//Topic
Best Offensive books
16 books in our catalog cover Offensive, ranked by rating. Each entry is an opinionated review with who the book is for and who should skip it.
01 · 2017
Attacking Network Protocols
A Hacker's Guide to Capture, Analysis, and Exploitation
James Forshaw, Project Zero veteran, on how to capture, parse, and break protocols from the wire up to the application layer, with a strong focus on building reusable analysis tooling.
Advanced5/5James Forshaw02 · 2008
Hacking: The Art of Exploitation
A from-first-principles tour of low-level exploitation that still teaches the mindset two decades later.
Intermediate5/5Jon Erickson03 · 2025
Metasploit
The Penetration Tester's Guide
The second edition of the definitive No Starch guide to the Metasploit Framework, updated by the project's original maintainers and newer contributors for the modern Framework.
Intermediate4/5David Kennedy, Mati Aharoni, Devon Kearns, Jim O'Gorman, Daniel G. Graham04 · 2024
Black Hat Bash
Creative Scripting for Hackers and Pentesters
Nick Aleks and Dolev Farhi on getting offensive work done with the shell: privilege escalation tooling, lateral movement, and pipelining bash with the rest of the toolkit.
Intermediate4/5Nick Aleks, Dolev Farhi05 · 2023
Black Hat GraphQL
Attacking Next Generation APIs
Aleks and Farhi on attacking GraphQL specifically: introspection abuse, batching, depth and complexity attacks, auth flaws, and the differences from REST that make GraphQL pentests their own discipline.
Intermediate4/5Nick Aleks, Dolev Farhi06 · 2022
Hacking APIs
Breaking Web Application Programming Interfaces
Corey Ball's structured approach to attacking REST and GraphQL APIs: enumeration, auth flaws, business logic, mass assignment, and the testing harness around them.
Intermediate4/5Corey J. Ball07 · 2021
Black Hat Python
Python Programming for Hackers and Pentesters
Justin Seitz and Tim Arnold's hands-on tour of writing offensive tooling in Python: network sniffers, web scrapers, GitHub-based command-and-control, screen capture, keylogging, and Volatility extensions.
Intermediate4/5Justin Seitz, Tim Arnold08 · 2021
Bug Bounty Bootcamp
The Guide to Finding and Reporting Web Vulnerabilities
Vickie Li's pragmatic walk through the bug-bounty workflow, from picking a program and recon to reporting findings that actually pay out.
Beginner4/5Vickie Li09 · 2020
Black Hat Go
Go Programming For Hackers and Pentesters
Tom Steele, Chris Patten, and Dan Kottmann show how to use Go's networking primitives, concurrency model, and cross-compilation to write offensive tooling that runs almost anywhere.
Intermediate4/5Tom Steele, Chris Patten, Dan Kottmann10 · 2019
Real-World Bug Hunting
A Field Guide to Web Hacking
Peter Yaworski breaks down real disclosed reports across major bug bounty programs, organized by vulnerability class, so readers can pattern-match real findings rather than learn classes from textbook examples.
Beginner4/5Peter Yaworski11 · 2018
The Hacker Playbook 3
Practical Guide to Penetration Testing — Red Team Edition
Peter Kim's hands-on red-team field manual: assumed-breach scenarios, lateral movement, AV/EDR evasion, and the operational rhythm of a real engagement rather than a checklist of CVEs.
Intermediate4/5Peter Kim12 · 2014
Penetration Testing
A Hands-On Introduction to Hacking
Georgia Weidman's lab-driven introduction to pentesting, walking the reader from setting up a target environment through scanning, exploitation, post-exploitation, and reporting.
Beginner4/5Georgia Weidman13 · 2011
A Bug Hunter's Diary
A Guided Tour Through the Wilds of Software Security
Tobias Klein walks through seven real vulnerabilities he found and exploited, in the form of personal lab notes, what he tried, what failed, and what eventually shipped to vendors.
Intermediate4/5Tobias Klein14 · 2011
The Web Application Hacker's Handbook
Finding and Exploiting Security Flaws
The exhaustive reference for web app pentesting, comprehensive but increasingly a historical document.
Intermediate4/5Dafydd Stuttard, Marcus Pinto15 · 2007
The Shellcoder's Handbook
Discovering and Exploiting Security Holes
A foundational text on memory-corruption exploitation across Linux, Windows, Solaris and embedded targets. Pre-modern-mitigations in spirit but still the canonical introduction to the techniques the modern toolchain is built to defeat.
Advanced4/5Chris Anley, John Heasman, Felix Lindner, Gerardo Richarte16 · 2018
Pentesting Azure Applications
The Definitive Guide to Testing and Securing Deployments
Matt Burrough on attacker behaviour against Azure tenants: identity, storage, VMs, key material handling, and the recon paths that work against real subscriptions.
Intermediate3/5Matt Burrough