// ls products/

Product Store

73 resources available · members get 20% off everything

// members_discount

⚡ Get 20% off everything — from $8/month

Starter $8/mo — 20% off all products Elite $12/mo — full library + Discord
SSH Pentesting Playbook
FREE
FEATURED

SSH Pentesting Playbook

Your complete field guide to SSH security assessment — enumeration, brute-forcing, key attacks, tunneling abuse, and post-exploitation pivoting.

#ssh#pentesting#free
FREE
→ get it
Wfuzz Field Guide
FREE
FEATURED

Wfuzz Field Guide

The definitive Wfuzz reference for bug bounty hunters and pentesters — every option, filter, and payload type explained with real-world attack examples.

#wfuzz#fuzzing#web
FREE
→ get it
Firefox Pentesting Add-ons
FREE
FEATURED

Firefox Pentesting Add-ons

Hand-picked Firefox extensions every web application pentester needs — proxy setup, header analysis, cookie editing, and recon automation all in one guide.

#firefox#addons#web
FREE
→ get it
DNS & DHCP Pentesting Playbook
FREE
FEATURED

DNS & DHCP Pentesting Playbook

Deep-dive into DNS and DHCP attack techniques — zone transfers, DNS spoofing, DHCP starvation, and rogue server attacks with step-by-step examples.

#dns#dhcp#network
FREE
→ get it
HTB OSCP-Like Labs
FREE
FEATURED

HTB OSCP-Like Labs

Curated HackTheBox machines that closely mirror the OSCP exam — sorted by difficulty with methodology notes for both Windows and Linux targets.

#htb#oscp#practice
FREE
→ get it
WordPress Exploitation Playbook
FREE
FEATURED

WordPress Exploitation Playbook

The attacker's guide to WordPress — plugin enumeration, theme exploitation, credential attacks, XML-RPC abuse, and full admin-to-shell walkthroughs.

#wordpress#web#exploitation
FREE
→ get it
PEN-200: Penetration Testing with Kali Linux (OSCP)
COURSE
20% OFFwith membership

PEN-200: Penetration Testing with Kali Linux (OSCP)

The official OffSec PEN-200 course — complete OSCP exam preparation covering buffer overflows, Active Directory, web attacks, privilege escalation, and the Try Harder mindset.

#oscp#pen-200#kali
$25.00
→ get it
WEB-300: Advanced Web Attacks and Exploitation (OSWE)
COURSE
20% OFFwith membership

WEB-300: Advanced Web Attacks and Exploitation (OSWE)

Official OffSec WEB-300 course for OSWE certification — master white-box web application testing, source code review, authentication bypass, and custom exploit development.

#oswe#web-300#web
$25.00
→ get it
Hacking Books Bundle
BUNDLE
20% OFFwith membership

Hacking Books Bundle

Curated bundle of top hacking and security books — covers offensive security, network attacks, web exploitation, malware analysis, and red team operations.

#bundle#ebooks#collection
$15.00
→ get it
Hands-On Hacking
EBOOK
20% OFFwith membership

Hands-On Hacking

A hands-on introduction to ethical hacking — network scanning, vulnerability assessment, exploitation, and post-exploitation with real lab exercises throughout.

#hacking#beginner#practical
$5.00
→ get it
Real-World Bug Bounty
EBOOK
20% OFFwith membership

Real-World Bug Bounty

Battle-tested bug bounty techniques used against real programs — SQLi, SSRF, IDOR, XXE, business logic flaws, and how to write reports that get paid.

#bug-bounty#web#ssrf
$5.00
→ get it
Linux Basics for Hackers
EBOOK
20% OFFwith membership

Linux Basics for Hackers

From terminal basics to full privilege escalation — everything a hacker needs to know about Linux, including file permissions, scripting, SUID/GUID, and cron abuse.

