Essential Books, Tools
Essential Books, Tools
HACKERS' TOOLKIT: You Need is a curated PDF resource packed with top
hacking books, programming tutorials, and essential tools
for all skill levels.
ESSENTIAL BOOKS, TOOLS
& PROGRAMMING
RESOURCES By
Abdul Wahab Junaid
For Contact Me
Subscribe to Mailing List
Instagram
Youtube
Github
Facebook
https://www.reddit.com/user/aw-junaid/
http://twitter.com/awJunaid_
https://vk.com/aw.junaid/
https://buymeacoffee.com/awjunaid/
https://www.instagram.com/awjunaid_
https://www.twitch.tv/awjunaid
Books Link:
Ethical Hacking
Bug Bounty
Malware Development
Algorithms
Android Security
Arm - Assembly
Bash Scripting
Black Hat Hacking
Buffer Over Flow
Books by Dummies
C & C++
CCNA & Security
Computer Circuits
Computer Forensics
Books for Computer Scientist
Cryptography & Blockchain
Dart & Flutter
Database & Server
Docker
Embedded System
Extra Books
Git
Golang
Hacking Articles 0
Hacking Articles 1
Hacking Articles 2
Hacking Articles 3
Hacking Extra
Java
Linux
Machine Learning & AI
Computer Networking
Operating System
Penetration Testing
Phishing Attacks
PHP
Python
Ransomware
RedHat
Ruby
Rust
Social Engineering
SQL Injection
Web Attacks
Backend, Framework and Hosting
Game Development
Head First Books
Html & CSS
JavaScript
Mobile App Development
Programming Language Theory
R Programming
Random Programming Books
Scala
Server & Hosting
TypeScript
Anime Girls Holding Books Pics
IDS/IPS Identification
Vulnerability Search
SPLOITUS: Sploitus is а convenient central place for identifying the newest exploits and
finding attacks that exploit known vulnerabilities
SearchSploit: The official Exploit Database repository
Getsploit: - Command line utility for searching and downloading exploits
Houndsploit: - An advanced graphical search engine for Exploit-DB
OSV: Open source vulnerability DB and triage service.
Route Analysis
SMB Analysis
SNMP Analysis
SSL Analysis
Online Attacks
Exploitation Tools
crackmapexec: Post-exploitation and network attack tool.
metasploit-framework: Comprehensive exploitation framework.
msfpc: Metasploit Payload Creator.
searchsploit: Offline search tool for Exploit-DB.
setoolkit: Social Engineering Toolkit.
sqlmap: SQL injection exploitation tool.
Cross-site Scripting(XSS)
Sql Injection
Sqlmap: Automatic SQL injection and database takeover tool
SSQLInjection: SSQLInjection is a SQL injection tool , support
Access/MySQL/SQLServer/Oracle/PostgreSQL/DB2/SQLite/Informix Database.
Jsql-injection: jSQL Injection is a Java application for automatic SQL database
injection.
NoSQLMap: Automated NoSQL database enumeration and web application
exploitation tool.
Sqlmate: A friend of SQLmap which will do what you always expected from SQLmap
SQLiScanner: Automatic SQL injection with Charles and sqlmap api
sql-injection-payload-list: SQL Injection Payload List
Advanced-SQL-Injection-Cheatsheet: A cheat sheet that contains advanced
queries for SQL Injection of all types.
Command Injection
File Include
XXEinjector: Tool for automatic exploitation of XXE vulnerability using direct and
different out of band methods
Oxml_xxe: A tool for embedding XXE/XML exploits into different filetypes
Exploit Framework
Post Exploitation
dbd: Simple reverse shell connection tool.
powersploit: PowerShell post-exploitation framework.
sbd: Backdoor for reverse shells.
dns2tcpc: DNS tunneling tool.
exe2hex: Convert executables to hex.
iodine-client-start: DNS tunneling client.
miredo: Teredo tunneling client.
proxychains: Tool to route connections through proxies.
proxytunnel: Tunnels traffic over HTTP proxies.
ptunnel: ICMP-based TCP tunneling tool.
pwnat: NAT traversal tool.
sslh: Multi-protocol service handling over a single port.
stunnel4: SSL tunneling tool.
udptunnel: UDP tunneling over TCP.
laudanum: Web-based backdoors.
weevely: PHP web shell.
evil-winrm: Post-exploitation tool for WinRM.
Forensics Tools
magicrescue: Recover files by signature recognition.
scalpel: File carving tool.
scrounge-ntfs: NTFS file recovery tool.
guymager: Disk imaging tool.
pdf-parser: Tool for analyzing PDF files.
pdfid: Tool for checking PDF security.
autopsy: Digital forensics platform.
binwalk: Firmware analysis tool.
bulk_extractor: Extracts features from digital evidence.
hashdeep: Recursive directory hashing tool.
