I share books, but remember to buy them on your own. If you like it, support the author, it’s very important
- A Guide to Kernel Exploitation Attacking the Core
- Computer Networking A Top-Down Approach
- Fuzzing Brute Force Vulnerability Discovery
- Gray Hat Python - Python Programming for Hackers and Reverse Engineers (2009)
- Hacking - The Art of Exploitation, 2nd Ed.
- Metasploit, Penetration Testers Guide
- Modern Operating Systems, 3rd Ed.
- Reversing - Secrets Of Reverse Engineering (2005)
- The Art of Assembly Language, 2nd Ed.
- The Mac Hacker’s Handbook
- The IDA Pro Book, 2nd Ed. (2011)
- The ShellCoder’s Handbook - Discovering and Exploiting Security Holes, 2nd Ed.
- Gray Hat Hacking, 3rd Ed.
- nasmdoc
- Active Directory Enumeration with PowerShell by Haboob Team
- Command & Control Understanding, Denying and Detecting
- Definitive Guide to SOC-as-a-Service
- Definitive Guide to Continuous Network Monitoring
- Definitive Guide to Cyber Threat Intelligence
- Definitive Guide to Security Intelligence and Analytics
- Getting Started with MITRE ATT&CK
- Hunt Evil Your Practical Guide to Threat Hunting
- Hunting For PowerShell Abuse
- HUNTPEDIA Your Threat Hunting Knowwledge Compendium
- Lateral Movement Analysis
- Launching Threat Hunting from Almost Nothing
- Windows Memory Analysis with Volatility
- TaHiTI: a threat hunting methodology
- The Cyber Intelligence Analyst’s Cookbook
- The Elastic Guide to Threat Hunting
- The Endgame Guide to Threat Hunting
- The Hunters Handbook manager
- This Is the Fastest Way to Hunt Windows Endpoints
- Threat Hunting via Windows Event Logs
- Threat Intelligence Handbook
- Threat Hunting For Dummies
- The Threat Intelligence Handbook
- The Who, What, Where, When, Why and How of Effective Threat Hunting
source:
CySecBooks
awesome_Threat-Hunting