacking-Security-Ebooks/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/yeahhub%2FHacking-Security-Ebooks/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/yeahhub","download_url":"https://codeload.github.com/yeahhub/Hacking-Security-Ebooks/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":245524980,"owners_count":20629772,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["books","ebooks","hacking","hacking-security-ebooks","kali-linux","penetration-testing","security"],"created_at":"2024-08-01T09:01:10.885Z","updated_at":"2026-02-12T11:49:00.010Z","avatar_url":"https://github.com/yeahhub.png","language":null,"readme":"# Hacking-Security-Ebooks\nTo Download all PDF eBooks, please \u003ca href=\"https://www.yeahhub.com/biggest-hacking-security-ebooks-collection-free-download/\" target=\"_blank\"\u003eclick here\u003c/a\u003e.\n\n\u003ctable width=\"100%\" class=\"table\"\u003e\n\u003ctr\u003e\n\u003cth\u003eS.No\u003c/th\u003e\n\u003cth\u003eE-Book (PDF Link)\u003c/th\u003e\n\u003cth\u003eTotal Pages\u003c/th\u003e\n\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e1.\u003c/td\u003e\u003ctd\u003eAdvanced Penetration Testing\u003c/td\u003e\u003ctd\u003e269 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e2.\u003c/td\u003e\u003ctd\u003eThe Basics of Web Hacking\u003c/td\u003e\u003ctd\u003e179 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e3.\u003c/td\u003e\u003ctd\u003eThe Basics of Hacking and Penetration Testing\u003c/td\u003e\u003ctd\u003e178 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e4.\u003c/td\u003e\u003ctd\u003eThe Art of Deception by Kevin Mitnick\u003c/td\u003e\u003ctd\u003e577 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e5.\u003c/td\u003e\u003ctd\u003eSQL Injection Attacks and Defense\u003c/td\u003e\u003ctd\u003e761 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e6.\u003c/td\u003e\u003ctd\u003eMetasploit - The Penetration Tester's Guide\u003c/td\u003e\u003ctd\u003e332 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e7.\u003c/td\u003e\u003ctd\u003eEthical Hacking and Penetration Testing Guide\u003c/td\u003e\u003ctd\u003e523 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e8.\u003c/td\u003e\u003ctd\u003eNetwork Attacks and Exploitation - A Framework\u003c/td\u003e\u003ctd\u003e219 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e9.\u003c/td\u003e\u003ctd\u003ePython Web Penetration Testing Cookbook\u003c/td\u003e\u003ctd\u003e224 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e10.\u003c/td\u003e\u003ctd\u003eWireshark for Security Professionals\u003c/td\u003e\u003ctd\u003e391 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e11.\u003c/td\u003e\u003ctd\u003eMastering Modern Web Penetration Testing\u003c/td\u003e\u003ctd\u003e298 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e12.\u003c/td\u003e\u003ctd\u003eThe Shellcoder's Handbook\u003c/td\u003e\u003ctd\u003e745 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e13.\u003c/td\u003e\u003ctd\u003eThe Little Black Book of Computer Viruses\u003c/td\u003e\u003ctd\u003e183 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e14.\u003c/td\u003e\u003ctd\u003eXSS Attacks - Cross Site Scripting Exploits and Defense\u003c/td\u003e\u003ctd\u003e482 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e15.\u003c/td\u003e\u003ctd\u003eThe Web Application Hacker's Handbook\u003c/td\u003e\u003ctd\u003e771 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e16.\u003c/td\u003e\u003ctd\u003eEthical Hacking and Countermeasures\u003c/td\u003e\u003ctd\u003e239 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e17.\u003c/td\u003e\u003ctd\u003eReversing - Secrets of Reverse Engineering\u003c/td\u003e\u003ctd\u003e619 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e18.\u003c/td\u003e\u003ctd\u003eNetwork Security Bible\u003c/td\u003e\u003ctd\u003e697 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e19.\u003c/td\u003e\u003ctd\u003eHacking Web Applications - Hacking Exposed\u003c/td\u003e\u003ctd\u003e416 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e20.\u003c/td\u003e\u003ctd\u003eHacking for Dummies\u003c/td\u003e\u003ctd\u003e387 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e21.\u003c/td\u003e\u003ctd\u003eHacking Wireless Network for Dummies\u003c/td\u003e\u003ctd\u003e387 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e22.