"Knowledge is the most powerful weapon in cybersecurity."
This repository is a one-stop library for anyone passionate about Cybersecurity, Ethical Hacking, Penetration Testing, Network Defense, Bug Bounty, Red Teaming, Blue Teaming, OSINT, Digital Forensics, and much more. Whether you're a beginner breaking into cybersecurity or a seasoned professional sharpening your skills β this collection has something for everyone.
π Click on any book name to open/download it directly!
- π― About
- π‘ Why I Made This
- π Bug Bounty & Web Security
- π Ethical Hacking & Penetration Testing
- π΄ Red Teaming
- π΅ Blue Team & SOC
- π Kali Linux
- π Network Security & Defense
- π¦ Malware, Threats & Incident Response
- ποΈ Frameworks & Compliance (NIST, OWASP, MITRE)
- π€ AI & Machine Learning in Cybersecurity
- π Certifications (CEH, OSCP, CISSP, CHFI, CompTIA, CISM)
- π§ Linux & Bash
- π» Programming for Security
- π΅οΈ OSINT & Social Engineering
- π§ Security Tools & Frameworks
- π Cryptography & Blockchain
- π Career, Strategy & Miscellaneous
- β Star History
- π Support This Project
- π€ Contributing
- π¬ Connect
Welcome to Security-Books β a carefully curated, categorized collection of 160+ cybersecurity PDFs covering everything from foundational concepts to advanced exploitation techniques.
| Feature | Description |
|---|---|
| π 160+ Resources | One of the largest open collections of security books on GitHub |
| π·οΈ Fully Categorized | Every book organized into clear, logical categories |
| π Clickable Links | Click any book name to open/download it instantly |
| π All Skill Levels | From absolute beginner to advanced red teamer |
| π 100% Free | Open access for the entire cybersecurity community |
| π Regularly Updated | New resources added frequently |
"I believe cybersecurity knowledge should be accessible to everyone β not locked behind paywalls."
When I started my journey in cybersecurity, I spent countless hours searching the internet for quality learning material. Books were scattered across random websites, some behind paywalls, others buried in obscure forums. I wished there was one single place where I could find everything I needed β organized, categorized, and ready to read.
So I built it myself.
This repository is the resource I wish I had when I started. It's for:
- π Students who can't afford expensive textbooks but are hungry to learn
- πΌ Career switchers who need a solid foundation before their first security role
- π¬ Researchers who need quick access to reference material
- π Certification seekers preparing for CEH, OSCP, CISSP, CompTIA, and more
- π The global community β especially those in regions where access to quality resources is limited
I've personally gone through many of these books during my own CEH journey and professional experience. Every book here has been handpicked because it provides real, practical value.
My goal is simple: Remove barriers to cybersecurity education and help the next generation of security professionals get started β no matter where they are or what their background is.
Master the art of finding vulnerabilities and earning bounties.
