# cipherstorm ⚡🕵️‍♀️ > Produced by Noir Stack for the community, because apparently the internet still needs one more vault of hacking PDFs. > A cultivated archive of penetration testing, security, and cyber-mayhem reading material — from foundational network defense to “hold my beer”-level offensive research. Organized by domain, each entry includes: - Year of publication (so you can see exactly how out of date your “cutting edge” exploit is) - Format (📕 = paid, 📖 = free, because rent exists) - Source links (so you can pretend you did your own research) ### Categories - Penetration Testing - Web Application Security - Reverse Engineering - Malware Analysis - Exploit Development - Cryptography - Incident Response - Digital Forensics - Social Engineering - Security Management & Policy --- **Disclaimer:** This archive exists for curiosity, research, and the occasional sleepless night spent chasing down obscure exploits. Use responsibly, with consent, and on systems you actually own — or ones where the owner buys you coffee instead of calling their lawyers. If your “testing” accidentally makes the evening news, that’s on you. --- _Contribution guidelines are available for those who wish to add their own cursed tomes to the archive._