Hacking: The Art of Exploitation The Shellcoder’s Handbook Introduction to Software Exploitation Reverse Engineering for Beginners Modern Operating Systems Kali Linux in action. Information systems security audit. (RU) Cybersecurity Ops with bash Cybersecurity – Attack and Defense Strategies Practical Malware Analysis Binary Exploitation Notes CTF Field Guide https://github.com/s1gh/ctf-literature