Welcome to the Web2 & Web3 Security Books Collection!
This repository is a curated library of essential books, papers, and guides covering:
- ✅ Web2 Security
- ✅ Web3 Security & Smart Contract Hacking
- ✅ Blockchain Development
- ✅ Offensive & Defensive Security
- ✅ General Cybersecurity
Whether you are a bug hunter, smart contract auditor, penetration tester, or just curious about modern web security, you’ll find valuable resources here.
The repository is organized into folders by topics. Each folder contains PDF/EPUB files, summaries, and reading notes (when available).
Main Sections:
Web2_Security/– Classic web security books (OWASP, Web App Hacking, Penetration Testing)Web3_Security/– Smart contract hacking, DeFi security, blockchain vulnerabilitiesBlockchain_Development/– Development best practices, Solidity, Rust for blockchainGeneral_Cybersecurity/– Red teaming, blue teaming, cryptographyGuides_And_Notes/– Study notes, cheat sheets, lab exercises
Security is a moving target. The more you read, the better you think like an attacker and defender.
This repo is my personal library and open for everyone who wants to level up their skills.
| Title | Brief Description |
|---|---|
| 📗 Advanced Blockchain Development | An in-depth guide to designing and developing blockchain applications and smart contracts for real-world projects, focusing on practical tools and development concepts. |
| 📗 Advanced Blockchain Technology Frameworks and Enterprise-Level Practices | Explores advanced blockchain frameworks and implementation strategies for enterprises, ideal for developers and system architects. |
| 📗 Blockchain and Ethereum Smart Contract Solution Development | A comprehensive introduction to Ethereum smart contract development and related tools, featuring project-based examples. |
| 📗 Blockchain A to Z Explained: Become a Blockchain Pro with 400+ Terms | A comprehensive glossary and definitions in the blockchain space; an excellent resource for quickly understanding basic and advanced concepts. |
| 📗 Blockchain for Cybersecurity and Privacy: Internal Audit and IT Audit | Examines the role of blockchain in cybersecurity and IT auditing, suitable for security and audit professionals. |
| 📗 Blockchain Security from the Bottom Up | A step-by-step approach to understanding blockchain security principles, from data structures to smart contract protection. |
| 📗 Blockchain from Concept to Execution | A detailed guide from initial concepts to the actual implementation of blockchain in projects, featuring practical and structured examples. |
| Title | Brief Description |
|---|---|
| 📘 Advanced Web Attacks and Exploitation (AWAE) | A specialized book for identifying and exploiting advanced web vulnerabilities; aimed at penetration testers and ethical hackers. |
| 📘 Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities | A complete guide to hunting security bugs in web applications; ideal for entering the bug bounty and practical security field. |
| 📘 The Web Application Hacker's Handbook (2nd Edition) | One of the most referenced resources in web penetration testing; covers concepts from basics to advanced exploitation techniques. |
| 📘 HTTP: The Definitive Guide | An in-depth explanation of the HTTP protocol and how it works in browsers and servers; an essential reference for understanding web security. |
| 📘 Black Hat Bash | A collection of Bash techniques and scripts for automating penetration testing and performing attacks in Linux environments. |
