Skip to content

mizazhaider-ceh/Security-Books

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

170 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

Security Books

πŸ›‘οΈ Security Books β€” The Ultimate Cybersecurity Library

A Massive, Curated Collection of 160+ Cybersecurity Books, Guides & Resources

GitHub stars GitHub forks GitHub issues License Made with Love Powered By


"Knowledge is the most powerful weapon in cybersecurity."

This repository is a one-stop library for anyone passionate about Cybersecurity, Ethical Hacking, Penetration Testing, Network Defense, Bug Bounty, Red Teaming, Blue Teaming, OSINT, Digital Forensics, and much more. Whether you're a beginner breaking into cybersecurity or a seasoned professional sharpening your skills β€” this collection has something for everyone.

πŸ“– Click on any book name to open/download it directly!


πŸ“‹ Table of Contents


🎯 About

Welcome to Security-Books β€” a carefully curated, categorized collection of 160+ cybersecurity PDFs covering everything from foundational concepts to advanced exploitation techniques.

πŸ”₯ What makes this repo special?

Feature Description
πŸ“š 160+ Resources One of the largest open collections of security books on GitHub
🏷️ Fully Categorized Every book organized into clear, logical categories
πŸ”— Clickable Links Click any book name to open/download it instantly
πŸŽ“ All Skill Levels From absolute beginner to advanced red teamer
πŸ†“ 100% Free Open access for the entire cybersecurity community
πŸ”„ Regularly Updated New resources added frequently

πŸ’‘ Why I Made This

"I believe cybersecurity knowledge should be accessible to everyone β€” not locked behind paywalls."

When I started my journey in cybersecurity, I spent countless hours searching the internet for quality learning material. Books were scattered across random websites, some behind paywalls, others buried in obscure forums. I wished there was one single place where I could find everything I needed β€” organized, categorized, and ready to read.

So I built it myself.

This repository is the resource I wish I had when I started. It's for:

  • πŸŽ“ Students who can't afford expensive textbooks but are hungry to learn
  • πŸ’Ό Career switchers who need a solid foundation before their first security role
  • πŸ”¬ Researchers who need quick access to reference material
  • πŸ† Certification seekers preparing for CEH, OSCP, CISSP, CompTIA, and more
  • 🌍 The global community β€” especially those in regions where access to quality resources is limited

I've personally gone through many of these books during my own CEH journey and professional experience. Every book here has been handpicked because it provides real, practical value.

My goal is simple: Remove barriers to cybersecurity education and help the next generation of security professionals get started β€” no matter where they are or what their background is.


πŸ› Bug Bounty & Web Security

Master the art of finding vulnerabilities and earning bounties.

# Book Description
1 πŸ“• Bug Bounty Bootcamp Complete bootcamp for aspiring bug bounty hunters
2 πŸ“• Bug Bounty Checklist for Web App Essential checklist for web application testing
3 πŸ“• Bug Bounty Hunting Comprehensive guide to bug bounty hunting
4 πŸ“• Bug Bounty Methodology Step-by-step methodology for finding bugs
5 πŸ“• Bug Bounty PlayBook Strategic playbook for bounty programs
6 πŸ“• Bug Bounty Playbook (Ghostlulz) Ghostlulz's legendary bug bounty playbook
7 πŸ“• Bug Bounty Playbook V2 Updated V2 edition of the bug bounty playbook
8 πŸ“• Bug Bounty Roadmap Complete roadmap from beginner to pro
9 πŸ“• Bug Bounty Hunting Essentials Essential skills for successful bug bounty hunting
10 πŸ“• Bug Bounty Tools Collection Curated collection of bug bounty tools
11 πŸ“• Awesome Bugbounty Writeups Collection of amazing bug bounty writeups
12 πŸ“• A Bug Hunter's Diary Real-world bug hunting stories & techniques
13 πŸ“• Bug Hunting Guide Practical guide to hunting bugs
14 πŸ“• Big Bounty Advanced bounty hunting strategies
15 πŸ“• Top 100 Bugs Top 100 most common bugs & vulnerabilities
16 πŸ“• Web Application Hacking Web app exploitation techniques
17 πŸ“• Web Application Pen Test Web application penetration testing
18 πŸ“• Web Application Testing Comprehensive web testing guide
19 πŸ“• Web Application Penetration Testing Complete web app pentesting methodology
20 πŸ“• Web Testing Security Guide Security-focused web testing
21 πŸ“• Web Hacking Arsenal Web hacking tools & arsenal by Rafay Baloch
22 πŸ“• Web Hacking Arsenal β€” A Practical Guide to Modern Web Pentesting Modern web pentesting practical guide
23 πŸ“• Web Hacking Arsenal β€” Practical Guide (Standalone) Standalone edition by Rafay Baloch
24 πŸ“• WebPenTestKali Web penetration testing with Kali
25 πŸ“• 100 Web PenTesting Checklist 100-point web penetration testing checklist
26 πŸ“• API Security Threats Understanding and mitigating API vulnerabilities
27 πŸ“• Advance XSS Advanced Cross-Site Scripting techniques
28 πŸ“• XSS Cheat Sheet Quick reference for XSS payloads & bypasses
29 πŸ“• Types of Sensitive Information Identifying & classifying sensitive data
30 πŸ“• eLearnSecurity eWPT Notes eWPT certification study notes
31 πŸ“• Web Agents Inject Web agent injection techniques
32 πŸ“• Pentesting With Burp Suite Master Burp Suite for web testing