| # | Book | Description |
|---|---|---|
| 1 | π Bug Bounty Bootcamp | Complete bootcamp for aspiring bug bounty hunters |
| 2 | π Bug Bounty Checklist for Web App | Essential checklist for web application testing |
| 3 | π Bug Bounty Hunting | Comprehensive guide to bug bounty hunting |
| 4 | π Bug Bounty Methodology | Step-by-step methodology for finding bugs |
| 5 | π Bug Bounty PlayBook | Strategic playbook for bounty programs |
| 6 | π Bug Bounty Playbook (Ghostlulz) | Ghostlulz's legendary bug bounty playbook |
| 7 | π Bug Bounty Playbook V2 | Updated V2 edition of the bug bounty playbook |
| 8 | π Bug Bounty Roadmap | Complete roadmap from beginner to pro |
| 9 | π Bug Bounty Hunting Essentials | Essential skills for successful bug bounty hunting |
| 10 | π Bug Bounty Tools Collection | Curated collection of bug bounty tools |
| 11 | π Awesome Bugbounty Writeups | Collection of amazing bug bounty writeups |
| 12 | π A Bug Hunter's Diary | Real-world bug hunting stories & techniques |
| 13 | π Bug Hunting Guide | Practical guide to hunting bugs |
| 14 | π Big Bounty | Advanced bounty hunting strategies |
| 15 | π Top 100 Bugs | Top 100 most common bugs & vulnerabilities |
| 16 | π Web Application Hacking | Web app exploitation techniques |
| 17 | π Web Application Pen Test | Web application penetration testing |
| 18 | π Web Application Testing | Comprehensive web testing guide |
| 19 | π Web Application Penetration Testing | Complete web app pentesting methodology |
| 20 | π Web Testing Security Guide | Security-focused web testing |
| 21 | π Web Hacking Arsenal | Web hacking tools & arsenal by Rafay Baloch |
| 22 | π Web Hacking Arsenal β A Practical Guide to Modern Web Pentesting | Modern web pentesting practical guide |
| 23 | π Web Hacking Arsenal β Practical Guide (Standalone) | Standalone edition by Rafay Baloch |
| 24 | π WebPenTestKali | Web penetration testing with Kali |
| 25 | π 100 Web PenTesting Checklist | 100-point web penetration testing checklist |
| 26 | π API Security Threats | Understanding and mitigating API vulnerabilities |
| 27 | π Advance XSS | Advanced Cross-Site Scripting techniques |
| 28 | π XSS Cheat Sheet | Quick reference for XSS payloads & bypasses |
| 29 | π Types of Sensitive Information | Identifying & classifying sensitive data |
| 30 | π eLearnSecurity eWPT Notes | eWPT certification study notes |
| 31 | π Web Agents Inject | Web agent injection techniques |
| 32 | π Pentesting With Burp Suite | Master Burp Suite for web testing |
Learn to think like a hacker β ethically.
| # | Book | Description |
|---|---|---|
| 1 | π Learn Ethical Hacking from Scratch | Start your ethical hacking journey |
| 2 | π Ethical Hacking and Penetration Testing Guide | Comprehensive guide by Rafay Baloch |
| 3 | π Certified Ethical Hacker (CEH) v3.0 Official Course | Official CEH course material |
| 4 | π CEH v03 β Ethical Hacking & Countermeasures: Web Apps & Data | CEH web application module |
| 5 | π CEH Brochure | CEH certification overview |
| 6 | π GenAI Ethical Hacking | Generative AI meets ethical hacking |
| 7 | π Hacking Project To Get Started | Hands-on hacking projects |
| 8 | π Coding for Penetration Testers | Building better pentesting tools |
| 9 | π Network Pen Test | Network penetration testing |
| 10 | π AD Pen Test | Active Directory penetration testing |
| 11 | π Pentest Handwriting Notes | Hand-written pentesting notes & cheatsheets |
| 12 | π Gray Hat Hacking (4th Edition) | Advanced gray hat techniques |
| 13 | π Hacking Exposed Linux (3rd Edition) | Linux exploitation techniques |
| 14 | π Hacking Gmail (ExtremeTech) | Email exploitation techniques |
| 15 | π AC DER BY PASS TECH.HACKERS | Access control bypass techniques |
| 16 | π Offensive Security Professional Overview Survival | OffSec professional guide |
| 17 | π Week 1 β Intro to Pentesting | Beginner-friendly intro to penetration testing |
Simulate real-world adversaries to strengthen defenses.
| # | Book | Description |
|---|---|---|
| 1 | π Red Teaming Handbook | Comprehensive red team operations guide |
| 2 | π What Can Generative AI Red Teaming Learn from Cyber Red Teaming | AI-powered red teaming insights |
Defend, detect, and respond to cyber threats.
| # | Book | Description |
|---|---|---|
| 1 | π 100 Security Operation Center Tools | Essential SOC tools reference |
| 2 | π Blue Team Cheat Sheet | Quick reference for blue teamers |
| 3 | π Detection Tool | Threat detection tools & techniques |
| 4 | π Windows Event Log Analysis | Master Windows event log forensics |
| 5 | π Ransomware Defense Report | Defending against ransomware attacks |
The ultimate penetration testing distribution β mastered.