#linux#privesc#bash
$5.00
→ get it
PEN-210: Foundational Wireless Network Attacks (OSWP)
COURSE
20% OFFwith membership

PEN-210: Foundational Wireless Network Attacks (OSWP)

Official OffSec PEN-210 course for OSWP certification — attack 802.11 wireless networks including WEP/WPA/WPA2 cracking, evil twin APs, and rogue access point deployment.

#oswp#pen-210#wireless
$25.00
→ get it
PEN-300: Evasion Techniques and Breaching Defenses (OSEP)
COURSE
20% OFFwith membership

PEN-300: Evasion Techniques and Breaching Defenses (OSEP)

Official OffSec PEN-300 course for OSEP certification — master AV/EDR evasion, process injection, C2 frameworks, Active Directory persistence, and advanced lateral movement.

#osep#pen-300#evasion
$25.00
→ get it
HTB - Active Directory Penetration Tester Path 2024
COURSE
20% OFFwith membership

HTB - Active Directory Penetration Tester Path 2024

HackTheBox Active Directory Penetration Tester learning path — full 2024 edition covering AD enumeration, Kerberos attacks, lateral movement, and domain compromise.

#htb#active-directory#kerberos
$15.00
→ get it
HTB - Bug Bounty Hunter Path 2024
COURSE
20% OFFwith membership

HTB - Bug Bounty Hunter Path 2024

HackTheBox Bug Bounty Hunter learning path — 2024 edition covering web vulnerabilities, recon, and submission methodology for real bug bounty programs.

#htb#bug-bounty#web
$15.00
→ get it
HTB - Penetration Tester Path 2024
COURSE
20% OFFwith membership

HTB - Penetration Tester Path 2024

HackTheBox Penetration Tester learning path — complete 2024 edition from fundamentals to advanced exploitation, network attacks, and reporting.

#htb#pentesting#exploitation
$15.00
→ get it
HTB - Senior Web Penetration Tester 2024
COURSE
20% OFFwith membership

HTB - Senior Web Penetration Tester 2024

HackTheBox Senior Web Penetration Tester path — advanced 2024 edition covering complex web vulnerabilities, API attacks, and chained exploitation.

#htb#web#api
$15.00
→ get it
HTB - SOC Analyst Path 2024
COURSE
20% OFFwith membership

HTB - SOC Analyst Path 2024

HackTheBox SOC Analyst learning path — 2024 edition covering threat detection, SIEM, log analysis, incident response, and blue team operations.

#htb#soc#blue-team
$15.00
→ get it
OSCP Solutions Guide
COURSE
20% OFFwith membership

OSCP Solutions Guide

Complete OSCP solutions and walkthrough guide — methodology breakdowns, exploitation techniques, and exam strategy from successful OSCP candidates.

#oscp#solutions#walkthrough
$25.00
→ get it
OSCP PDF — Penetration Testing with Kali Linux
COURSE
20% OFFwith membership

OSCP PDF — Penetration Testing with Kali Linux

The official OSCP PDF study guide — complete penetration testing methodology, techniques, and exercises from OffSec.

#oscp#kali#pdf
$25.00
→ get it
Certified Google Red Team Specialist (CGRTS)
COURSE
20% OFFwith membership

Certified Google Red Team Specialist (CGRTS)

Complete CGRTS course material — red team operations against Google Cloud environments, GCP attack surface, and privilege escalation techniques.

#gcp#cloud#red-team
$25.00
→ get it
CCSE — Check Point Certified Security Expert
COURSE
20% OFFwith membership

CCSE — Check Point Certified Security Expert

Complete CCSE course material — Check Point firewall management, VPN configuration, ClusterXL, advanced threat prevention, and security policy.

#checkpoint#firewall#certification
$25.00
→ get it
AWS Penetration Testing with Kali Linux
EBOOK
20% OFFwith membership

AWS Penetration Testing with Kali Linux

Hands-on AWS penetration testing using Kali Linux — IAM misconfigurations, S3 bucket attacks, EC2 exploitation, Lambda abuse, and full cloud kill chains.