πŸ’€ Ethical Hacking & Penetration Testing

Learn to think like a hacker β€” ethically.

# Book Description
1 πŸ“— Learn Ethical Hacking from Scratch Start your ethical hacking journey
2 πŸ“— Ethical Hacking and Penetration Testing Guide Comprehensive guide by Rafay Baloch
3 πŸ“— Certified Ethical Hacker (CEH) v3.0 Official Course Official CEH course material
4 πŸ“— CEH v03 β€” Ethical Hacking & Countermeasures: Web Apps & Data CEH web application module
5 πŸ“— CEH Brochure CEH certification overview
6 πŸ“— GenAI Ethical Hacking Generative AI meets ethical hacking
7 πŸ“— Hacking Project To Get Started Hands-on hacking projects
8 πŸ“— Coding for Penetration Testers Building better pentesting tools
9 πŸ“— Network Pen Test Network penetration testing
10 πŸ“— AD Pen Test Active Directory penetration testing
11 πŸ“— Pentest Handwriting Notes Hand-written pentesting notes & cheatsheets
12 πŸ“— Gray Hat Hacking (4th Edition) Advanced gray hat techniques
13 πŸ“— Hacking Exposed Linux (3rd Edition) Linux exploitation techniques
14 πŸ“— Hacking Gmail (ExtremeTech) Email exploitation techniques
15 πŸ“— AC DER BY PASS TECH.HACKERS Access control bypass techniques
16 πŸ“— Offensive Security Professional Overview Survival OffSec professional guide
17 πŸ“— Week 1 β€” Intro to Pentesting Beginner-friendly intro to penetration testing

🏴 Red Teaming

Simulate real-world adversaries to strengthen defenses.

# Book Description
1 πŸ“™ Red Teaming Handbook Comprehensive red team operations guide
2 πŸ“™ What Can Generative AI Red Teaming Learn from Cyber Red Teaming AI-powered red teaming insights

πŸ”΅ Blue Team & SOC

Defend, detect, and respond to cyber threats.

# Book Description
1 πŸ“˜ 100 Security Operation Center Tools Essential SOC tools reference
2 πŸ“˜ Blue Team Cheat Sheet Quick reference for blue teamers
3 πŸ“˜ Detection Tool Threat detection tools & techniques
4 πŸ“˜ Windows Event Log Analysis Master Windows event log forensics
5 πŸ“˜ Ransomware Defense Report Defending against ransomware attacks

πŸ‰ Kali Linux

The ultimate penetration testing distribution β€” mastered.

