// Alternatives
Alternatives to Penetration Testing
Books in our catalog with overlapping topics and a similar reading level to Penetration Testing. If Penetration Testing is the wrong fit at beginner level, start here.
01 · 2025
Metasploit
The second edition of the definitive No Starch guide to the Metasploit Framework, updated by the project's original maintainers and newer contributors for the modern Framework.
Intermediate4/5David Kennedy, Mati Aharoni, Devon Kearns, Jim O'Gorman, Daniel G. Graham02 · 2024
Black Hat Bash
Nick Aleks and Dolev Farhi on getting offensive work done with the shell: privilege escalation tooling, lateral movement, and pipelining bash with the rest of the toolkit.
Intermediate4/5Nick Aleks, Dolev Farhi03 · 2021
Black Hat Python
Justin Seitz and Tim Arnold's hands-on tour of writing offensive tooling in Python: network sniffers, web scrapers, GitHub-based command-and-control, screen capture, keylogging, and Volatility extensions.
Intermediate4/5Justin Seitz, Tim Arnold04 · 2020
Black Hat Go
Tom Steele, Chris Patten, and Dan Kottmann show how to use Go's networking primitives, concurrency model, and cross-compilation to write offensive tooling that runs almost anywhere.
Intermediate4/5Tom Steele, Chris Patten, Dan Kottmann05 · 2018
The Hacker Playbook 3
Peter Kim's hands-on red-team field manual: assumed-breach scenarios, lateral movement, AV/EDR evasion, and the operational rhythm of a real engagement rather than a checklist of CVEs.
Intermediate4/5Peter Kim06 · 2018
Pentesting Azure Applications
Matt Burrough on attacker behaviour against Azure tenants: identity, storage, VMs, key material handling, and the recon paths that work against real subscriptions.
Intermediate3/5Matt Burrough07 · 2025
Linux Basics for Hackers
OccupyTheWeb's introduction to Linux from the angle that hackers and pentesters actually need it: shells, networking, scripting, and Kali tooling.
Beginner4/5OccupyTheWeb08 · 2021
Bug Bounty Bootcamp
Vickie Li's pragmatic walk through the bug-bounty workflow, from picking a program and recon to reporting findings that actually pay out.
Beginner4/5Vickie Li09 · 2019
Real-World Bug Hunting
Peter Yaworski breaks down real disclosed reports across major bug bounty programs, organized by vulnerability class, so readers can pattern-match real findings rather than learn classes from textbook examples.
Beginner4/5Peter Yaworski10 · 2005
The Art of Intrusion
Mitnick and Simon's follow-up to The Art of Deception: third-party stories from working hackers — casino slot exploits, prison-network breaches, post-9/11 intelligence ops — reconstructed and annotated by Mitnick.
Beginner4/5Kevin Mitnick, William L. Simon