#aws#cloud#kali
$5.00
→ get it
AWS Penetration Testing — Beginner's Guide to Hacking
EBOOK
20% OFFwith membership

AWS Penetration Testing — Beginner's Guide to Hacking

Beginner-friendly AWS hacking guide — setting up your attack environment, IAM enumeration, S3 misconfigurations, and cloud privilege escalation step by step.

#aws#cloud#beginner
$5.00
→ get it
Active Directory — The Hacker's Guide
EBOOK
20% OFFwith membership

Active Directory — The Hacker's Guide

Complete Active Directory attack guide — enumeration, Kerberoasting, AS-REP roasting, Pass-the-Hash, DCSync, BloodHound, and domain persistence techniques.

#active-directory#kerberos#bloodhound
$5.00
→ get it
Attacking Network Protocols
EBOOK
20% OFFwith membership

Attacking Network Protocols

A hacker's guide to network protocol capture, analysis, and exploitation — ARP, DNS, SMB, HTTP, and custom protocol reverse engineering with Wireshark and Scapy.

#network#protocols#wireshark
$5.00
→ get it
Black Hat Go — Go Programming for Hackers and Pentesters
EBOOK
20% OFFwith membership

Black Hat Go — Go Programming for Hackers and Pentesters

Build offensive security tools in Go — port scanners, packet sniffers, exploits, C2 frameworks, and network proxies written from scratch in Go.

#golang#programming#offensive-tools
$5.00
→ get it
Black Hat GraphQL — Attacking Next Generation APIs
EBOOK
20% OFFwith membership

Black Hat GraphQL — Attacking Next Generation APIs

Complete guide to GraphQL security — introspection attacks, batching attacks, injection, authorization bypass, and DoS techniques against GraphQL endpoints.

#graphql#api#web
$5.00
→ get it
Black Hat Python — Python Programming for Hackers and Pentesters
EBOOK
20% OFFwith membership

Black Hat Python — Python Programming for Hackers and Pentesters

Build hacking tools in Python — network sniffers, trojans, fuzzers, C2 channels, web scrapers, and offensive automation scripts.

#python#programming#offensive-tools
$5.00
→ get it
Breaking into Information Security
EBOOK
20% OFFwith membership

Breaking into Information Security

Career guide for breaking into cybersecurity — certifications roadmap, skill development, resume tips, interview prep, and real-world career paths.

#career#beginner#certifications
$5.00
→ get it
Bug Bounty Bootcamp
EBOOK
20% OFFwith membership

Bug Bounty Bootcamp

Complete bug bounty training from zero to first payout — recon methodology, XSS, SSRF, IDOR, SQLi, business logic, and writing reports that get accepted.

#bug-bounty#web#xss
$5.00
→ get it
Building & Automating Penetration Testing Labs in the Cloud
EBOOK
20% OFFwith membership

Building & Automating Penetration Testing Labs in the Cloud

Build your own cloud-based pentest lab — AWS/Azure/GCP vulnerable environments, automated provisioning with Terraform, and lab maintenance for practice.

#cloud#lab#terraform
$5.00
→ get it
Ethical Hacking — A Hands-on Introduction to Breaking In
EBOOK
20% OFFwith membership

Ethical Hacking — A Hands-on Introduction to Breaking In

Practical introduction to ethical hacking — network scanning, vulnerability exploitation, web attacks, social engineering, and the legal framework of penetration testing.

#ethical-hacking#beginner#network
$5.00
→ get it
Evading EDR — The Definitive Guide to Defeating Endpoint Detection
EBOOK
20% OFFwith membership

Evading EDR — The Definitive Guide to Defeating Endpoint Detection

Complete EDR evasion guide — understanding detection engines, AMSI bypass, ETW patching, process injection, custom shellcode, and behavioral analysis evasion.