# Book Description
1 🐧 Kali Linux For Hackers Kali Linux hacking essentials
2 🐧 Kali Wireless Wireless hacking with Kali
3 🐧 Kali Advanced Pentest Advanced penetration testing with Kali
4 🐧 Kali Linux Core Kali Linux guide
5 🐧 Kali Linux CookBook Recipes for everyday Kali usage
6 🐧 Kali Linux CTF Capture The Flag challenges with Kali
7 🐧 Kali Linux Revealed Official Kali Linux documentation
8 🐧 Kali Network Scanning Network scanning techniques
9 🐧 Kali Social Engineering Social engineering with Kali
10 🐧 Kali Tools List with Short Description Complete Kali tools reference
11 🐧 CTF Cheat Sheet Capture The Flag competition cheat sheet
12 🐧 The Ultimate Guide to Flag Hunting Complete guide to CTF flag hunting strategies

🌐 Network Security & Defense

Protect the backbone of every organization.

# Book Description
1 🌍 Network Attacks and Exploitation Understanding network attack vectors
2 🌍 Network Defense: Fundamentals & Protocols Core network defense concepts
3 🌍 Network Defense: Perimeter Defense Mechanisms Perimeter security strategies
4 🌍 Network Defense: Security & Vulnerability Assessment Vulnerability assessment techniques
5 🌍 Network Defense: Security Policy & Threats Security policies and threat modeling
6 🌍 Network Defense: Securing & Troubleshooting Network OS Securing network operating systems
7 🌍 Network Performance and Security Balancing performance with security
8 🌍 Network Safety Certification Network safety certification guide
9 🌍 Network Security Through Data Data-driven network security
10 🌍 Hacking Exposed: Network Security Secrets & Solutions Classic network security reference
11 🌍 Network Security with OpenSSL OpenSSL for secure communications
12 🌍 Attacks on TCP TCP/IP attack vectors and defenses
13 🌍 CISCO SD-WAN & NAT β€” Part 1 Cisco networking & SD-WAN
14 🌍 Firewall Checklist Essential firewall configuration checklist

🦠 Malware, Threats & Incident Response

Understand the enemy to defeat it.

# Book Description
1 πŸ”΄ Common Malware Types Classification of malware families
2 πŸ”΄ Document Malware Document-based malware analysis
3 πŸ”΄ CyberCrime Espionage Cyber espionage tactics & defense
4 πŸ”΄ Common Sense Guide to Mitigating Insider Threats, v7 Insider threat mitigation guide
5 πŸ”΄ Ransomware Defense Report Ransomware prevention & response
6 πŸ”΄ Control System Defense: Know the Opponent ICS/SCADA security
7 πŸ”΄ Learn How to Prevent Phishing Attacks Anti-phishing strategies

πŸ›οΈ Frameworks & Compliance (NIST, OWASP, MITRE)

Build security on solid foundations.

# Book Description
1 πŸ“ NIST Cyber Security Framework β€” Overview NIST CSF overview
2 πŸ“ NIST Cyber Security Framework Full NIST CSF guide
3 πŸ“ NIST Cybersecurity Framework Comprehensive NIST reference
4 πŸ“ NIST.CSWP.04162018 NIST special publication
5 πŸ“ NIST General NIST security guide
6 πŸ“ OWASP Top 10 Vulnerabilities OWASP Top 10 reference
7 πŸ“ OWASP Top 10 Vulnerabilities (Edition 2) Updated OWASP Top 10
8 πŸ“ MITRE ATT&CK MITRE ATT&CK framework
9 πŸ“ Zero Trust Architecture Zero Trust security model
10 πŸ“ Shift Left Shift-left security approach
11 πŸ“ Building an Application Security Program AppSec program development

πŸ€– AI & Machine Learning in Cybersecurity

The future of security is intelligent.

# Book Description
1 πŸ€– AI in Cybersecurity AI applications in security
2 πŸ€– AI Tools in Cybersecurity β€” 2025 Edition Latest AI security tools
3 πŸ€– ChatGPT for CyberSecurity Leveraging ChatGPT for security
4 πŸ€– Creatively Malicious Prompt Engineering Prompt injection & AI security
5 πŸ€– Natural Language Processing Python NLP for security applications

πŸ“œ Certifications (CEH, OSCP, CISSP, CHFI, CompTIA, CISM)

Level up your career with industry-recognized credentials.

