33 lines
1.3 KiB
Markdown
33 lines
1.3 KiB
Markdown
# cipherstorm ⚡🕵️♀️
|
||
|
||
> Produced by Noir Stack for the community, because apparently the internet still needs one more vault of hacking PDFs.
|
||
> A cultivated archive of penetration testing, security, and cyber-mayhem reading material — from foundational network defense to “hold my beer”-level offensive research.
|
||
|
||
Organized by domain, each entry includes:
|
||
- Year of publication (so you can see exactly how out of date your “cutting edge” exploit is)
|
||
- Format (📕 = paid, 📖 = free, because rent exists)
|
||
- Source links (so you can pretend you did your own research)
|
||
|
||
### Categories
|
||
- Penetration Testing
|
||
- Web Application Security
|
||
- Reverse Engineering
|
||
- Malware Analysis
|
||
- Exploit Development
|
||
- Cryptography
|
||
- Incident Response
|
||
- Digital Forensics
|
||
- Social Engineering
|
||
- Security Management & Policy
|
||
|
||
---
|
||
|
||
**Disclaimer:**
|
||
This archive exists for curiosity, research, and the occasional sleepless night spent chasing down obscure exploits.
|
||
Use responsibly, with consent, and on systems you actually own — or ones where the owner buys you coffee instead of calling their lawyers.
|
||
If your “testing” accidentally makes the evening news, that’s on you.
|
||
|
||
---
|
||
|
||
_Contribution guidelines are available for those who wish to add their own cursed tomes to the archive._
|