13 must-read hackers books like Metasploit: The Penetration Tester's Guide by David Kennedy

Cover of Metasploit: The Penetration Tester's Guide by David  Kennedy

Metasploit: The Penetration Tester's Guide

By: David Kennedy

4.06

Format: 328 pages, Paperback

"The best guide to the Metasploit Framework." —HD Moore, Founder of the Metasploit ProjectThe Metas…

If you liked the hackers plot in Metasploit: The Penetration Tester's Guide by David Kennedy , here is a list of 13 books like this:

Cover of Neuromancer (Sprawl, #1) by William Gibson

1. Neuromancer (Sprawl, #1)

By: William Gibson

3.89

Format: 268 pages, Kindle Edition

Hotwired to the leading edges of art and technology, Neuromancer is a cyberpunk, science fiction ma… read more

Similar categories in William Gibson's Neuromancer (Sprawl, #1) book and David Kennedy's Metasploit: The Penetration Tester's Guide

"Boy, I was daid."

-William Gibson, Neuromancer (Sprawl, #1)

"Things aren't different. Things are things."

-William Gibson, Neuromancer (Sprawl, #1)

"Don't let the little fuckers generation gap you."

-William Gibson, Neuromancer (Sprawl, #1)

"If god made anything better, he kept it for himself"

-William Gibson, Neuromancer (Sprawl, #1)

Cover of Black Hat Python: Python Programming for Hackers and Pentesters by Justin Seitz

2. Black Hat Python: Python Programming for Hackers and Pentesters

By: Justin Seitz

4.08

Format: 171 pages, Paperback

When it comes to creating powerful and effective hacking tools, Python is the language of choice fo… read more

Similar categories in Justin Seitz's Black Hat Python: Python Programming for Hackers and Pentesters book and David Kennedy's Metasploit: The Penetration Tester's Guide

  • computers
  • programming
  • computer science
  • hackers
  • nonfiction
  • technical
  • software
  • reference
  • technology
Cover of Ghost in the Wires: My Adventures as the World's Most Wanted Hacker by Kevin D. Mitnick, William L. Simon, Steve Wozniak

3. Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

By: Kevin D. Mitnick , William L. Simon , Steve Wozniak

4.12

Format: None pages, Hardcover

Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and n… read more

Similar categories in Kevin D. Mitnick's Ghost in the Wires: My Adventures as the World's Most Wanted Hacker book and David Kennedy's Metasploit: The Penetration Tester's Guide

  • computers
  • hackers
  • nonfiction
  • technology
Cover of Hacking: The Art of Exploitation by Jon Erickson

4. Hacking: The Art of Exploitation

By: Jon Erickson

4.04

Format: 192 pages, Paperback

A comprehensive introduction to the techniques of exploitation and creative problem-solving methods… read more

Similar categories in Jon Erickson's Hacking: The Art of Exploitation book and David Kennedy's Metasploit: The Penetration Tester's Guide

  • computers
  • technical
  • hackers
  • nonfiction
  • programming
  • computer science
  • technology
Cover of Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software by Michael Sikorski, Andrew Honig

5. Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software

By: Michael Sikorski , Andrew Honig

3.95

Format: 161 pages, Paperback

Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your… read more

Similar categories in Michael Sikorski's Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software book and David Kennedy's Metasploit: The Penetration Tester's Guide

  • computers
  • hackers
  • nonfiction
  • programming
  • computer science
  • reference
  • technology
Cover of Emotional Intelligence: Why It Can Matter More Than IQ by Daniel Goleman

6. Emotional Intelligence: Why It Can Matter More Than IQ

By: Daniel Goleman

4.05

Format: 352 pages, Hardcover

The groundbreaking book that redefines what it means to be smart, with a new introduction by the au… read more

Similar categories in Daniel Goleman's Emotional Intelligence: Why It Can Matter More Than IQ book and David Kennedy's Metasploit: The Penetration Tester's Guide

  • nonfiction
  • science
"In a very real sense we have two minds, one that thinks and one that feels"

-Daniel Goleman, Emotional Intelligence: Why It Can Matter More Than IQ

"Emotional self-control-- delaying gratification and stifling impulsiveness- underlies accomplishment of every sort"

-Daniel Goleman, Emotional Intelligence: Why It Can Matter More Than IQ

"[Sharmayne Williams:]...puoi avere tutte le emozioni possibili, ma non devi permettere che siano loro a manovrarti."

-Daniel Goleman, Emotional Intelligence: Why It Can Matter More Than IQ

"In the calculus of the heart it is the ratio of positive to negative emotions that determines the sense of well- being."