#edr#evasion#malware
$5.00
→ get it
Extreme Privacy — What It Takes to Disappear
EBOOK
20% OFFwith membership

Extreme Privacy — What It Takes to Disappear

Complete digital privacy guide — removing your online presence, anonymous communications, secure devices, private travel, and protecting your identity from stalkers and surveillance.

#privacy#opsec#anonymity
$5.00
→ get it
Gray Hat Hacking — The Ethical Hacker's Handbook (6th Edition)
EBOOK
20% OFFwith membership

Gray Hat Hacking — The Ethical Hacker's Handbook (6th Edition)

Comprehensive ethical hacking reference — network attacks, vulnerability research, exploit development, reverse engineering, IoT hacking, and mobile security.

#hacking#exploit-dev#reverse-engineering
$5.00
→ get it
Hack & Leak
EBOOK
20% OFFwith membership

Hack & Leak

Real-world hacking and data exfiltration case studies — how major breaches happened, techniques used, and lessons for both attackers and defenders.

#hacking#breach#exfiltration
$5.00
→ get it
Hack The World with OSINT
EBOOK
20% OFFwith membership

Hack The World with OSINT

Complete OSINT field guide — social media intelligence, email tracing, geolocation, phone number lookup, dark web research, and automating reconnaissance.

#osint#recon#social-media
$5.00
→ get it
Hacking APIs — Breaking Web Application Programming Interfaces
EBOOK
20% OFFwith membership

Hacking APIs — Breaking Web Application Programming Interfaces

Complete API security testing guide — REST/GraphQL/SOAP attacks, authentication bypass, mass assignment, BOLA, rate limiting bypass, and API fuzzing.

#api#rest#graphql
$5.00
→ get it
Hacking Kubernetes
EBOOK
20% OFFwith membership

Hacking Kubernetes

Kubernetes security from an attacker's perspective — RBAC misconfigurations, container escapes, service account abuse, network policy bypass, and cluster takeover.

#kubernetes#cloud#container
$5.00
→ get it
Hands-On AWS Penetration Testing
EBOOK
20% OFFwith membership

Hands-On AWS Penetration Testing

Practical AWS penetration testing with real lab exercises — IAM, EC2, S3, Lambda, RDS, and container service attacks with full exploit chains.

#aws#cloud#pentesting
$5.00
→ get it
How to Hack Like a Ghost
EBOOK
20% OFFwith membership

How to Hack Like a Ghost

Advanced operational security for hackers — anonymous infrastructure, traffic obfuscation, attribution avoidance, and staying undetected during red team engagements.

#opsec#anonymity#red-team
$5.00
→ get it
HTTP — The Definitive Guide
EBOOK
20% OFFwith membership

HTTP — The Definitive Guide

Complete HTTP reference for web security professionals — HTTP/1.1, HTTP/2, headers, caching, cookies, authentication, and protocol-level attack surface.

#http#web#protocol
$5.00
→ get it
JavaScript for Hackers
EBOOK
20% OFFwith membership

JavaScript for Hackers

JavaScript exploitation for security researchers — XSS payload crafting, DOM attacks, prototype pollution, browser exploitation, and Node.js security issues.

#javascript#xss#dom
$5.00
→ get it
📚
EBOOK
EBOOK
20% OFFwith membership

Metasploit — The Penetration Tester's Guide (2nd Edition)

Complete Metasploit Framework guide — modules, meterpreter, post-exploitation, pivoting, auxiliary scanners, and building custom exploits and payloads.

#metasploit#exploitation#meterpreter
$5.00
→ get it
Network Basics for Hackers
EBOOK
20% OFFwith membership

Network Basics for Hackers

Networking fundamentals from a hacker's perspective — TCP/IP, routing, switching, firewalls, VLANs, and how to attack and break each layer.

#networking#tcp-ip#fundamentals
$5.00
→ get it
OSINT Techniques — 10th Edition (2023)
EBOOK
20% OFFwith membership

OSINT Techniques — 10th Edition (2023)

The most comprehensive OSINT resource — 600+ pages of open-source intelligence techniques for uncovering online information about people, organizations, and infrastructure.

