└── README.md /README.md: -------------------------------------------------------------------------------- 1 | # Cybersecurity-Books 2 | Here you will get awesome collection of mostly all well-known and usefull cybersecurity books from beginner level to expert for all cybersecurity positions 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 1) [Cyber_Sec_Roadmap_ (1).pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089100/Cyber_Sec_Roadmap_.1.pdf) 11 | 12 | 13 | 14 | 2) [21 days free CCNA complete videos.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089215/21.days.free.CCNA.complete.videos.pdf) 15 | 16 | 17 | 3) [101 Labs - CompTIA Linux+.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089220/101.Labs.-.CompTIA.Linux%2B.pdf) 18 | 19 | 20 | 21 | 4) [7839+ Awesome Deep Web Onion Links List (Uncensored Content).pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089223/7839%2B.Awesome.Deep.Web.Onion.Links.List.Uncensored.Content.pdf) 22 | 23 | 24 | 25 | 5) [Bash Scripting.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089224/Bash.Scripting.pdf) 26 | 27 | 28 | 6) [bash scripting-1.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089225/bash.scripting-1.pdf) 29 | 30 | 31 | 7) [Basic knowldges of Pentesting (1).pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089227/Basic.knowldges.of.Pentesting.1.pdf) 32 | 33 | 34 | 8) [Beginning Ethical Hacking with Kali Linux.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089228/Beginning.Ethical.Hacking.with.Kali.Linux.pdf) 35 | 36 | 37 | 9) [Bug Bounty Automation With Python The secrets of bug hunting.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089229/Bug.Bounty.Automation.With.Python.The.secrets.of.bug.hunting.pdf) 38 | 39 | 40 | 41 | 10) [Bug Bounty Field Manual.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089230/Bug.Bounty.Field.Manual.pdf) 42 | 43 | 44 | 45 | 46 | 47 | 11) [Bug-Bounty-Field-Manual-complete-ebook (1).pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089231/Bug-Bounty-Field-Manual-complete-ebook.1.pdf) 48 | 49 | 50 | 51 | 52 | 53 | 54 | 12) [CLICKJACKING AND SNIFFING.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089232/CLICKJACKING.AND.SNIFFING.pdf) 55 | 56 | 57 | 58 | 59 | 13) [Cyber Security_ Analytics, Technology and Automation.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089233/Cyber.Security_.Analytics.Technology.and.Automation.pdf) 60 | 61 | 62 | 14) [Dark Web in ten minutes.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089234/Dark.Web.in.ten.minutes.pdf) 63 | 64 | 65 | 66 | 15) [Data Analysis For Network Cyber-Security.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089235/Data.Analysis.For.Network.Cyber-Security.pdf) 67 | 68 | 69 | 16) [Developing Burp Suite Extensions _ security automation.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089237/Developing.Burp.Suite.Extensions._.security.automation.pdf) 70 | 71 | 72 | 17) [Digital Forensics Explained, 2nd Edition.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089238/Digital.Forensics.Explained.2nd.Edition.pdf) 73 | 74 | 75 | 76 | 77 | 18) [Ethical Hacking MindMap.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089239/Ethical.Hacking.MindMap.pdf) 78 | 79 | 80 | 19) [Exploiting Misconfigurations.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089241/Exploiting.Misconfigurations.pdf) 81 | 82 | 83 | 84 | 20) [Hacking with Python_ The Ultimate Beginners Guide.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089242/Hacking.with.Python_.The.Ultimate.Beginners.Guide.pdf) 85 | 86 | 87 | 21) [Hacking_ Computer Hacking Beginners Guide ( PDFDrive.com ).pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089243/Hacking_.Computer.Hacking.Beginners.Guide.PDFDrive.com.pdf) 88 | 89 | 90 | 22) [How Linux Works 3rd - Early access (1).pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089244/How.Linux.Works.3rd.-.Early.access.1.pdf) 91 | 92 | 93 | 23) [How Linux Works 3rd - Early access.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089245/How.Linux.Works.3rd.-.Early.access.pdf) 94 | 95 | 96 | 24) [InsidetheDarkWeb.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089246/InsidetheDarkWeb.pdf) 97 | 98 | 99 | 100 | 24) [LINUX_FOR_BEGINNERS_How_to_Master_the_Linux_Operating_System_and.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089247/LINUX_FOR_BEGINNERS_How_to_Master_the_Linux_Operating_System_and.pdf) 101 | 102 | 103 | 26) [Machine Learning with Python for Everyone.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089248/Machine.Learning.with.Python.for.Everyone.pdf) 104 | 105 | 106 | 27) [Mastering_Kali_Linux_for_Advanced_Penetration_Testing_Beggs,_Robert.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089249/Mastering_Kali_Linux_for_Advanced_Penetration_Testing_Beggs._Robert.pdf) 107 | 108 | 109 | 110 | 111 | 112 | 113 | 28) [Mastering_Reverse_Engineering_Re_engineer_your_ethical_hacking_skills.