-Daniel Goleman, Emotional Intelligence: Why It Can Matter More Than IQ

Cover of The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws by Dafydd Stuttard, Marcus Pinto

7. The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws

By: Dafydd Stuttard , Marcus Pinto

4.00

Format: 142 pages, Paperback

This book is a practical guide to discovering and exploiting security flaws in web applications. Th… read more

Similar categories in Dafydd Stuttard's The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws book and David Kennedy's Metasploit: The Penetration Tester's Guide

  • computers
  • technical
  • hackers
  • nonfiction
  • programming
  • computer science
  • technology
Cover of The Time Machine by H.G. Wells, Greg Bear, Carlo Pagetti

8. The Time Machine

By: H.G. Wells , Greg Bear , Carlo Pagetti

3.89

Format: 118 pages, Paperback

“I’ve had a most amazing time....” So begins the Time Traveller’s astonishing firsthand account … read more

Similar categories in H.G. Wells's The Time Machine book and David Kennedy's Metasploit: The Penetration Tester's Guide

"For after the Battle comes quiet."

-H.G. Wells, The Time Machine

"We are kept keen on the grindstone of pain and necessity."

-H.G. Wells, The Time Machine

"It's against reason," said Filby. "What reason?" said the Time Traveller."

-H.G. Wells, The Time Machine

"[...] The slowest snail that ever crawled dashed by too fast for me. [...]"

-H.G. Wells, The Time Machine

9. The Pragmatic Programmer: From Journeyman to Master

By: Dave Thomas , Andy Hunt

3.28

Format: 404 pages, Paperback

-- Ward Cunningham Straight from the programming trenches, The Pragmatic Programmer cuts through th… read more

Similar categories in Dave Thomas's The Pragmatic Programmer: From Journeyman to Master book and David Kennedy's Metasploit: The Penetration Tester's Guide

10. The Library at Mount Char

By: Scott Hawkins

3.44

Format: 96 pages, Paperback

A missing God. A library with the secrets to the universe. A woman too busy to notice her heart sl… read more

Similar categories in Scott Hawkins's The Library at Mount Char book and David Kennedy's Metasploit: The Penetration Tester's Guide

11. Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems

By: Chris Sanders

4.29

Format: None pages, Paperback

It's easy enough to install Wireshark and begin capturing packets off the wire--or from the air. Bu… read more

Similar categories in Chris Sanders's Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems book and David Kennedy's Metasploit: The Penetration Tester's Guide

12. Gray Hat Python: Python Programming for Hackers and Reverse Engineers

By: Justin Seitz

4.50

Format: None pages, Paperback

Python is fast becoming the programming language of choice for hackers, reverse engineers, and soft… read more

Similar categories in Justin Seitz's Gray Hat Python: Python Programming for Hackers and Reverse Engineers book and David Kennedy's Metasploit: The Penetration Tester's Guide

Cover of This Is How They Tell Me the World Ends: The Cyberweapons Arms Race by Nicole Perlroth

13. This Is How They Tell Me the World Ends: The Cyberweapons Arms Race

By: Nicole Perlroth

4.34

Format: 528 pages, Hardcover

From The New York Times cybersecurity reporter Nicole Perlroth, the untold story of the cyberweapon… read more

Similar categories in Nicole Perlroth's This Is How They Tell Me the World Ends: The Cyberweapons Arms Race book and David Kennedy's Metasploit: The Penetration Tester's Guide

  • computer science
  • science
  • nonfiction
  • technology
"Finding a zero day is a little like entering God mode in a video game. Once hackers have figured out the commands or written the code to exploit it, they can scamper through the world's computer netw…"

-Nicole Perlroth, This Is How They Tell Me the World Ends: The Cyberweapons Arms Race

Cover of Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World by Joseph Menn

14. Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World

By: Joseph Menn

3.75

Format: 256 pages, Hardcover

The shocking untold story of the elite secret society of hackers fighting to protect our privacy, o… read more

Similar categories in Joseph Menn's Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World book and David Kennedy's Metasploit: The Penetration Tester's Guide

  • computers
  • science
  • hackers
  • nonfiction
  • computer science
  • technology
"Security is about how you configure power, and who has access to what. That is political,"

-Joseph Menn, Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World

"If the combination of mindless, profit-seeking algorithms, dedicated geopolitical adversaries, and corrupt US opportunists over the past few years has taught us anything, it is that serious applied t…"

