A comprehensive, roadmap-driven collection of free cybersecurity ebooks organized by learning stage and specialization.
This repository is built for:
- Students and beginners entering cybersecurity
- SOC Analysts & Security Engineers
- Malware Analysts & Digital Forensics learners
- Penetration Testers & Red Team aspirants
- Self-learners preparing for internships, certifications, and jobs
π― Goal: remove confusion, preserve depth, and help you learn cybersecurity in the right order.
- Follow the roadmap: Foundations β Defensive β Offensive β Specializations
- Ebooks are reference material, not mandatory reading
- Pick resources aligned with your career track
- You do not need to read everything
- Python for Offensive PenTest β A Guide to Ethical Hacking and Penetration Testing
- Violent Python for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
- Learning Python
- Black Hat Python β Programming for Hackers and Pentesters
- Modern Python Cookbook
- Hacking with Python β Ultimate Beginner's Guide
- Python Web Penetration Testing Cookbook
- Mastering Python Networking
- Machine Learning and Security
- Malware Analysis Fundamentals
- THE IDA PRO BOOK
- Advanced Malware Analysis
- Detection of Intrusions and Malware, and Vulnerability Assessment
- Learning Malware Analysis
- Malware Analyst's Tools and Techniques
- Malware Detection β Advances in Information Security
- The Rootkit ARSENAL
- Windows Malware Analysis Essentials
- PRACTICAL MALWARE ANALYSIS
- Writing Security Tools and Exploits
- Windows Virus and Malware Troubleshooting
- Rootkits and Bootkits: Reversing Modern Malware and Next-Generation Threats
- Malware Analysis Techniques: Tricks for the Triage of Adversarial Software
- Malware Data Science: Attack Detection and Attribution
- The Art of Memory Forensics
- Practical Forensic Imaging
- Malware Forensics Field Guide for Windows Systems
- Cyber Forensics: A Field Manual for Collecting
- Attacking Network Protocols
- Digital Forensics With Open Source Tools
- Cyber Forensics
- Hacking Exposed Malware And Rootkit
- Digital Forensics
- Windows Forensic
- Windows Malware Analysis Accelerated with Memory Dumps
- Computer Viruses and Malware
- Wireshark for Security Professionals
- Reverse Engineering for Beginners
- Computer and Information Security Handbook
- Windows Forensic Analysis
- Computer Viruses for Dummies
- Binary Instrumentation for Security Professionals
- Hacking Exposed Computer Forensics
- Learn Computer Forensics
- Linux Malware Incident Response
- The Basics of Digital Forensics
- Digital Forensics Basics: A Practical Guide Using Windows OS
- PowerShell and Python Together
- Incident Response & Computer Forensics, Third Edition
- Computer Forensics: Cybercriminals, Laws, and Evidence
- Guide to Computer Forensics and Investigations
- Hacks, Leaks, and Revelations
- Gray Hat Hacking The Ethical Hacker's Handbook
- Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition
- Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition
- Gray Hat Hacking: The Ethical Hacker's Handbook, Second Edition
- Penetration Testing: A Survival Guide
- Mastering Modern Web Penetration Testing
- The Hacker Playbook 2: Practical Guide to Penetration Testing
- The Basics of Hacking and Penetration Testing
- Quick Start Guide to Penetration Testing
- Ethical Hacking and Penetration Testing Guide
- Ethical Hacking 101: How to Conduct Professional Pentestings in 21 Days or Less!
