Scanning the Gates - Probing Networks and Systems Learn how Attackers - Both Ethical and Black Hat Hackers - Map Digital Terrain, Identify Weak Points, and Prepare for Exploitation Revenant, Byte Heftet / 2025 / Engelsk
Shadow Recon - Mastering Reconnaissance and OSINT Your Definitive Guide to the Most Critical Phase of any Hack -Where Information is Power, and the one who Knows the Most, Wins Revenant, Byte Heftet / 2025 / Engelsk
Breaking In - Basics of Exploitation and Gaining Access A Manual of Practice. You'll Get Hands-On Labs, Walkthroughs, and Attack Chains that Mirror How Real Hackers Operate Revenant, Byte Heftet / 2025 / Engelsk
Adversarial Intelligence AI Attackers vs. AI Defenders (2025 - 2035): From the First AI-Driven Phishing Campaigns to the Dawn of Artificial General Intelligence (AGI) in Cyber Conflict Revenant, Byte Heftet / 2025 / Engelsk
Con Artist's Playbook - Scams, Cons and Social Engineering Exposes the Modern Confidence Game - From Street Scams to AI-Driven Deepfake Deception Revenant, Byte Heftet / 2025 / Engelsk
AI in the Shadows Machine Learning for Cyber Attacks: How Artificial Intelligence Is Reinventing the Dark Arts of Black Hat Hacking - And What Can be Done to Fight It Revenant, Byte Heftet / 2025 / Engelsk
Zero-Day Arsenal Mastering Advanced Exploits and Malware: Inside the Hacker's Toolkit-From Reverse Engineering to Quantum-Era Cyber Threats Revenant, Byte Heftet / 2025 / Engelsk
Quantum Black Hat Hacking in the Quantum Era: Inside the Future of Codebreaking, Cyberwarfare, and Quantum Cybercrime Revenant, Byte Heftet / 2025 / Engelsk
Cracking the System - Windows and Linux Exploitation The Offensive Playbook: From Initial Access to Advanced Persistence Related to Operating Systems Hacking Revenant, Byte Heftet / 2025 / Engelsk
Network Infiltration Pen-Testing Internal Networks & Active Directory: End-to-End Field Manual to Understand how Windows Domains, Active Directory, and Core Administration Protocols Work in Practice Revenant, Byte Heftet / 2025 / Engelsk
Web Infiltration - Breaking into Web Applications This Book is Unapologetically Hacker Centric: Gritty, Direct, and Written like a Field Manual for Exploiters and Defenders Alike Revenant, Byte Heftet / 2025 / Engelsk
Quantum Internet The Unhackable Myth: A Clear, Hype-free Guide to what Quantum Networking Can (and can't) Do-for Beginners, Builders, Hackers and Decision-Makers Revenant, Byte Heftet / 2025 / Engelsk
After the Breach - Post-Exploitation, Persistence, and Cover-Up Pulling Back the Curtain on the Post Exploitation Phase, Exposing the Strategies, Tools, and Mindset of Those Who Thrive in the Shadows Revenant, Byte Heftet / 2025 / Engelsk
Stolen Identities - Identity Theft and Personal Finance Fraud Byte Revenant Unveils Explosive Book "Stolen Identities" - A Real-World Cybercrime Nonfiction Work That Could Save Your Life Revenant, Byte Heftet / 2025 / Engelsk
Into the Dark Foundations of the Cyber Underworld: The Ultimate Beginner's Guide to Hacking, Anonymity, and the Black Hat Mindset Revenant, Byte Heftet / 2025 / Engelsk
Weaponized Code Python Programming for Hackers: Turn Python into Your Most Powerful Hacking Weapon Revenant, Byte Heftet / 2025 / Engelsk
Beyond Black Hat The Future of Hacking: What Comes Next When Artificial Intelligence, Quantum Computing, and Cyber Physical Systems Collide with Human Ambition Revenant, Byte Heftet / 2025 / Engelsk