//Topic

Best Pentesting books

9 books in our catalog cover Pentesting, ranked by rating. Each entry is an opinionated review with who the book is for and who should skip it.

  1. 01 · 2025

    Linux Basics for Hackers

    Getting Started with Networking, Scripting, and Security in Kali

    OccupyTheWeb's introduction to Linux from the angle that hackers and pentesters actually need it: shells, networking, scripting, and Kali tooling.

    Beginner4/5OccupyTheWeb
  2. 02 · 2025

    Metasploit

    The Penetration Tester's Guide

    The second edition of the definitive No Starch guide to the Metasploit Framework, updated by the project's original maintainers and newer contributors for the modern Framework.

    Intermediate4/5David Kennedy, Mati Aharoni, Devon Kearns, Jim O'Gorman, Daniel G. Graham
  3. 03 · 2022

    Gray Hat Hacking

    The Ethical Hacker's Handbook

    A multi-author breadth-first reference covering the modern offensive landscape: web, binary, hardware, IoT, mobile, cloud, and adversarial ML — the closest thing in print to a single-volume snapshot of where offensive security is.

    Advanced4/5Allen Harper, Ryan Linn, Stephen Sims, Michael Baucom, Daniel Fernandez, Huascar Tejeda, Moses Frost
  4. 04 · 2022

    Practical Social Engineering

    A Primer for the Ethical Hacker

    Joe Gray's working manual for the social-engineering side of red team and threat intel: OSINT-driven recon, pretexting, phishing infrastructure, and the legal and ethical boundaries that separate professional work from criminal activity.

    Intermediate4/5Joe Gray
  5. 05 · 2018

    The Hacker Playbook 3

    Practical Guide to Penetration Testing — Red Team Edition

    Peter Kim's hands-on red-team field manual: assumed-breach scenarios, lateral movement, AV/EDR evasion, and the operational rhythm of a real engagement rather than a checklist of CVEs.

    Intermediate4/5Peter Kim
  6. 06 · 2014

    Penetration Testing

    A Hands-On Introduction to Hacking

    Georgia Weidman's lab-driven introduction to pentesting, walking the reader from setting up a target environment through scanning, exploitation, post-exploitation, and reporting.

    Beginner4/5Georgia Weidman
  7. 07 · 2005

    The Art of Intrusion

    The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

    Mitnick and Simon's follow-up to The Art of Deception: third-party stories from working hackers — casino slot exploits, prison-network breaches, post-9/11 intelligence ops — reconstructed and annotated by Mitnick.

    Beginner4/5Kevin Mitnick, William L. Simon
  8. 08 · 2018

    Pentesting Azure Applications

    The Definitive Guide to Testing and Securing Deployments

    Matt Burrough on attacker behaviour against Azure tenants: identity, storage, VMs, key material handling, and the recon paths that work against real subscriptions.

    Intermediate3/5Matt Burrough
  9. 09 · 2015

    The Mobile Application Hacker's Handbook

    Chell, Erasmus, Colley, and Whitehouse's reference on iOS and Android application security from the early-mid 2010s — runtime hooking, transport security, IPC abuse, and the platform-specific surface of mobile pentesting.

    Intermediate3/5Dominic Chell, Tyrone Erasmus, Shaun Colley, Ollie Whitehouse

Related topics