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089250/Mastering_Reverse_Engineering_Re_engineer_your_ethical_hacking_skills.pdf) 114 | 115 | 116 | 29) [Metasploit.Penetration.Testing.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089253/Metasploit.Penetration.Testing.pdf) 117 | 118 | 119 | 120 | 30) [Nmap 6_ Network exploration and security auditing Cookbook.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089254/Nmap.6_.Network.exploration.and.security.auditing.Cookbook.pdf) 121 | 122 | 123 | 124 | 125 | 31) [OSCP 2.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089258/OSCP.2.pdf) 126 | 127 | 128 | 32) [OSCP Like Vulns Machines.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089261/OSCP.Like.Vulns.Machines.pdf) 129 | 130 | 131 | 33) [PenTest in Office365 and Security.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089262/PenTest.in.Office365.and.Security.pdf) 132 | 133 | 134 | 34) [Practical_Social_Engineering_A_Primer_for_the_Ethical_Hacker_by (1).pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089264/Practical_Social_Engineering_A_Primer_for_the_Ethical_Hacker_by.1.pdf) 135 | 136 | 137 | 35) [practical-reverse-engineering.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089265/practical-reverse-engineering.pdf) 138 | 139 | 140 | 141 | 142 | 36) [Purple Team Field Manual.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089268/Purple.Team.Field.Manual.pdf) 143 | 144 | 145 | 146 | 37) [Quick_Start_Guide_to_Penetration_Testing_With_NMAP,_OpenVAS_and.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089269/Quick_Start_Guide_to_Penetration_Testing_With_NMAP._OpenVAS_and.pdf) 147 | 148 | 149 | 150 | 38) [RE_for_beginners-en.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089271/RE_for_beginners-en.pdf) 151 | 152 | 153 | 154 | 39) [Real_World_Bug_Hunting_A_Field_Guide_to_Web_Hacking_by_Peter_Yaworski.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089272/Real_World_Bug_Hunting_A_Field_Guide_to_Web_Hacking_by_Peter_Yaworski.pdf) 155 | 156 | 157 | 158 | 159 | 160 | 161 | 40) [recon .pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089275/recon.pdf) 162 | 163 | 164 | 165 | 41) [SAST Scanners - We Hack Purple Cheat Sheet.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089276/SAST.Scanners.-.We.Hack.Purple.Cheat.Sheet.pdf) 166 | 167 | 168 | 42) [ShellS.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089277/ShellS.pdf) 169 | 170 | 171 | 172 | 43) [SoC Analyst Career .pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089279/SoC.Analyst.Career.pdf) 173 | 174 | 175 | 176 | 44) [SQL INJECTION.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089280/SQL.INJECTION.pdf) 177 | 178 | 179 | 180 | 181 | 45) [SQL squid game .pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089282/SQL.squid.game.pdf) 182 | 183 | 184 | 185 | 46) [The Hacker Playbook 3 Practical Guide To Penetration Testing.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089285/The.Hacker.Playbook.3.Practical.Guide.To.Penetration.Testing.pdf) 186 | 187 | 47) [The_Basics_Of_Hacking_And_Penetration_Testing_Ethical_Hacking_And.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089315/The_Basics_Of_Hacking_And_Penetration_Testing_Ethical_Hacking_And.pdf) 188 | 189 | 48) [The_Code_Book__How_to_Make_It,_Break.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089317/The_Code_Book__How_to_Make_It._Break.pdf) 190 | 191 | 192 | 193 | 49) [the-underground-hacker-s-handbook.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089288/the-underground-hacker-s-handbook.pdf) 194 | 195 | 196 | 50) [Web Application Security For Dummies.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089289/Web.Application.Security.For.Dummies.pdf) 197 | 198 | 199 | 200 | 201 | 202 | 203 | 204 | 51) [Web_Scraping_with_Python_Collecting_More_Data_from_the_Modern_Web.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089290/Web_Scraping_with_Python_Collecting_More_Data_from_the_Modern_Web.pdf) 205 | 206 | 207 | 208 | 209 | 210 | 52) [WiFi(HackProofYourWirelessNetwork).pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089291/WiFi.HackProofYourWirelessNetwork.pdf) 211 | 212 | 213 | 214 | 53) [Linux_Basics_for_Hackers_Getting_Started_with_Networking,_Scripting.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089293/Linux_Basics_for_Hackers_Getting_Started_with_Networking._Scripting.pdf) 215 | 216 | 217 | 54) [D1T2_Philippe_Langlois_Hacking_HLR_HSS_and_MME_Core_Network_Elements.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089847/D1T2_Philippe_Langlois_Hacking_HLR_HSS_and_MME_Core_Network_Elements.pdf) 218 | 219 | 220 | 221 | 222 | 55) [HAXPO D1 - Hacking LTE Public Warning Systems - Weiguang Li.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089848/HAXPO.D1.-.Hacking.LTE.Public.Warning.Systems.