Awesome Open Source
Awesome Open Source

Hacking University

Awesome list of tutorials about being a hacker.
We collect books(PDF) all about pentest. The collection will keep updating, adding new books.
More projects: @theodorecooper
Reach me: Hi there! I'm Theodore!

How to get books?


Download from Link:


Use bit torrent to get the books.
The torrent file will be in the repo.


Use Resilio Sync to get books.

Resilio Sync by Resilio, Inc. is a proprietary peer-to-peer file synchronization tool. It can sync files between devices on a local network, or between remote devices over the Internet via a modified version of the BitTorrent protocol.

Resilio Sync synchronizes files using BitTorrent. The user's data is stored on the user's local device instead of in a "cloud", therefore requiring at least two user devices, or "nodes," to be online to synchronize files between them. Resilio Sync encrypts data with an Advanced Encryption Standard AES-128 key in counter mode which may either be randomly generated or set by the user. This key is derived from a "secret" which can be shared to other users to share data. Data is sent between devices directly unless the target device is unreachable (e.g. behind a firewall), in which case the data will first be relayed via an intermediary node. Many devices can be connected simultaneously and files shared between them in a mesh networking topology.

Book list

  1. Cultrue of Hacking & Open Source
    • Eric Raymond-The Cathedral and the Bazaar--Musings on Linux and Open Source by an Accidental [email protected]
    • Karl Fogel-Producing Open Source Software--How to Run a Successful Free Software Project
    • Kevin Mitnick-Ghost in the Wires--My Adventures as the World's Most Wanted [email protected]
    • Kevin Mitnick-The Art of Intrusion--The Real Stories Behind the Exploits of Hackers, Intruders and [email protected]
    • Lawrence Lessig-Free Culture
    • Paul Graham-Hackers and Painters--Big Ideas from the Computer [email protected]
    • Richard Stallman-Free Software, Free Society--Selected Essays of Richard M. [email protected]
    • Sam Williams-Free as in Freedom--Richard Stallman's Crusade for Free [email protected]
    • Steven Levy-Hackers--Heroes of the Computer [email protected]
  2. Basic
    • Debian Handbook
    • Control_Systems
    • Kali-Linux-Revealed-1st-edition
    • Learning_the_vi_Editor
    • OWASP_Code_Review_Guide-V1_1
    • Arnold Robbins & Nelson Beebe-Classic Shell [email protected]
    • Mendel Cooper-Advanced Bash-Scripting Guide--An In-Depth Exploration of the Art of Shell [email protected]
    • William Shotts-The Linux Command Line
  3. Cryptography
    • Bruce Schneier-Applied Cryptography--Protocols, Algorithms, and Source Code in [email protected]
    • Bruce Schneier-Applied Cryptography(code).zip
    • William Stallings-Cryptography and Network Security--Principles and [email protected]
  4. Malware Analysis
    • Michael Sikorski & Andrew Honig-Practical Malware Analysis--The Hands-On Guide to Dissecting Malicious [email protected]
  5. System Security Manual
  6. Social Engineering
    • Christopher Hadnagy-Social Engineering--The Science of Human [email protected]
    • Kevin Mitnick-The Art of Deception--Controlling the Human Element of Security
  7. Reverse Engineering
    • Dennis Yurichev-Reverse Engineering for Beginners--Understanding Assembly [email protected]
  8. The Art of Exploitation
  9. HHS
    • HHS_en1_Being_a_Hacker.v2
    • HHS_en2_Essential_Commands.v2
    • HHS_en3_Beneath_the_Internet.v2
    • HHS_en4_Playing_With_Daemons.v2
    • HHS_en5_System_Identification.v2
    • HHS_en6_Hacking_Malware.v2
    • HHS_en7_Attack_Analysis.v2
    • HHS_en8_Forensics.v2
    • HHS_en9_Hacking.Email.v2
    • HHS_en10_Web_Security_and_Privacy.v2
    • HHS_en11_Hacking_Passwords.v2
    • HHS_en12_Legalities_and_Ethics
  10. Programming

Get A Weekly Email With Trending Projects For These Topics
No Spam. Unsubscribe easily at any time.
Security (8,985
Tutorial (7,221
Awesome (3,849
Awesome List (3,534
Hack (2,863
Hacking (2,450
Book (2,407
Cybersecurity (1,505
Penetration Testing (840
Infosec (762
Hacker (279
Related Projects