πŸ… OSCP β€” Offensive Security Certified Professional

# Book Description
1 πŸŽ–οΈ OSCP OffSec Penetration Testing with Kali Linux (2014) Official OSCP course material
2 πŸŽ–οΈ OSCP Preparation Guide Complete OSCP prep guide
3 πŸŽ–οΈ OSCP Preparation Guide (2) Additional OSCP preparation
4 πŸŽ–οΈ OSCP Preparation Guide (3) More OSCP strategies
5 πŸŽ–οΈ OSCP Cheat Sheet β€” Thor-Sec OSCP quick reference cheatsheet

πŸ… CISSP β€” Certified Information Systems Security Professional

# Book Description
1 πŸŽ–οΈ CISSP For Dummies (4th Edition) CISSP made accessible
2 πŸŽ–οΈ CISSP Glossary Complete CISSP terminology

πŸ… CHFI β€” Computer Hacking Forensic Investigator

# Book Description
1 πŸŽ–οΈ CHFIv9 Study Guide CHFI v9 exam preparation
2 πŸŽ–οΈ CHFI v01 β€” Computer Forensics Investigation Procedures & Response Forensics investigation
3 πŸŽ–οΈ CHFI v03 β€” Computer Forensics Investigating Data & Image Files Data forensics techniques

πŸ… CompTIA Security+

# Book Description
1 πŸŽ–οΈ CompTIA Security+ Certification Guide (eBook) Complete Security+ guide
2 πŸŽ–οΈ SY0-601 Official Guide Security+ SY0-601 reference
3 πŸŽ–οΈ SY0-601 Practice β€” Egbert (190Q) Practice exam set 1
4 πŸŽ–οΈ SY0-601 Practice β€” Allen (276Q) Practice exam set 2
5 πŸŽ–οΈ SY0-601 Practice β€” Hardy (313Q) Practice exam set 3
6 πŸŽ–οΈ SY0-601 Practice β€” Timothy (269Q) Practice exam set 4
7 πŸŽ–οΈ SY0-601 Practice β€” Alexander (158Q) Practice exam set 5
8 πŸŽ–οΈ SY0-601 Practice β€” Rachel (207Q) Practice exam set 6
9 πŸŽ–οΈ SY0-601 Practice β€” Moses (287Q) Practice exam set 7
10 πŸŽ–οΈ SY0-601 Practice β€” Newman (204Q) Practice exam set 8
11 πŸŽ–οΈ SY0-601 Practice β€” Tiffany (169Q) Practice exam set 9

πŸ… CISM β€” Certified Information Security Manager

# Book Description
1 πŸŽ–οΈ Complete Guide to CISM Certification Full CISM preparation guide

πŸ… ITIL

# Book Description
1 πŸŽ–οΈ ITIL 4 Foundation Courseware ITIL 4 Foundation study material

🐧 Linux & Bash

Command the terminal like a pro.

# Book Description
1 πŸ–₯️ +100 Linux Commands Essential Linux command reference
2 πŸ–₯️ Bash Notes For Professionals Professional Bash scripting
3 πŸ–₯️ Linux Bible by Christopher Negus The definitive Linux guide
4 πŸ–₯️ Linux Bash Cheat Sheet Quick Bash reference

πŸ’» Programming for Security

Code your way through security challenges.

# Book Description
1 ⌨️ Python Guide Python for security professionals
2 ⌨️ JavaScript by Example (2nd Edition) JavaScript security concepts
3 ⌨️ JS JavaScript essentials

πŸ•΅οΈ OSINT & Social Engineering

The art of intelligence gathering.

# Book Description
1 πŸ” OSINT Open Source Intelligence techniques
2 πŸ” Mining Social Web Extracting intelligence from social media
3 πŸ” Beef Framework Explained Browser Exploitation Framework
4 πŸ” Kali Social Engineering Social engineering with Kali

πŸ”§ Security Tools & Frameworks

Master the tools of the trade.

