Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
Adversarial Tradecraft in Cybersecurity
Dan Borges
Antivirus Bypass Techniques
Nir Yehoshua & Uriel Kosayev
Mastering Kali Linux for Advanced Penetration Testing
Vijay Kumar Velu
Penetration Testing Azure for Ethical Hackers
David Okeyode & Karl Fosaaen & Charles Horton
Pentesting Industrial Control Systems
Paul Smith
Practical Hardware Pentesting
Jean-Georges Valle
The Ultimate Kali Linux Book - Second Edition
Glen D. Singh
The Web Application Hacker's Handbook
Dafydd Stuttard & Marcus Pinto
PoC or GTFO
Manul Laphroaig
POC||GTFO (1)
Designing BSD Rootkits
Joseph Kong