// Alternatives

Alternatives to Practical Social Engineering

Books in our catalog with overlapping topics and a similar reading level to Practical Social Engineering. If Practical Social Engineering is the wrong fit at intermediate level, start here.

  1. 01 · 2018

    Social Engineering

    Christopher Hadnagy's broad procedural reference on social engineering as a discipline — recon, pretexting, elicitation, microexpressions, and the structured engagement model his consultancy operationalized.

    Intermediate
    4/5Christopher Hadnagy
  2. 02 · 2024

    Extreme Privacy

    Michael Bazzell's defender-side companion to OSINT Techniques: a step-by-step program for removing yourself from data brokers, public records, and the everyday surveillance economy without going off-grid.

    Intermediate
    5/5Michael Bazzell
  3. 03 · 2024

    OSINT Techniques

    Michael Bazzell's relentlessly updated technical manual for finding people, accounts, breach data, geolocation evidence, and online identifiers — the de facto reference of the modern OSINT field.

    Intermediate
    5/5Michael Bazzell
  4. 04 · 2025

    Metasploit

    The second edition of the definitive No Starch guide to the Metasploit Framework, updated by the project's original maintainers and newer contributors for the modern Framework.

    Intermediate
    4/5David Kennedy, Mati Aharoni, Devon Kearns, Jim O'Gorman, Daniel G. Graham
  5. 05 · 2018

    The Hacker Playbook 3

    Peter Kim's hands-on red-team field manual: assumed-breach scenarios, lateral movement, AV/EDR evasion, and the operational rhythm of a real engagement rather than a checklist of CVEs.

    Intermediate
    4/5Peter Kim
  6. 06 · 2018

    Pentesting Azure Applications

    Matt Burrough on attacker behaviour against Azure tenants: identity, storage, VMs, key material handling, and the recon paths that work against real subscriptions.

    Intermediate
    3/5Matt Burrough
  7. 07 · 2015

    The Mobile Application Hacker's Handbook

    Chell, Erasmus, Colley, and Whitehouse's reference on iOS and Android application security from the early-mid 2010s — runtime hooking, transport security, IPC abuse, and the platform-specific surface of mobile pentesting.

    Intermediate
    3/5Dominic Chell, Tyrone Erasmus, Shaun Colley, Ollie Whitehouse
  8. 08 · 2018

    Open Source Intelligence Techniques and Tools

    Hassan and Hijazi's pedagogical introduction to OSINT framed inside the broader intelligence cycle (collection → processing → analysis → dissemination) rather than around a specific toolchain.

    Beginner
    3/5Nihad A. Hassan, Rami Hijazi
  9. 09 · 2025

    Linux Basics for Hackers

    OccupyTheWeb's introduction to Linux from the angle that hackers and pentesters actually need it: shells, networking, scripting, and Kali tooling.

    Beginner
    4/5OccupyTheWeb
  10. 10 · 2024

    Hacks, Leaks, and Revelations

    Micah Lee on the operational craft of working with leaked datasets: authentication, OPSEC for sources and journalists, and the Python tooling to actually parse what arrives in your dropbox.

    Beginner
    4/5Micah Lee
Back to Practical Social EngineeringWhat to read after Practical Social Engineering