-.Weiguang.Li.pdf) 223 | 224 | 225 | 226 | 56) [WiFi_Hacking_for_Beginners_Learn(1).pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089849/WiFi_Hacking_for_Beginners_Learn.1.pdf) 227 | 228 | 229 | 57) [WiFi(HackProofYourWirelessNetwork).pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089852/WiFi.HackProofYourWirelessNetwork.pdf) 230 | 231 | 232 | 233 | 58) [Understanding_Network_Hacks_Attack_and_Defense_with_Python_Bastian.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089853/Understanding_Network_Hacks_Attack_and_Defense_with_Python_Bastian.pdf) 234 | 235 | 236 | 237 | 59) [Ultimate_Linux_Projects_First_Edition_2022_etc_z_lib_org.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089855/Ultimate_Linux_Projects_First_Edition_2022_etc_z_lib_org.pdf) 238 | 239 | 240 | 241 | 60) [The_NICE_Cyber_Security_Framework_Cyber_Security_Intelligence_and.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089858/The_NICE_Cyber_Security_Framework_Cyber_Security_Intelligence_and.pdf) 242 | 243 | 244 | 245 | 61) [The_Basics_Of_Hacking_And_Penetration_Testing_Ethical_Hacking_And.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089860/The_Basics_Of_Hacking_And_Penetration_Testing_Ethical_Hacking_And.pdf) 246 | 247 | 248 | 249 | 250 | 62) [RE_for_beginners-en.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089862/RE_for_beginners-en.pdf) 251 | 252 | 253 | 254 | 63) [Perl Programming for Beginners.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089863/Perl.Programming.for.Beginners.pdf) 255 | 256 | 257 | 258 | 64) [ML_download.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089864/ML_download.pdf) 259 | 260 | 261 | 65) [malwaredatascience.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089866/malwaredatascience.pdf) 262 | 263 | 264 | 265 | 66) [long_short_term_memory_networks_with_python.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089869/long_short_term_memory_networks_with_python.pdf) 266 | 267 | 268 | 67) [Linux_system_programming_talking_directly_to_the_kernel_and_C_library.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089873/Linux_system_programming_talking_directly_to_the_kernel_and_C_library.pdf) 269 | 270 | 68) [Linux_Command_Line_and_Shell_Scripting_Bible_Richard_Blum,_Christine.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089875/Linux_Command_Line_and_Shell_Scripting_Bible_Richard_Blum._Christine.pdf) 271 | 272 | 69) [Kali_Linux_Wireless_Pentesting_and_Security_for_Beginners_@VPPOfficial.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089876/Kali_Linux_Wireless_Pentesting_and_Security_for_Beginners_%40VPPOfficial.pdf) 273 | 274 | 275 | 70) [Hide Data in AUDfile.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089878/Hide.Data.in.AUDfile.pdf) 276 | 277 | 278 | 71) [Hacking Android.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089879/Hacking.Android.pdf) 279 | 280 | 281 | 282 | 72) [Google Hacking for Penetration Testers Volume2 .pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089880/Google.Hacking.for.Penetration.Testers.Volume2.pdf) 283 | 284 | 285 | 286 | 73) [Deep_learning_with_python--develop_deep.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089884/Deep_learning_with_python--develop_deep.pdf) 287 | 288 | 289 | 74) [Data Analysis For Network Cyber-Security.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089885/Data.Analysis.For.Network.Cyber-Security.pdf) 290 | 291 | 292 | 75) [Dark_Web_Exploring_and_Data_Mining_the_Dark_Side_of_the_Web_@HackingCraze.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089887/Dark_Web_Exploring_and_Data_Mining_the_Dark_Side_of_the_Web_%40HackingCraze.pdf) 293 | 294 | 295 | 76) [Cybersecurity_–_Attack_and_Defense_Strategies_Infrastructure_security.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089889/Cybersecurity_._Attack_and_Defense_Strategies_Infrastructure_security.pdf) 296 | 297 | 298 | 77) [Cyber Security_ Analytics, Technology and Automation.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089890/Cyber.Security_.Analytics.Technology.and.Automation.pdf) 299 | 300 | 301 | 78) [010SessionHijacking.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089894/010SessionHijacking.pdf) 302 | 303 | 304 | 79) [009DOS LAB.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089895/009DOS.LAB.pdf) 305 | 306 | 307 | 80) [007Sniffers LAB.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089897/007Sniffers.LAB.pdf) 308 | 309 | 310 | 311 | 81) [005System Hacking LAB.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089899/005System.Hacking.LAB.pdf) 312 | 313 | 314 | 82) [005Metasploit Framework.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089903/005Metasploit.Framework.pdf) 315 | 316 | 317 | 83) [002Foot Printing and Reconnaissance LAB.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089906/002Foot.Printing.and.Reconnaissance.LAB.pdf) 318 | 319 | 84) [001Introduction To Ethical Hacking.pdf](https://github.com/zealraj/Cybersecurity-Books/files/9089909/001Introduction.To.Ethical.Hacking.pdf) 320 | 321 | 322 | 323 | 324 | 325 | 326 | 327 | --------------------------------------------------------------------------------