\u003c/td\u003e\u003ctd\u003eNinja Hacking - Unconventional Penetration Testing Tacting and Techniques\u003c/td\u003e\u003ctd\u003e314 pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e23.\u003c/td\u003e\u003ctd\u003eProfessional Penetration Testing\u003c/td\u003e\u003ctd\u003e525 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e24.\u003c/td\u003e\u003ctd\u003eGray Hat Hacking - The Ethical Hacker's Handbook\u003c/td\u003e\u003ctd\u003e577 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e25.\u003c/td\u003e\u003ctd\u003eHack Attacks Testing\u003c/td\u003e\u003ctd\u003e561 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e26.\u003c/td\u003e\u003ctd\u003eBasic Security Testing with Kali Linux\u003c/td\u003e\u003ctd\u003e242 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e27.\u003c/td\u003e\u003ctd\u003eMastering Kali Linux for Advanced Penetration Testing\u003c/td\u003e\u003ctd\u003e356 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e28.\u003c/td\u003e\u003ctd\u003eKali Linux CTF Blueprints\u003c/td\u003e\u003ctd\u003e190 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e29.\u003c/td\u003e\u003ctd\u003eKali Linux Cookbook\u003c/td\u003e\u003ctd\u003e261 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e30.\u003c/td\u003e\u003ctd\u003eKali Linux - Assuring Security by Penetration Testing\u003c/td\u003e\u003ctd\u003e454 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e31.\u003c/td\u003e\u003ctd\u003eInformation Security  Management Handbook\u003c/td\u003e\u003ctd\u003e3206 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e32.\u003c/td\u003e\u003ctd\u003eComputer and Information Security Handbook\u003c/td\u003e\u003ctd\u003e877 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e33.\u003c/td\u003e\u003ctd\u003eCISSP - Certified Information Systems Security Professional\u003c/td\u003e\u003ctd\u003e804 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e34.\u003c/td\u003e\u003ctd\u003eComputer Security and Cryptography\u003c/td\u003e\u003ctd\u003e542 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e35.\u003c/td\u003e\u003ctd\u003ePython for Kids\u003c/td\u003e\u003ctd\u003e348 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e36.\u003c/td\u003e\u003ctd\u003eEnd to End Network Security - Defense-in-Depth\u003c/td\u003e\u003ctd\u003e469 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e37.\u003c/td\u003e\u003ctd\u003eA Guide to Computer Network Security\u003c/td\u003e\u003ctd\u003e483 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e38.\u003c/td\u003e\u003ctd\u003eEssential Computer Security\u003c/td\u003e\u003ctd\u003e321 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e39.\u003c/td\u003e\u003ctd\u003eSecurity in Wireless Mesh Networks\u003c/td\u003e\u003ctd\u003e548 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e40.\u003c/td\u003e\u003ctd\u003eHacking Windows XP (OLD)\u003c/td\u003e\u003ctd\u003e379 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e41.\u003c/td\u003e\u003ctd\u003eHacking Exposed - Windows Security, Secrets and Solutions\u003c/td\u003e\u003ctd\u003e482 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e42.\u003c/td\u003e\u003ctd\u003eHacking Exposed - Network Security, Secrets and Solutions\u003c/td\u003e\u003ctd\u003e736 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e43.\u003c/td\u003e\u003ctd\u003eInformation Security - Principles and Pratice\u003c/td\u003e\u003ctd\u003e413 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e44.\u003c/td\u003e\u003ctd\u003eNessus, Snort and Ethereal Power Tools\u003c/td\u003e\u003ctd\u003e472 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e45.\u003c/td\u003e\u003ctd\u003eActive Defense - A Comprehensive Guide to Network Security\u003c/td\u003e\u003ctd\u003e374 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e46.\u003c/td\u003e\u003ctd\u003eInformation Security Fundamentals\u003c/td\u003e\u003ctd\u003e262 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e47.\u003c/td\u003e\u003ctd\u003eWireless Network Security\u003c/td\u003e\u003ctd\u003e422 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e48.\u003c/td\u003e\u003ctd\u003eRed Hat Linux Security and Optimization\u003c/td\u003e\u003ctd\u003e721 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e49.\u003c/td\u003e\u003ctd\u003eWindows Forensics Analysis\u003c/td\u003e\u003ctd\u003e386 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e50.