- Blue Team Field Manual (BTFM)
- RTFM: Red Team Field Manual
- PTFM: Purple Team Field Manual
- LFM: Linux Field Manual
- Cyber Threat Intelligence Field Manual
- Black Hat Python, 2nd Edition: Python Programming for Hackers and Pentesters
- Black Hat Go: Go Programming For Hackers and Pentesters
- Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
- The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
- Real-World Bug Hunting: A Field Guide to Web Hacking
- Bug Bounty Bootcamp: Learn to Report Vulnerabilities
- Black Hat GraphQL: Attacking the Next Generation API
- Hacking APIs: Security Testing of Application Programming Interfaces
- Network Basics for Hackers: Getting Started with Networking
- Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
- Red Team Development and Operations: A practical guide
- Penetration Testing: A Hands-On Introduction to Hacking
- Metasploit: The Penetration Tester's Guide, 2nd Edition
- Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition
- Evading EDR: The Definitive Guide to Detecting and Defeating Detection
- Social Engineering: The Science of Human Hacking
- The Car Hacker's Handbook: A Guide for the Penetration Tester
- Hacking Multifactor Authentication
- Hardware Hacking: Have Fun While Voiding Your Warranty
- Reversing: Secrets of Reverse Engineering
- Practical Reverse Engineering: Reversing, Obfuscation, and Analysis of Executable Code
- The IDA Pro Book
- The Art of Assembly Language
- Practical Reverse Engineering
- The Art of Memory Forensics
- Hacking: The Art of Exploitation
- Fuzzing for Software Security
- Art of Software Security Assessment
- The Antivirus Hacker’s Handbook
- The Rootkit Arsenal
- Windows Internals Part 1 Part 2
- Inside Windows Debugging
- iOS Reverse Engineering
- Mastering Malware Analysis: The complete malware analyst's guide to combating cybercrime
- Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
- Malware Analyst’s Cookbook
- Malware Data Science: Attack Detection and Attribution
- VX Underground Black Mass: Volume 1
- VX Underground Black Mass: Volume 2
- Effective Threat Investigation for SOC Analysts
- Blue Team Handbook: Condensed Field Manual for Cybersecurity Operations
- Visual Cyber Threat Intelligence: An Illustrated Guide for Researchers
- OSINT Techniques: Resources for Uncovering Information
- Serious Cryptography: A Practical Introduction to Modern Encryption
- The Operator Handbook: A Team OSINT Reference Guide