#osint#recon#intelligence
$5.00
→ get it
Open Source Intelligence Techniques
EBOOK
20% OFFwith membership

Open Source Intelligence Techniques

Resources for searching and analyzing online information — social networks, search engines, archives, images, documents, and automating OSINT workflows.

#osint#intelligence#social-media
$5.00
→ get it
Operator Handbook — Red Team Reference
EBOOK
20% OFFwith membership

Operator Handbook — Red Team Reference

Quick-reference red team field manual — Linux/Windows/Mac commands, network tools, exploitation one-liners, and operational cheat sheets for active engagements.

#red-team#cheatsheet#reference
$5.00
→ get it
Penetration Testing Azure for Ethical Hackers
EBOOK
20% OFFwith membership

Penetration Testing Azure for Ethical Hackers

Azure penetration testing guide — Azure AD attacks, storage exploitation, function app abuse, managed identity attacks, and cloud privilege escalation chains.

#azure#cloud#pentesting
$5.00
→ get it
Pentesting Azure Applications — The Definitive Guide
EBOOK
20% OFFwith membership

Pentesting Azure Applications — The Definitive Guide

In-depth Azure application security testing — web apps, APIs, containers, service buses, Key Vault attacks, and full Azure attack surface enumeration.

#azure#cloud#web
$5.00
→ get it
Practical Cloud Security
EBOOK
20% OFFwith membership

Practical Cloud Security

Cloud security fundamentals and attack techniques — AWS, Azure, GCP security controls, IAM misconfigurations, network security groups, and container security.

#cloud#aws#azure
$5.00
→ get it
Practical IoT Hacking
EBOOK
20% OFFwith membership

Practical IoT Hacking

Definitive guide to attacking Internet of Things devices — firmware extraction, hardware debugging, radio protocols, MQTT attacks, and IoT network exploitation.

#iot#firmware#hardware
$5.00
→ get it
Practical Linux Forensics
EBOOK
20% OFFwith membership

Practical Linux Forensics

Linux digital forensics guide — evidence collection, memory analysis, disk forensics, log analysis, malware artifact identification, and timeline reconstruction.

#forensics#linux#memory-analysis
$5.00
→ get it
Practical Malware Analysis
EBOOK
20% OFFwith membership

Practical Malware Analysis

Complete malware analysis guide — static and dynamic analysis, disassembly, debugging, unpacking, and reverse engineering real malware samples.

#malware#reverse-engineering#analysis
$5.00
→ get it
RTFM — Red Team Field Manual v2
EBOOK
20% OFFwith membership

RTFM — Red Team Field Manual v2

The essential red team quick-reference — Windows/Linux commands, network tools, web exploitation, post-exploitation one-liners, and operational cheat sheets.

#red-team#cheatsheet#reference
$5.00
→ get it
Red Team Development and Operations
EBOOK
20% OFFwith membership

Red Team Development and Operations

Professional red team operations guide — engagement planning, C2 infrastructure, operational security, reporting, and running effective adversary simulations.

#red-team#operations#c2
$5.00
→ get it
Reversing — Secrets of Reverse Engineering
EBOOK
20% OFFwith membership

Reversing — Secrets of Reverse Engineering

Complete reverse engineering guide — x86/x64 assembly, disassemblers, debuggers, anti-reversing techniques, software cracking, and malware reversing.

#reverse-engineering#assembly#debugging
$5.00
→ get it
Serious Cryptography
EBOOK
20% OFFwith membership

Serious Cryptography

Practical cryptography for security professionals — block ciphers, hash functions, public key cryptography, TLS, random number generation, and cryptographic attacks.

#cryptography#tls#encryption
$5.00
→ get it
The Android Malware Handbook
EBOOK
20% OFFwith membership

The Android Malware Handbook

Android malware analysis and reverse engineering — APK analysis, smali code, dynamic analysis, evasion techniques, and real Android malware case studies.

#android#malware#mobile
$5.00
→ get it
The Art of Intrusion
EBOOK
20% OFFwith membership

The Art of Intrusion

Real hacker stories — the techniques, social engineering, and exploits used in famous break-ins told from the attacker's perspective by Kevin Mitnick.

#hacking#social-engineering#mitnick
$5.00
→ get it
The Art of Mac Malware
EBOOK
20% OFFwith membership

The Art of Mac Malware

macOS malware analysis and reverse engineering — Mac-specific attack techniques, persistence mechanisms, code signing bypass, and analyzing real Mac malware.

#macos#malware#reverse-engineering
$5.00
→ get it
The Car Hacker's Handbook
EBOOK
20% OFFwith membership

The Car Hacker's Handbook

Automotive penetration testing guide — CAN bus attacks, OBD-II exploitation, ECU reverse engineering, wireless attacks on vehicles, and automotive security research.

#automotive#can-bus#iot
$5.00
→ get it
The Hacker Playbook
EBOOK
20% OFFwith membership

The Hacker Playbook

Practical penetration testing guide structured like a football playbook — reconnaissance, scanning, exploitation, and post-exploitation plays with real-world scenarios.

#pentesting#exploitation#methodology
$5.00
→ get it
The Pentester BluePrint — Starting a Career as an Ethical Hacker
EBOOK
20% OFFwith membership

The Pentester BluePrint — Starting a Career as an Ethical Hacker

Career guide for aspiring pentesters — skills, certifications, building a lab, getting hired, and navigating the ethical hacking industry.

#career#pentesting#certifications
$5.00
→ get it
The Shellcoder's Handbook
EBOOK
20% OFFwith membership

The Shellcoder's Handbook

Discovering and exploiting security holes — buffer overflows, heap exploitation, format strings, return-oriented programming, and writing shellcode for multiple platforms.

#shellcode#exploitation#buffer-overflow
$5.00
→ get it
The Social Engineer's Playbook
EBOOK
20% OFFwith membership

The Social Engineer's Playbook

Practical pretexting guide — phishing scripts, vishing techniques, physical social engineering, building personas, and psychological manipulation tactics.

#social-engineering#phishing#pretexting
$5.00
→ get it
The Web Application Hacker's Handbook (2nd Edition)
EBOOK
20% OFFwith membership

The Web Application Hacker's Handbook (2nd Edition)

The definitive web application security bible — finding and exploiting security flaws in modern web applications, covering all OWASP Top 10 and advanced techniques.

#web#owasp#exploitation
$5.00
→ get it
This Is How They Tell Me the World Ends — The Cyberweapons Arms Race
EBOOK
20% OFFwith membership

This Is How They Tell Me the World Ends — The Cyberweapons Arms Race

The untold story of the global cyberweapon trade — zero-days, nation-state hacking, surveillance tools, and the shadow market for digital weapons.

#cyberwarfare#zero-day#nation-state
$5.00
→ get it
Tribe of Hackers — Red Team
EBOOK
20% OFFwith membership

Tribe of Hackers — Red Team

Insights from top red team professionals — career advice, tools, methodologies, and mindset from the world's best offensive security practitioners.

#red-team#career#community
$5.00
→ get it
Web Application Security
EBOOK
20% OFFwith membership

Web Application Security

Modern web application security guide — XSS, CSRF, clickjacking, CSP, CORS misconfigurations, authentication attacks, and securing web applications.

#web#xss#csrf
$5.00
→ get it
Cyberjutsu — Cybersecurity for the Modern Ninja
EBOOK
20% OFFwith membership

Cyberjutsu — Cybersecurity for the Modern Ninja

Ancient warrior philosophy applied to cybersecurity — stealth, deception, situational awareness, and the mindset of a modern cyber warrior.

#cybersecurity#mindset#strategy
$5.00
→ get it
// get_discount

Subscribe from $8/month and save 20% on every purchase.

→ View Membership Plans