-Joseph Menn, Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World

Cover of Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali by OccupyTheWeb

15. Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali

By: OccupyTheWeb

4.13

Format: 248 pages, Kindle Edition

This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a f… read more

Similar categories in OccupyTheWeb's Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali book and David Kennedy's Metasploit: The Penetration Tester's Guide

  • computers
  • programming
  • science
  • computer science
  • hackers
  • nonfiction
  • technical
  • software
  • technology
Cover of Hacking the Hacker: Learn From the Experts Who Take Down Hackers by Roger A. Grimes

16. Hacking the Hacker: Learn From the Experts Who Take Down Hackers

By: Roger A. Grimes

4.27

Format: 250 pages, Kindle Edition

Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes y… read more

Similar categories in Roger A. Grimes's Hacking the Hacker: Learn From the Experts Who Take Down Hackers book and David Kennedy's Metasploit: The Penetration Tester's Guide

  • computer science
  • hackers
  • nonfiction
  • technology
Cover of Metasploit Penetration Testing Cookbook by Abhinav Singh

17. Metasploit Penetration Testing Cookbook

By: Abhinav Singh

3.72

Format: 320 pages, Paperback

Metasploit software helps security and IT professionals identify security issues, verify vulnerabil… read more

Similar categories in Abhinav Singh's Metasploit Penetration Testing Cookbook book and David Kennedy's Metasploit: The Penetration Tester's Guide

  • hackers
  • technical
Cover of Metasploit: The Penetration Tester's Guide by David  Kennedy

18. Metasploit: The Penetration Tester's Guide

By: David Kennedy

4.06

Format: 328 pages, Paperback

"The best guide to the Metasploit Framework." —HD Moore, Founder of the Metasploit ProjectThe Metas… read more

Similar categories in David Kennedy's Metasploit: The Penetration Tester's Guide book and David Kennedy's Metasploit: The Penetration Tester's Guide

  • computers
  • programming
  • science
  • computer science
  • hackers
  • nonfiction
  • technical
  • software
  • reference
  • technology
Cover of No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing by Johnny Long

19. No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

By: Johnny Long

3.94

Format: 384 pages, Paperback

Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units in… read more

Similar categories in Johnny Long's No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing book and David Kennedy's Metasploit: The Penetration Tester's Guide

  • hackers
  • nonfiction
  • technical
  • computer science
  • technology
Cover of Gray Hat Hacking : The Ethical Hacker's Handbook by Shon Harris

20. Gray Hat Hacking : The Ethical Hacker's Handbook

By: Shon Harris

4.08

Format: 434 pages, Paperback

Analyze your company’s vulnerability to hacks with expert guidance from Gray Hat The Ethical Hacke… read more

Similar categories in Shon Harris's Gray Hat Hacking : The Ethical Hacker's Handbook book and David Kennedy's Metasploit: The Penetration Tester's Guide

  • computers
  • programming
  • computer science
  • hackers
  • nonfiction
  • technical
  • software
  • reference
  • technology
Cover of Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning by Gordon Fyodor Lyon

21. Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning

By: Gordon Fyodor Lyon

4.35

Format: 464 pages, Paperback

Nmap Network Scanning is the official guide to the Nmap Security Scanner, a free and open source ut… read more

Similar categories in Gordon Fyodor Lyon's Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning book and David Kennedy's Metasploit: The Penetration Tester's Guide

  • computers
  • technical
  • hackers
  • nonfiction
  • programming
  • computer science
  • reference
  • technology

14 Best nonfiction books like Metasploit: The Penetration Tester's Guide by David Kennedy

Transform Your Habits

Black Hat Python: Python Programming for Hackers and Pentesters

Justin Seitz

4.08

Transform Your Habits

Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

Kevin D. Mitnick , William L. Simon , Steve Wozniak

4.12

Transform Your Habits

Hacking: The Art of Exploitation

Jon Erickson

4.04

Transform Your Habits

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software

Michael Sikorski , Andrew Honig

3.95

View all the books

18 must-read audiobook books like This Is How They Tell Me the World Ends: The Cyberweapons Arms Race by Nicole Perlroth

Transform Your Habits

Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door

Brian Krebs

3.75

Transform Your Habits

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon

Kim Zetter

4.17

Transform Your Habits

Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

Kevin D. Mitnick , William L. Simon , Steve Wozniak

4.12

Transform Your Habits

Chip War: The Fight for the World's Most Critical Technology

Chris Miller

4.44

View all the books

Never miss a story from us, get weekly updates in your inbox.