Nemesis FAQ v2.1
Unknown
cbrpnk_02_runner-[..]
Investigating Cryptocurrencies
Nick Furneaux
cbrpnk_05_weird
Quick Start Guide
John Schember
README
The Liquidsoap book
Samuel Mimram; Romain Beauxis
Windows PowerShell Tutorial for Beginners
netwrix
The Art of Intrusion
Simon, William L. - Mitnick, Kevin D.
Unauthorised Access
Allsopp , Wil
Malware Analyst's Cookbook and DVD
Michael Ligh & Steven Adair & Blake Hartstein & Matthew Richard
Liars and Outliers
Bruce Schneier
Practical Reverse Engineering
Bruce Dang & Alexandre Gazet & Elias Bachaalany
Threat Modeling
Adam Shostack
The Art of Memory Forensics
Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters
Cryptography Engineering: Design Principles and Practical Applications
Niels Ferguson & Bruce Schneier & Tadayoshi Kohno
thecarhackershand[..]
Wireshark for Security Professionals
Jessey Bullock & Jeff T. Parker
The Web Application Hacker’s Handbook
Dafydd Stuttard & Marcus Pinto
Social Engineering
Christopher Hadnagy
The pfSense Book
Netgate
The Art of Deception
Kevin D. Mitnick & William L. Simon
Cybersecurity Blue Team Toolkit
Nadean H. Tanner
Transformational Security Awareness
Perry Carpenter
Applied Cryptography, Second Edition
Tribe of Hackers
Marcus J. Carey & Jennifer Jin
Tribe of Hackers Red Team
Cryptography Apocalypse
Roger A. Grimes
Tribe of Hackers Security Leaders
Tribe of Hackers Blue Team
Hacking Multifactor Authentication
The Pentester Blueprint
Phillip L. Wylie & Kim Crawley
Kali Linux Penetration Testing Bible
Gus Khawaja
The Art of Attack
Maxie Reynolds
Cybersecurity and Third-Party Risk
Gregory C. Rasner