[ ] Hacking: The Art of Exploitation
[ ] The Shellcoder’s Handbook
[ ] Introduction to Software Exploitation
[ ] Reverse Engineering for Beginners
[ ] Modern Operating Systems
[ ] Kali Linux in action. Information systems security audit. [RU] (Kali Linux в действии. Аудит безопасности информационных систем)
[ ] Cybersecurity Ops with bash
[ ] Cybersecurity – Attack and Defense Strategies
[ ] Practical Malware Analysis
[ ] Binary Exploitation Notes
[ ] CTF Field Guide
https://github.com/s1gh/ctf-literature