//Topic

Best Tooling books

7 books in our catalog cover Tooling, ranked by rating. Each entry is an opinionated review with who the book is for and who should skip it.

  1. 01 · 2018

    Practical Binary Analysis

    Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly

    Dennis Andriesse on the binary toolchain you can actually script: ELF internals, dynamic taint analysis, symbolic execution and instrumentation with concrete code-along examples.

    Advanced5/5Dennis Andriesse
  2. 02 · 2025

    Metasploit

    The Penetration Tester's Guide

    The second edition of the definitive No Starch guide to the Metasploit Framework, updated by the project's original maintainers and newer contributors for the modern Framework.

    Intermediate4/5David Kennedy, Mati Aharoni, Devon Kearns, Jim O'Gorman, Daniel G. Graham
  3. 03 · 2024

    Black Hat Bash

    Creative Scripting for Hackers and Pentesters

    Nick Aleks and Dolev Farhi on getting offensive work done with the shell: privilege escalation tooling, lateral movement, and pipelining bash with the rest of the toolkit.

    Intermediate4/5Nick Aleks, Dolev Farhi
  4. 04 · 2021

    Black Hat Python

    Python Programming for Hackers and Pentesters

    Justin Seitz and Tim Arnold's hands-on tour of writing offensive tooling in Python: network sniffers, web scrapers, GitHub-based command-and-control, screen capture, keylogging, and Volatility extensions.

    Intermediate4/5Justin Seitz, Tim Arnold
  5. 05 · 2020

    Black Hat Go

    Go Programming For Hackers and Pentesters

    Tom Steele, Chris Patten, and Dan Kottmann show how to use Go's networking primitives, concurrency model, and cross-compilation to write offensive tooling that runs almost anywhere.

    Intermediate4/5Tom Steele, Chris Patten, Dan Kottmann
  6. 06 · 2014

    Penetration Testing

    A Hands-On Introduction to Hacking

    Georgia Weidman's lab-driven introduction to pentesting, walking the reader from setting up a target environment through scanning, exploitation, post-exploitation, and reporting.

    Beginner4/5Georgia Weidman
  7. 07 · 2011

    The IDA Pro Book

    The Unofficial Guide to the World's Most Popular Disassembler

    Chris Eagle's deep manual on IDA Pro, the disassembler that defined a generation of reverse engineering. Useful even with Ghidra in the picture, since most malware-analysis literature still assumes IDA.

    Intermediate4/5Chris Eagle

Related topics