| # | Book | Description |
|---|---|---|
| 1 | π§ Kali Linux For Hackers | Kali Linux hacking essentials |
| 2 | π§ Kali Wireless | Wireless hacking with Kali |
| 3 | π§ Kali Advanced Pentest | Advanced penetration testing with Kali |
| 4 | π§ Kali Linux | Core Kali Linux guide |
| 5 | π§ Kali Linux CookBook | Recipes for everyday Kali usage |
| 6 | π§ Kali Linux CTF | Capture The Flag challenges with Kali |
| 7 | π§ Kali Linux Revealed | Official Kali Linux documentation |
| 8 | π§ Kali Network Scanning | Network scanning techniques |
| 9 | π§ Kali Social Engineering | Social engineering with Kali |
| 10 | π§ Kali Tools List with Short Description | Complete Kali tools reference |
| 11 | π§ CTF Cheat Sheet | Capture The Flag competition cheat sheet |
| 12 | π§ The Ultimate Guide to Flag Hunting | Complete guide to CTF flag hunting strategies |
Protect the backbone of every organization.
| # | Book | Description |
|---|---|---|
| 1 | π Network Attacks and Exploitation | Understanding network attack vectors |
| 2 | π Network Defense: Fundamentals & Protocols | Core network defense concepts |
| 3 | π Network Defense: Perimeter Defense Mechanisms | Perimeter security strategies |
| 4 | π Network Defense: Security & Vulnerability Assessment | Vulnerability assessment techniques |
| 5 | π Network Defense: Security Policy & Threats | Security policies and threat modeling |
| 6 | π Network Defense: Securing & Troubleshooting Network OS | Securing network operating systems |
| 7 | π Network Performance and Security | Balancing performance with security |
| 8 | π Network Safety Certification | Network safety certification guide |
| 9 | π Network Security Through Data | Data-driven network security |
| 10 | π Hacking Exposed: Network Security Secrets & Solutions | Classic network security reference |
| 11 | π Network Security with OpenSSL | OpenSSL for secure communications |
| 12 | π Attacks on TCP | TCP/IP attack vectors and defenses |
| 13 | π CISCO SD-WAN & NAT β Part 1 | Cisco networking & SD-WAN |
| 14 | π Firewall Checklist | Essential firewall configuration checklist |
Understand the enemy to defeat it.
| # | Book | Description |
|---|---|---|
| 1 | π΄ Common Malware Types | Classification of malware families |
| 2 | π΄ Document Malware | Document-based malware analysis |
| 3 | π΄ CyberCrime Espionage | Cyber espionage tactics & defense |
| 4 | π΄ Common Sense Guide to Mitigating Insider Threats, v7 | Insider threat mitigation guide |
| 5 | π΄ Ransomware Defense Report | Ransomware prevention & response |
| 6 | π΄ Control System Defense: Know the Opponent | ICS/SCADA security |
| 7 | π΄ Learn How to Prevent Phishing Attacks | Anti-phishing strategies |
Build security on solid foundations.
| # | Book | Description |
|---|---|---|
| 1 | π NIST Cyber Security Framework β Overview | NIST CSF overview |
| 2 | π NIST Cyber Security Framework | Full NIST CSF guide |
| 3 | π NIST Cybersecurity Framework | Comprehensive NIST reference |
| 4 | π NIST.CSWP.04162018 | NIST special publication |
| 5 | π NIST | General NIST security guide |
| 6 | π OWASP Top 10 Vulnerabilities | OWASP Top 10 reference |
| 7 | π OWASP Top 10 Vulnerabilities (Edition 2) | Updated OWASP Top 10 |
| 8 | π MITRE ATT&CK | MITRE ATT&CK framework |
| 9 | π Zero Trust Architecture | Zero Trust security model |
| 10 | π Shift Left | Shift-left security approach |
| 11 | π Building an Application Security Program | AppSec program development |
The future of security is intelligent.