- HackLOG Security & Ethical Hacking Handbook Volume 1: Anonymity
- The Hacker Playbook 3: Practical Guide to Penetration Testing
- Hacking: The Ultimate Hacking for Beginners
- Prophet Hacker: Android Hacking Book
- Hacking Bible
- Web App Hacking (Hackers Handbook)
- Pentesting Azure Applications
- Gray Hat C#: A Hacker's Guide to Creating and Automating Security Tools
- Antivirus Hackers Handbook
- Hacking Exposedβ’ 6: Network Security Secrets & Solutions
- Hacking Secrets Exposed - A Beginner's Guide
- Hacking Exposedβ’ Web Applications 3
- Hacking Exposed: Network Security Secrets & Solutions 2nd Edition
- Hacking Exposedβ’ Windows
- Hacking Exposed - Linux: Linux Security Secrets
- Black Hat Bash Scripting for Hackers and Pentesters
- Black Hat Go: Programming for Hackers and Pentesters
- Basic Security Testing with Kali Linux
- Kali Linux Network Scanning Cookbook
- Kali Linux - Assuring Security by Penetration Testing
- Kali Linux 2 Windows Penetration Testing
- Kali Linux Cookbook
- Web Penetration Testing with Kali Linux
- The Ultimate Kali Linux Book - Perform Advanced Penetration Testing
- Web Penetration Testing with Kali Linux (Build your defense against web attacks)
- Hands-On Penetration Testing on Windows
- Kali Linux Tools (Digital Forensics Penetration Testing)
- Kali Linux Wireless Pentesting and Security for Beginners
- Linux Basics for Hackers
- Kali Linux Revealed - Mastering the Penetration Testing Distribution
- Android Hacker's Handbook
- iOS Application Security
- Mobile Pentesting with FRIDA
- Mobile Security For Dummies
- Android Application Security
- Mobile Device Exploitation Cookbook
- Hacking Android
- Mobile Exploitation - The Past, Present, and the Future
- Android Security Internals - An In-Depth Guide to Android's Security Architecture
- IOT Security Guide 2022
- Handbook of Big Data and IoT Security
- Hacking IoT for Bug Bounties
- The IoT Hacker's Handbook
- PRACTICAL IOT HACKING: The Definitive Guide to Attacking the Internet of Things
- Serious Cryptography
- Introduction to Cryptography
- Cryptography and Network Security
- Applied Cryptography in .NET and Azure Key Vault
- Hands-On Cryptography with Python
- Cracking Codes with Python
- Cyber Security on Azure: An IT Professional's Guide to Microsoft Azure Security Center
- Practical Cloud Security: A Guide for Secure Design and Deployment
- The Tangled Web: A Guide to Securing Modern Web Applications
- Linux Command Line and Shell Scripting Bible (1052 pages)
- Nmap Official Guide + Scripts
- Network Security Bible
- Anti-Hacker Tool Kit
- TOR DARKNET BUNDLE (5-in-1): Master the Art of Invisibility
- Evading EDR: A Comprehensive Guide to Defeating Endpoint Detection Systems
- Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems
- Windows Security Internals with PowerShell
- Infrastructure as Code: Evolving Systems in the Cloud
Hands-on platforms to practice cybersecurity skills through labs, challenges, and simulated environments.
- TryHackMe β Beginner-friendly guided cybersecurity labs and learning paths.
- Hack The Box β Advanced penetration testing labs with realistic vulnerable machines.
- OverTheWire β Wargames focused on Linux, networking, and security fundamentals.
- PicoCTF β Beginner-oriented CTF platform with challenges from Carnegie Mellon.
- VulnHub β Downloadable vulnerable VMs for offline practice.
- RangeForce Community Edition β Blue team and defensive security training labs.
- PortSwigger Web Security Academy β Interactive labs covering web vulnerabilities.
- PentesterLab β Hands-on web exploitation exercises.
- Root Me β Web hacking, cryptography, reverse engineering, and more.
- OWASP Juice Shop β Intentionally vulnerable web application.
- Google Gruyere β Web vulnerability training app from Google.
- CTFtime β Global calendar and rankings of CTF competitions.
- pwnable.kr β Binary exploitation and pwn challenges.
- pwnable.tw β Advanced exploitation challenges.
- RingZer0 CTF β Multiple categories including crypto, web, and reversing.
- CloudGoat β AWS security scenarios for hands-on learning.
- flAWS Cloud β AWS security challenge environment.
- flAWS2 β Advanced AWS security challenges.
- Cloud Security Labs β Interactive cloud security exercises.
- Malware Traffic Analysis β Real malware network traffic samples.
- Malware Unicorn Workshops β Malware analysis training materials.
- Blue Team Labs Online β SOC and incident response training labs.
- CyberDefenders β DFIR and blue team challenges.
- LetsDefend β SOC analyst simulation platform.
- Crackmes.one β Reverse engineering challenges.
- Microcorruption β Embedded system exploitation wargame.
Drop a π and share π it with your fellow Cybersecurity enthusiasts and start learning together! π€© Follow me on X/twitter to connect π©·