Reporting Tools
cherrytree: Hierarchical note-taking application.
cutycapt: Web page capture tool.
pipal: Password analysis tool.
Code Audit
Cloc: cloc counts blank lines, comment lines, and physical lines of source code in
many programming languages
Cobra: Source Code Security Audit
Cobra-W: Cobra for white hat
Graudit: Grep rough audit - source code auditing tool
Rips: A static source code analyser for vulnerabilities in PHP scripts
Kunlun-M: KunLun-M is a static code analysis system that automates the detecting
vulnerabilities and security issue.
Semgrep: Semgrep is a fast, open-source, static analysis engine for finding bugs,
detecting vulnerabilities in third-party dependencies, and enforcing code standards.
Intranet penetration
Service Detection
Netspy: A tool to quickly detect the reachable network segments of the intranet.
Cube: Intranet penetration testing tools, weak password blasting, information
collection and vulnerability scanning.
RootKit
Beurk: BEURK Experimental Unix RootKit
Bedevil: LD_PRELOAD Linux rootkit (x86 & ARM)
Audit Tools
DevAudit: Open-source, cross-platform, multi-purpose security auditing tool
Cyber Range
Vulnerability application
Simulation Range
Honeyhots
CTF challenges
Vulnhub: VulnHub provides materials allowing anyone to gain practical hands-on
experience with digital security, computer applications and network administration
TryHackMe: TryHackMe is a free online platform for learning cyber security, using
hands-on exercises and labs, all through your browser!
Hackthebox: Hack The Box is a massive, online cybersecurity training platform,
allowing individuals, companies, universities and all kinds of organizations around the
world to level up their hacking skills.
Root Me: Root Me allows everyone to test and improve their knowledge in computer
security and hacking.
Pentestit: Penetration testing laboratories "Test lab" emulate an IT infrastructure of
real companies and are created for a legal pen testing and improving penetration
testing skills
Pentesterlab: Learn Web Penetration Testing: The Right Way
Cyberseclabs: At CyberSecLabs, we aim to provide secure, high-quality training
services that allow information security students the opportunity to safely learn and
practice penetration testing skills.
Web Security Academy: Free, online web security training from the creators of Burp
Suite
Vulnmachines: A place to learn and improve penetration testing/ethical hacking
skills for FREE
Excellent project
This initial version of the Tech Tree will consist almost entirely of copies of pre-existing
works, none of which were written for an unknown audience a long way into the future. As
such it is not so much a guide as a collection of resources that we hope will be historically
interesting and/or useful. We have tried to strike a balance between abstract/theoretical
and concrete/practical work, and to provide at least an overview of the entire technical
stack on which modern software engineering rests.
The current iteration of the Tech Tree is loosely divided into the following thirteen
sections:
1. Fundamentals of computing and the Internet: the essentials of how computers work,
and, at least as important to today's world, how they are connected together into a
single planetary network which includes most of the computers on Earth.
2. Algorithms and data structures: processes, sets of rules, and methods of arranging
data to solve common categories of problems in efficient ways. Metaphorically,
algorithms are the intelligence in a software program, and data structures are its
storage.
3. Compilers, assembler, and operating systems: how written source code becomes
the machine code which causes the electrical signals inside a computer to change in
a controlled manner, and the theory of operating systems, the software which
supports a computer's basic functions and provides the fundamental, low-level
functionality that all other software ultimately calls upon.
4. Programming languages: some of the world's most popular and widely used
programming languages described in detail. While, fundamentally, any program can
be written in any language, certain languages are better or worse at particular tasks.
5. Networking and connectivity: how computers connect to one another, via physical
wires and radio signals, both one-on-one and in larger networks. Includes
descriptions of the structure of the global "network of networks" known as the Internet,
which connects most of the computers on Earth.
6. Modern software development: the processes and procedures of dealing with
software projects, tools, and services at scale, with constant monitoring and
communication, at assured levels of quality.
7. Modern software applications: in-depth description of applications such as Web
development (the Web is, essentially, that part of the Internet used to display output
and receive input from human beings); scientific research and analysis; image
processing; pattern recognition and generation via neural networks; software
distributed across many different computers; cryptocurrencies, which can be used as
a platform for trustless decentralized software; and the new field of quantum
computing.
8. Hardware architectures: the concepts, structures, and layout of computer hardware.
Hardware refers to physical electronic components; hardware architecture refers to
how those components are structured and connected in order to run software; and
software ultimately becomes ephemeral patterns of electricity within those physical
components.
9. Hardware development: how to build simple computers from collections of
electronic components.
10. Electronic components, transistors, semiconductor manufacturing: those
electronic components which predated computers, along with individual transistors,
the component from which computers are made, and an overview of the
technologies and processes of fabricating interconnected transistors at scale.