| # | Book | Description |
|---|---|---|
| 1 | π€ AI in Cybersecurity | AI applications in security |
| 2 | π€ AI Tools in Cybersecurity β 2025 Edition | Latest AI security tools |
| 3 | π€ ChatGPT for CyberSecurity | Leveraging ChatGPT for security |
| 4 | π€ Creatively Malicious Prompt Engineering | Prompt injection & AI security |
| 5 | π€ Natural Language Processing Python | NLP for security applications |
Level up your career with industry-recognized credentials.
| # | Book | Description |
|---|---|---|
| 1 | ποΈ OSCP OffSec Penetration Testing with Kali Linux (2014) | Official OSCP course material |
| 2 | ποΈ OSCP Preparation Guide | Complete OSCP prep guide |
| 3 | ποΈ OSCP Preparation Guide (2) | Additional OSCP preparation |
| 4 | ποΈ OSCP Preparation Guide (3) | More OSCP strategies |
| 5 | ποΈ OSCP Cheat Sheet β Thor-Sec | OSCP quick reference cheatsheet |
| # | Book | Description |
|---|---|---|
| 1 | ποΈ CISSP For Dummies (4th Edition) | CISSP made accessible |
| 2 | ποΈ CISSP Glossary | Complete CISSP terminology |
| # | Book | Description |
|---|---|---|
| 1 | ποΈ CHFIv9 Study Guide | CHFI v9 exam preparation |
| 2 | ποΈ CHFI v01 β Computer Forensics Investigation Procedures & Response | Forensics investigation |
| 3 | ποΈ CHFI v03 β Computer Forensics Investigating Data & Image Files | Data forensics techniques |
| # | Book | Description |
|---|---|---|
| 1 | ποΈ CompTIA Security+ Certification Guide (eBook) | Complete Security+ guide |
| 2 | ποΈ SY0-601 Official Guide | Security+ SY0-601 reference |
| 3 | ποΈ SY0-601 Practice β Egbert (190Q) | Practice exam set 1 |
| 4 | ποΈ SY0-601 Practice β Allen (276Q) | Practice exam set 2 |
| 5 | ποΈ SY0-601 Practice β Hardy (313Q) | Practice exam set 3 |
| 6 | ποΈ SY0-601 Practice β Timothy (269Q) | Practice exam set 4 |
| 7 | ποΈ SY0-601 Practice β Alexander (158Q) | Practice exam set 5 |
| 8 | ποΈ SY0-601 Practice β Rachel (207Q) | Practice exam set 6 |
| 9 | ποΈ SY0-601 Practice β Moses (287Q) | Practice exam set 7 |
| 10 | ποΈ SY0-601 Practice β Newman (204Q) | Practice exam set 8 |
| 11 | ποΈ SY0-601 Practice β Tiffany (169Q) | Practice exam set 9 |
| # | Book | Description |
|---|---|---|
| 1 | ποΈ Complete Guide to CISM Certification | Full CISM preparation guide |
| # | Book | Description |
|---|---|---|
| 1 | ποΈ ITIL 4 Foundation Courseware | ITIL 4 Foundation study material |
Command the terminal like a pro.
| # | Book | Description |
|---|---|---|
| 1 | π₯οΈ +100 Linux Commands | Essential Linux command reference |
| 2 | π₯οΈ Bash Notes For Professionals | Professional Bash scripting |
| 3 | π₯οΈ Linux Bible by Christopher Negus | The definitive Linux guide |
| 4 | π₯οΈ Linux Bash Cheat Sheet | Quick Bash reference |
Code your way through security challenges.
| # | Book | Description |
|---|---|---|
| 1 | β¨οΈ Python Guide | Python for security professionals |
| 2 | β¨οΈ JavaScript by Example (2nd Edition) | JavaScript security concepts |
| 3 | β¨οΈ JS | JavaScript essentials |
The art of intelligence gathering.
