This page contains links and references to material I use frequently in my research and study processes. I thought since I have found them useful, others might as well. This page will be updated whenever I find new useful resources.

Internet Resources

Book Resources

  • Fuzzing: Brute Force Vulnerability Discovery, [ISBN-13: 978-0321446114 | ISBN-10: 0321446119]
  • Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition, [ISBN-13: 978-0071742559 | ISBN-10: 0071742557]
  • Hacking: The Art of Exploitation, 2nd Edition, [ISBN-13: 978-1593271442 | ISBN-10: 1593271441]
  • Metasploit: The Penetration Tester’s Guide, [ISBN-13: 978-1593272883 | ISBN-10: 159327288X]
  • The Shellcoder’s Handbook: Discovering and Exploiting Security Holes, [ISBN-13: 978-0470080238 | ISBN-10: 047008023X]
  • Reversing: Secrets of Reverse Engineering, [ISBN-13: 978-0764574818 | ISBN-10: 0764574817]
  • The IDA Pro Book: The Unofficial Guide to the World’s Most Popular Disassembler, [ISBN-13: 978-1593272890 | ISBN-10: 1593272898]
  • The Art of Assembly Language, [ISBN-13: 978-1593272074 | ISBN-10: 1593272073]

Capture The Flag Specific Resources

The following links are related to CTF events specifically.

Training Sites


Below are a list of the subreddits that I find useful.

  • /r/netsec
  • /r/reverseeningeering
  • /r/securityctf
  • /r/OpenToAllCTFteam
  • /r/netsec2
  • /r/netsec_uncensored
  • /r/netsec/students
  • /r/pwned
  • /r/computerforensic
  • /r/computerforensics

One comment

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s