11. Pre-industrial technologies: technologies of eras which predated electricity.
12. Fiction, culture, and history: human histories and changing human cultures, mostly
through the lens of celebrated fictional narratives written over the last 150 years.
13. Cultural context: information about humanity at the time the Tech Tree was created;
in particular, a snapshot of Wikipedia, a collectively generated repository of all sorts of
information about our world. Due to Wikipedia's enormous size, this section is provided
as encoded data, like the rest of the archive, rather than as visual/readable pages.
The first seven sections are devoted to software, the purpose and content of the GitHub
Arctic Code Vault, and its uses and applications. The next four sections describe the
technologies required to construct computers on which software might run. The
remaining two are intended to illustrate the human context in which these technologies
have been developed, the stories the cultures of our era told, the languages in which we
told them, and the factual background and descriptions of the world in which we lived.
The Tech Tree is part of the much larger GitHub Arctic Code Vault. As such, it also includes,
as an appendix, visual copies of the Guide to the GitHub Code Vault, along with an index
of the archive's fifteen thousand most significant code repositories, including brief
descriptions and locations within the archive.
It is perhaps worth noting that our advisory board stressed that ours is likely to be the
best-documented era in human history by far, so bundling the Tech Tree with the archive
is likely to be more convenient than essential for its inheritors. As such, it is entirely
possible -- indeed quite likely -- that its value will consist largely of providing context
regarding the era and culture in which the archive was created, rather than as a source of
new and unavailable knowledge, though of course there are imaginable futures in which
it plays the latter role.
What follows is a brief summary of each section, describing both the general topics it
covers, and the works the Tech Tree includes to document our current understanding of
those topics.
Programming languages
There are hundreds of programming languages; the enormous chart visualizing their
evolution at the Computer History Museum is worth visiting if you're a developer, and we
don't intend to document them all. Still, accessible book-length descriptions of a selection
of the world's major languages seems desirable.
Working in Public: The Making and Maintenance of Open Source Software by Nadia
Eghbal (Stripe Press) /
The Manager's Path by Camille Fournier (O'Reilly)
The Missing README by Chris Riccomini and Dmitriy Ryaboy (No Starch)
Learning Agile by Andrew Stellman and Jennifer Greene (O'Reilly)
Professional Git by Brent Laster (Wiley)
Tangled Web: A Guide to Securing Modern Web Applications by Michal Zalewski (No
Starch)
Metasploit by David Kennedy, Jim O'Gorman, Devon Kearns, and Mati Aharoni (No
Starch)
Effective DevOps by Jennifer Davis and Ryn Daniels (O'Reilly)
Site Reliability Engineering edited by Betsy Beyer, Chris Jone, Jennifer Petoff & Niall
Richard Murphy (O'Reilly)
Designing Distributed Systems by Brendan Burns (O'Reilly)
Designing Data-Intensive Applications by Martin Kleppmann (O'Reilly)
Exercises in Programming Style by Cristina Videira Lopes (CRC Press)
Web development
Machine learning
The Economics of Information Technology by Hal Varian, Joseph Farrell and Carl
Shapiro (Cambridge University Press)
Mastering Bitcoin by Andreas Antonopoulos
Hardware architectures
The spectrum of complexity from a single analog transistor to a modern multicore
processor is, needless to say, difficult to summarize. This section tries to describe the
basics of digital circuits and microprocessors, along with a few key references, before
going on to hardware architectures and hardware design languages.
HDLs
Hardware development
Digital Computer Electronics by Albert P. Malvino and Jerald A Brown (Career
Education)
Computer Time Travel by JS Walker (Oldfangled)
Theory, Design, and Applications of Unmanned Aerial Vehicles by A.R. Jha (CRC Press)
Modern Robotics by Kevin Lynch and Frank Park (Cambridge University Press)
Mastering ROS for Robotics Programming by Lentin Joseph (Packt)
Pre-industrial technologies
These are the works which address the "romantic catastrophe" image of the archive's
inheritors, who seek to reboot all of modern technological civilization from pre-industrial
scratch. Such possible futures do exist, although they seem unlikely; furthermore, it seems
possible that these works might help fill in gaps which arise in historical knowledge.
Cultural context
This section of the Tech Tree is intended to convey both useful practical information from
our culture, and a depiction of what it was like at the time the archive was written. It will
consist of encoded data, rather than imaged pages, largely because its centerpiece, a
snapshot of Wikipedia, is far too large for the latter format.
Wikipedia, while not without its flaws and omissions, is the most readily available proxy for
"a written summary of our world." Note that this section is by no means intended as a
complete depiction of humanity today: as our advisors stressed, this era is likely to be the
best documented in all of human history, and such information is very unlikely to be
difficult to find. Rather, it is intended as a convenience to indicate to the archive's
inheritors the specific, particular context of the era in which the archive was written.