These links are provided as a convenience to you and to assist in your search for information. Constantly updated (January, 2021).

The list is quite big so you’d better start by choosing a category from the Table of Contents to the right.

Security

Penetration testing

Password checking/cracking

Malware analysis/forensics

Privacy

Operating Systems

Browsers

Email Providers

Communication

Source Code Management

Decentralization

Hosting

DNS services

Virtualization

VPN stuff

Hardware

Mobile

Books

no links, use your favorite online store

  • Data Hiding - Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocol by Michael Raggo and Chet Hosmer
  • Ghost in the Wires by Kevin Mitnick
  • Kali Linux Wireless Penetration Testing by Vivek Tamachandran and Cameron Buchanan
  • The Art of Invisibility by Kevin Mitnick
  • Threat Modeling by Adam Shostack
  • Spy the Lie: Former CIA Officers Teach You How to Detect Deception by Philip Houston, Michael Floyd and Susan Carnicero
  • UNIX and Linux System Administration Handbook by Evi Nemeth, Garth Snyder and Trent R. Hein
  • The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power by Shoshana Zuboff
  • Defensive Security Handbook: Best Practices for Securing Infrastructure by Lee Brotherston and Amanda Berlin
  • Advanced Penetration Testing: Hacking the World’s Most Secure Networks by Wil Allsopp
  • Hiding from the Internet: Eliminating Personal Online Information by Michael Bazzell

Organizations

Activism

OS dev

Game dev

Cyberpunk and futurism

Literature

CubeSat

Retro

Photography

Others

People

in random order