\u003c/td\u003e\u003ctd\u003eMobile and Wireless Network Security and Privacy\u003c/td\u003e\u003ctd\u003e232 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e51.\u003c/td\u003e\u003ctd\u003eFirewalls and Internet Security\u003c/td\u003e\u003ctd\u003e456 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e52.\u003c/td\u003e\u003ctd\u003eAn Introduction to Computer Security - The NIST Handbook\u003c/td\u003e\u003ctd\u003e290 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e53.\u003c/td\u003e\u003ctd\u003eUnauthorized Access - Physical Penetration Testing for IT Security Teams\u003c/td\u003e\u003ctd\u003e309 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e54.\u003c/td\u003e\u003ctd\u003eTesting Web Security\u003c/td\u003e\u003ctd\u003e297 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e55.\u003c/td\u003e\u003ctd\u003eMaximum Security - A Hacker's Guide to Protecting Your Internet Site and Network\u003c/td\u003e\u003ctd\u003e670 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e56.\u003c/td\u003e\u003ctd\u003eInformation Resource Guide - Computer, Internet and Network Systems Security\u003c/td\u003e\u003ctd\u003e325 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e57.\u003c/td\u003e\u003ctd\u003eThe Hacker's Underground Handbook\u003c/td\u003e\u003ctd\u003e116 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e58.\u003c/td\u003e\u003ctd\u003eGuide to SCADA and Industrial Control Systems Security\u003c/td\u003e\u003ctd\u003e164 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e59.\u003c/td\u003e\u003ctd\u003eThe International Handbook of Computer Security\u003c/td\u003e\u003ctd\u003e274 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e60.\u003c/td\u003e\u003ctd\u003eThe Code Book - How to Make It, Break It, Hack It, Crack It\u003c/td\u003e\u003ctd\u003e273 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e61.\u003c/td\u003e\u003ctd\u003eLinux 101 Hacks\u003c/td\u003e\u003ctd\u003e271 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e62.\u003c/td\u003e\u003ctd\u003eIntroduction to Linux - A Hands on Guide\u003c/td\u003e\u003ctd\u003e223 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e63.\u003c/td\u003e\u003ctd\u003eBluetooth Security\u003c/td\u003e\u003ctd\u003e222 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e64.\u003c/td\u003e\u003ctd\u003eIT Governance - A Manager's Guide to Data Security and ISO 27001/27002\u003c/td\u003e\u003ctd\u003e385 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e65.\u003c/td\u003e\u003ctd\u003eBatch File Programming\u003c/td\u003e\u003ctd\u003e155 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e66.\u003c/td\u003e\u003ctd\u003eCracking the Coding Interview\u003c/td\u003e\u003ctd\u003e310 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e67.\u003c/td\u003e\u003ctd\u003eDictionary of Networking\u003c/td\u003e\u003ctd\u003e465 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e68.\u003c/td\u003e\u003ctd\u003eHacking Gmail\u003c/td\u003e\u003ctd\u003e310 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e69.\u003c/td\u003e\u003ctd\u003eLinux Complete Command Reference\u003c/td\u003e\u003ctd\u003e1528 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e70.\u003c/td\u003e\u003ctd\u003ePractical Hacking Techniques and Countermeasures\u003c/td\u003e\u003ctd\u003e752 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e71.\u003c/td\u003e\u003ctd\u003eThe Art of Intrusion by Kevin Mitnick\u003c/td\u003e\u003ctd\u003e291 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e72.\u003c/td\u003e\u003ctd\u003eHack Notes - Windows Security Portable Reference\u003c/td\u003e\u003ctd\u003e289 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e73.\u003c/td\u003e\u003ctd\u003eHacking - The Next Generation\u003c/td\u003e\u003ctd\u003e298 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e74.\u003c/td\u003e\u003ctd\u003eHacking the Cable Modem\u003c/td\u003e\u003ctd\u003e330 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e75.\u003c/td\u003e\u003ctd\u003eHackers Beware - Defending Your Network From The Wiley Hacker\u003c/td\u003e\u003ctd\u003e817 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e76.\u003c/td\u003e\u003ctd\u003eHack Proofing Your Network\u003c/td\u003e\u003ctd\u003e826 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e77.\u003c/td\u003e\u003ctd\u003eHack Attacks Revealed\u003c/td\u003e\u003ctd\u003e837 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e78.