Kithbook Satyrs (1998)
Unknown
Acr2068.tmp
The Shattered Dream (1999)
Manifesto
Transmissions From The Rogue Council (2002)
Trapping 101
Philip Massaro
Windows PowerShell Tutorial for Beginners
netwrix
The Liquidsoap book
Samuel Mimram; Romain Beauxis
Unauthorised Access
Allsopp , Wil
The Art of Intrusion
Simon, William L. - Mitnick, Kevin D.
Transformational Security Awareness
Perry Carpenter
The Pentester Blueprint
Phillip L. Wylie & Kim Crawley
Kali Linux Penetration Testing Bible
Gus Khawaja
Investigating Cryptocurrencies
Nick Furneaux
The Web Application Hacker’s Handbook
Dafydd Stuttard & Marcus Pinto
Wireshark for Security Professionals
Jessey Bullock & Jeff T. Parker
Practical Reverse Engineering
Bruce Dang & Alexandre Gazet & Elias Bachaalany
Tribe of Hackers Red Team
Marcus J. Carey & Jennifer Jin
Cryptography Engineering: Design Principles and Practical Applications
Niels Ferguson & Bruce Schneier & Tadayoshi Kohno
Hacking Multifactor Authentication
Roger A. Grimes
Tribe of Hackers
Tribe of Hackers Security Leaders
Liars and Outliers
Bruce Schneier
Applied Cryptography, Second Edition
The Art of Memory Forensics
Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters
The Art of Attack
Maxie Reynolds
Cryptography Apocalypse
Cybersecurity Blue Team Toolkit
Nadean H. Tanner
Malware Analyst's Cookbook and DVD
Michael Ligh & Steven Adair & Blake Hartstein & Matthew Richard
The Art of Deception
Kevin D. Mitnick & William L. Simon
Tribe of Hackers Blue Team
Cybersecurity and Third-Party Risk
Gregory C. Rasner
Social Engineering
Christopher Hadnagy
Threat Modeling
Adam Shostack
README
Quick Start Guide
John Schember
The pfSense Book
Netgate
thecarhackershand[..]