Penetration tests

Mastering Metasploit. Exploit systems, cover your tracks, and bypass security controls with the Metasploit 5.0 framework - Fourth Edition

Nipun Jaswal

Mastering Metasploit. Take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit - Third Edition

Nipun Jaswal

Mastering Metasploit. With this tutorial you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert

Nipun Jaswal

Metasploit 5.0 for Beginners. Perform penetration testing to secure your IT environment against threats and vulnerabilities - Second Edition

Sagar Rahalkar

Metasploit. Receptury pentestera. Wydanie II

Abhinav Singh, Monika Agarwal

Mroczne odmęty phishingu. Nie daj się złowić!

Christopher Hadnagy

Offensive Shellcode from Scratch. Get to grips with shellcode countermeasures and discover how to bypass them

Rishalin Pillay

Penetration Testing Azure for Ethical Hackers. Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments

David Okeyode, Karl Fosaaen, Charles Horton

Penetration Testing with BackBox. This tutorial will immerse you in the fascinating environment of penetration testing. Thoroughly practical and written for ease of understanding, it will give you the insights and knowledge you need to start using BackBox

Stefan Umit Uygur

Penetration Testing with Raspberry Pi. Construct a hacking arsenal for penetration testers or hacking enthusiasts using Kali Linux on a Raspberry Pi

Joseph Muniz, Joseph Muniz, Aamir Lakhani

Penetration Testing with the Bash shell. Make the most of Bash shell and Kali Linux’s command line based security assessment tools

Keith Harald Esrick Makan

Pentesting Industrial Control Systems. An ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes

Paul Smith

Performance Testing with JMeter 3. Enhance the performance of your web application - Third Edition

Bayo Erinle

Pocket CIO - The Guide to Successful IT Asset Management. Get to grips with the fundamentals of IT Asset Management, Software Asset Management, and Software License Compliance Audits with this guide

Phara McLachlan

PowerShell for Penetration Testing. Explore the capabilities of PowerShell for pentesters across multiple platforms

Dr. Andrew Blyth, Campbell Murray

Practical Hardware Pentesting. A guide to attacking embedded systems and protecting them against the most common hardware attacks

Jean-Georges Valle