\u003c/td\u003e\u003ctd\u003eDissecting the Hack - The F0rb1dd3n Network\u003c/td\u003e\u003ctd\u003e441 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e79.\u003c/td\u003e\u003ctd\u003eTCP/IP Guide\u003c/td\u003e\u003ctd\u003e1671 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e80.\u003c/td\u003e\u003ctd\u003eOffensive Security - Wireless Attacks - WiFu\u003c/td\u003e\u003ctd\u003e385 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e81.\u003c/td\u003e\u003ctd\u003eGoogle Hacking - For Penetration Testers\u003c/td\u003e\u003ctd\u003e529 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e82.\u003c/td\u003e\u003ctd\u003eComputer Forensics Investigating Network Intrusions and Cyber Crime\u003c/td\u003e\u003ctd\u003e394 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e83.\u003c/td\u003e\u003ctd\u003eHakin9 Bible\u003c/td\u003e\u003ctd\u003e207 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e84.\u003c/td\u003e\u003ctd\u003eNetwork Forensics - Tracking Hackers Through Cyberspace\u003c/td\u003e\u003ctd\u003e574 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e85.\u003c/td\u003e\u003ctd\u003eComputer Forensics - Investigating Data and Image Files\u003c/td\u003e\u003ctd\u003e227 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e86.\u003c/td\u003e\u003ctd\u003ePenetration Testing and Network Defense\u003c/td\u003e\u003ctd\u003e625 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e87.\u003c/td\u003e\u003ctd\u003eHacking Exposed - Malware and Rootkits\u003c/td\u003e\u003ctd\u003e401 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e88.\u003c/td\u003e\u003ctd\u003eMalware Analyst's Cookbook\u003c/td\u003e\u003ctd\u003e746 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e89.\u003c/td\u003e\u003ctd\u003eMobile Malware - Attacks and Defense\u003c/td\u003e\u003ctd\u003e386 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e90.\u003c/td\u003e\u003ctd\u003eJava 2 Network Security\u003c/td\u003e\u003ctd\u003e702 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e91.\u003c/td\u003e\u003ctd\u003eA Bug Hunter's Diary\u003c/td\u003e\u003ctd\u003e212 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e92.\u003c/td\u003e\u003ctd\u003eViruses Revealed - Understand and Counter Malicious Software\u003c/td\u003e\u003ctd\u003e721 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e93.\u003c/td\u003e\u003ctd\u003eFigital Forensics With Open Source Tools\u003c/td\u003e\u003ctd\u003e289 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e94.\u003c/td\u003e\u003ctd\u003eSSH, The Secure Shell - The Definitive Guide\u003c/td\u003e\u003ctd\u003e438 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e95.\u003c/td\u003e\u003ctd\u003ePro PHP Security\u003c/td\u003e\u003ctd\u003e369 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e96.\u003c/td\u003e\u003ctd\u003eZero Day Exploit - Countdown to Darkness\u003c/td\u003e\u003ctd\u003e363 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e97.\u003c/td\u003e\u003ctd\u003eMetasploit Penetration Testing Cookbook\u003c/td\u003e\u003ctd\u003e269 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e98.\u003c/td\u003e\u003ctd\u003e24 Deadly Sins of Software Securtiy\u003c/td\u003e\u003ctd\u003e433 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e99.\u003c/td\u003e\u003ctd\u003eBotnets - The Killer Web App\u003c/td\u003e\u003ctd\u003e482 Pages\u003c/td\u003e\u003c/tr\u003e\n\u003ctr\u003e\u003ctd\u003e100.\u003c/td\u003e\u003ctd\u003eHacker Highschool - Hack School for Beginners (ZIP)\u003c/td\u003e\u003ctd\u003e12 Books\u003c/td\u003e\u003c/tr\u003e\n\n\u003c/table\u003e\n\nFor any broken link, please drop a mail at yeahhub@gmail.com\n","funding_links":[],"categories":["\u003ca id=\"a4ee2f4d4a944b54b2246c72c037cd2e\"\u003e\u003c/a\u003e收集\u0026\u0026集合","\u003ca id=\"8c5a692b5d26527ef346687e047c5c21\"\u003e\u003c/a\u003e收集","\u003ca id=\"67acc04b20c99f87ee625b073330d8c2\"\u003e\u003c/a\u003e无工具类收集"],"sub_categories":["\u003ca id=\"67acc04b20c99f87ee625b073330d8c2\"\u003e\u003c/a\u003e无工具类收集","\u003ca id=\"f110da0bf67359d3abc62b27d717e55e\"\u003e\u003c/a\u003e新添加的"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fyeahhub%2Fhacking-security-ebooks","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fyeahhub%2Fhacking-security-ebooks","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fyeahhub%2Fhacking-security-ebooks/lists"}