//Topic
Best Exploitation books
3 books in our catalog cover Exploitation, ranked by rating. Each entry is an opinionated review with who the book is for and who should skip it.
01 · 2022
Gray Hat Hacking
The Ethical Hacker's Handbook
A multi-author breadth-first reference covering the modern offensive landscape: web, binary, hardware, IoT, mobile, cloud, and adversarial ML — the closest thing in print to a single-volume snapshot of where offensive security is.
Advanced4/5Allen Harper, Ryan Linn, Stephen Sims, Michael Baucom, Daniel Fernandez, Huascar Tejeda, Moses Frost02 · 2009
The Mac Hacker's Handbook
Charlie Miller and Dino Dai Zovi's 2009 deep dive into the Mac OS X exploit landscape — Mach-O, IPC, sandboxing as it then existed, and the early-Intel-Mac exploitation chains.
Advanced3/5Charlie Miller, Dino Dai Zovi03 · 2005
The Database Hacker's Handbook
Defending Database Servers
Litchfield, Anley, Heasman, and Grindlay's exhaustive 2005 reference on attacking and defending Oracle, SQL Server, DB2, MySQL, PostgreSQL, Sybase, and Informix — the era when the database engine itself was the soft target.
Advanced3/5David Litchfield, Chris Anley, John Heasman, Bill Grindlay