| # | Book | Description |
|---|---|---|
| 1 | π OSINT | Open Source Intelligence techniques |
| 2 | π Mining Social Web | Extracting intelligence from social media |
| 3 | π Beef Framework Explained | Browser Exploitation Framework |
| 4 | π Kali Social Engineering | Social engineering with Kali |
Master the tools of the trade.
| # | Book | Description |
|---|---|---|
| 1 | π οΈ SANS Tools | SANS security tools reference |
| 2 | π οΈ Open Source Tools | Open source security tools guide |
| 3 | π οΈ Mastering Nmap Scripting | Advanced Nmap scripting engine |
| 4 | π οΈ 100 Security Operation Center Tools | Essential SOC toolkit |
| 5 | π οΈ cURL Cheat Sheet | Quick reference for cURL commands |
| 6 | π οΈ cURL Command Cheat Sheet | Comprehensive cURL command reference |
Secure communication in the digital age.
| # | Book | Description |
|---|---|---|
| 1 | π Introduction to Cryptography | Cryptography fundamentals |
| 2 | π Navigating Crypto by Binance | Blockchain & cryptocurrency security |
Build your cybersecurity career and stay ahead.
| # | Book | Description |
|---|---|---|
| 1 | π 5 Steps to Get a Job in Cyber Security | Career kickstart guide |
| 2 | π Cybersecurity Career 2026 | Future cybersecurity career paths |
| 3 | π Cybersecurity Portfolio | Building an impressive portfolio |
| 4 | π Cyber Security For CISO/CIO/CTO | Executive security guide |
| 5 | π Cyber Security Practical Training | Hands-on training guide |
| 6 | π Cyber Security Basics | Foundational cybersecurity concepts |
| 7 | π Cross Sector Cybersecurity | Multi-industry security guide |
| 8 | π Cybersecurity Poster | Visual cybersecurity reference |
| 9 | π Cyber Security Russia | Russian cybersecurity landscape |
| 10 | π Major Cybersecurity Focus Areas for 2026 | Emerging security trends |
| 11 | π Small Business Guide β Cyber Security | SMB security essentials |
| 12 | π SaaS Security | SaaS security best practices |
| 13 | π Support Security Provider | Security provider guide |
| 14 | π Infosec | General information security |
| 15 | π Overview | Security overview guide |
| 16 | π AD1027344 | Additional security reference |
| 17 | π CAIQ v4.0.2 STAR Security Questionnaire | Cloud security questionnaire |
Maintaining and growing this collection takes time, effort, and dedication. If this repository has helped you in any way β whether you found a book for your studies, passed a certification, or learned something new β here's how you can give back:
| How to Support | What It Does |
|---|---|
| β Star this repo | Helps others discover this resource β it's free and takes 1 second! |
| π΄ Fork & Share | Spread the word to your cybersecurity community, classmates, and colleagues |
| π Report Issues | Found a broken link or have a suggestion? Open an issue! |
| π Contribute Books | Have a cybersecurity book to add? Submit a Pull Request! |
| π’ Share on Social Media | Tweet about it, post on LinkedIn, share in Discord servers |
| π¬ Give Feedback | Tell me what you'd like to see next β your input shapes this project |
Why does this matter? Every star, fork, and share helps this repository reach more people who need it. There are students around the world who can't afford cybersecurity books. Your small action of starring or sharing this repo could be the reason someone discovers their passion for security and starts a career that protects millions.
A small β from you = A giant leap for someone starting their cybersecurity journey.
Contributions are welcome! If you have cybersecurity books or resources to add:
- Fork this repository
- Add your resource to the appropriate category
- Update the README with the book details
- Submit a Pull Request
Please ensure all resources are freely distributable and do not violate any copyright.
| π€ Author | Muhammad Izaz Haider |
| π Portfolio | mizazhaider-ceh.dev |
| π Powered By | The PenTrix |
| β GitHub | mizazhaider-ceh |
π From Muhammad Izaz Haider & Powered by The PenTrix
If you find this repository helpful, please consider giving it a β
It motivates me to keep adding more resources for the community!