# Book Description
1 πŸ› οΈ SANS Tools SANS security tools reference
2 πŸ› οΈ Open Source Tools Open source security tools guide
3 πŸ› οΈ Mastering Nmap Scripting Advanced Nmap scripting engine
4 πŸ› οΈ 100 Security Operation Center Tools Essential SOC toolkit
5 πŸ› οΈ cURL Cheat Sheet Quick reference for cURL commands
6 πŸ› οΈ cURL Command Cheat Sheet Comprehensive cURL command reference

πŸ” Cryptography & Blockchain

Secure communication in the digital age.

# Book Description
1 πŸ”‘ Introduction to Cryptography Cryptography fundamentals
2 πŸ”‘ Navigating Crypto by Binance Blockchain & cryptocurrency security

πŸ“Š Career, Strategy & Miscellaneous

Build your cybersecurity career and stay ahead.

# Book Description
1 πŸš€ 5 Steps to Get a Job in Cyber Security Career kickstart guide
2 πŸš€ Cybersecurity Career 2026 Future cybersecurity career paths
3 πŸš€ Cybersecurity Portfolio Building an impressive portfolio
4 πŸš€ Cyber Security For CISO/CIO/CTO Executive security guide
5 πŸš€ Cyber Security Practical Training Hands-on training guide
6 πŸš€ Cyber Security Basics Foundational cybersecurity concepts
7 πŸš€ Cross Sector Cybersecurity Multi-industry security guide
8 πŸš€ Cybersecurity Poster Visual cybersecurity reference
9 πŸš€ Cyber Security Russia Russian cybersecurity landscape
10 πŸš€ Major Cybersecurity Focus Areas for 2026 Emerging security trends
11 πŸš€ Small Business Guide β€” Cyber Security SMB security essentials
12 πŸš€ SaaS Security SaaS security best practices
13 πŸš€ Support Security Provider Security provider guide
14 πŸš€ Infosec General information security
15 πŸš€ Overview Security overview guide
16 πŸš€ AD1027344 Additional security reference
17 πŸš€ CAIQ v4.0.2 STAR Security Questionnaire Cloud security questionnaire

⭐ Star History

Star History Chart


πŸ’– Support This Project

Every small act of support makes a BIG difference! πŸ™Œ

Maintaining and growing this collection takes time, effort, and dedication. If this repository has helped you in any way β€” whether you found a book for your studies, passed a certification, or learned something new β€” here's how you can give back:

How to Support What It Does
⭐ Star this repo Helps others discover this resource β€” it's free and takes 1 second!
🍴 Fork & Share Spread the word to your cybersecurity community, classmates, and colleagues
πŸ› Report Issues Found a broken link or have a suggestion? Open an issue!
πŸ“š Contribute Books Have a cybersecurity book to add? Submit a Pull Request!
πŸ“’ Share on Social Media Tweet about it, post on LinkedIn, share in Discord servers
πŸ’¬ Give Feedback Tell me what you'd like to see next β€” your input shapes this project

Why does this matter? Every star, fork, and share helps this repository reach more people who need it. There are students around the world who can't afford cybersecurity books. Your small action of starring or sharing this repo could be the reason someone discovers their passion for security and starts a career that protects millions.

A small ⭐ from you = A giant leap for someone starting their cybersecurity journey.


🀝 Contributing

Contributions are welcome! If you have cybersecurity books or resources to add:

  1. Fork this repository
  2. Add your resource to the appropriate category
  3. Update the README with the book details
  4. Submit a Pull Request

Please ensure all resources are freely distributable and do not violate any copyright.


πŸ“¬ Connect

πŸ‘€ Author Muhammad Izaz Haider
🌐 Portfolio mizazhaider-ceh.dev
πŸš€ Powered By The PenTrix
⭐ GitHub mizazhaider-ceh

πŸ’œ From Muhammad Izaz Haider & Powered by The PenTrix


If you find this repository helpful, please consider giving it a ⭐

It motivates me to keep adding more resources for the community!


About

πŸ›‘οΈ The Ultimate Cybersecurity Library | 160+ curated books, guides & resources covering Ethical Hacking, Penetration Testing, Bug Bounty, Red/Blue Team, OSINT, Malware Analysis, CEH, OSCP, CISSP, CHFI, Network Security, Kali Linux, Web Security & more. Free, organized, and clickable. Knowledge should be accessible to everyone.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages