Reading List

Books, papers, and posts worth your time. Curated, opinionated, not exhaustive.

Status: seed Related: Researchers, Vulnerability Research, Exploit Development


Foundational books

Vulnerability research / exploit dev

  • The Shellcoder’s Handbook (2nd ed.) — Anley, Heasman, Lindner, Richarte. Dated in places; still the foundation.
  • A Bug Hunter’s Diary — Tobias Klein. Real bug hunts narrated end to end.
  • The Art of Software Security Assessment — Dowd, McDonald, Schuh. The reference for code review.
  • Practical Reverse Engineering — Dang, Gazet, Bachaalany. x86, ARM, Windows kernel.
  • Practical Binary Analysis — Dennis Andriesse. Modern; covers DBI, taint, symbolic execution.
  • Windows Internals (7th ed., Part 1 & 2) — Russinovich, Solomon, Ionescu, Yosifovich, Allievi. Mandatory if you touch Windows kernel.
  • Linux Kernel Development (3rd ed.) — Robert Love. Older but still the cleanest LKD intro.
  • A Guide to Kernel Exploitation — Perla, Oldani. Kernel-specific exploit dev.

Pentest / red team

  • The Web Application Hacker’s Handbook (2nd ed.) — Stuttard, Pinto. The canonical web-pentest book.
  • The Hacker Playbook 3 — Peter Kim. Practical, scenario-driven.
  • Operator Handbook — Joshua Picolet. Reference card for everything an operator needs in the moment.
  • Red Team Field Manual — Ben Clark. Pocket reference.
  • Hacking: The Art of Exploitation (2nd ed.) — Jon Erickson. Best single intro to memory corruption + networking.

Cryptography

  • Cryptography Engineering — Ferguson, Schneier, Kohno. Practical; what to use and what to avoid.
  • Real-World Cryptography — David Wong. Modern, accessible.

Reverse engineering

  • Reversing: Secrets of Reverse Engineering — Eldad Eilam. Foundational.
  • The IDA Pro Book (2nd ed.) — Chris Eagle.
  • The Ghidra Book — Eagle, Nance.

Papers worth re-reading

  • Hutchins, Cloppert, Amin — Intelligence-Driven Computer Network Defense (2011). The Kill Chain paper.
  • Smashing the Stack for Fun and Profit — Aleph One, Phrack 49 (1996). Historical; still the cleanest exposition of stack overflows.
  • Heap Feng Shui in JavaScript — Alexander Sotirov (2007). Origin of heap-grooming in browser exploitation.
  • On the Effectiveness of Address-Space Randomization — Shacham et al. (2004). Why ASLR is hard to do well.
  • Q: Exploit Hardening Made Easy — Schwartz, Avgerinos, Brumley. Automated ROP.
  • AEG: Automatic Exploit Generation — Avgerinos, Cha, Hao, Brumley.
  • Certified Pre-Owned — Schroeder, Christensen (SpecterOps). The reference for ADCS attacks.

Blogs to follow


Standards and references


Training / hands-on

  • HackTheBox / TryHackMe / VulnHub — interactive boxes.
  • PortSwigger Web Security Academy — best free web-pentest training.
  • pwn.college — open-source binary-exploitation curriculum.
  • exploit.education (Phoenix, Nebula, Protostar) — classic VMs.
  • Pwn2Own / DEFCON CTF / GoogleCTF writeups — current top-of-field tradecraft, free.
  • OffSec courses — OSCP / OSEP / OSED / OSEE for credentialing; OSEE is the high-end.