okay, this is a group of pdf books, and bunch of more papers...
- Antivirus Bypass Techniques
- Windows Internals, Part 1 System architecture, processes, threads, memory management 7th ed
- Windows Internals, Part 2 System architecture, processes, threads, memory management 7th ed
- How to Hack Like a GHOST
- How to hack like a Pornstar
- How to Hack Like a GOD
- How to Hack Like a Legend
- How to Investigate Like a Rockstar
- Black Hat Go
- Black Hat Python
- Hands-On Penetration Testing on Windows Unleash Kali Linux, PowerShell, and Windows debugging
- Kali Linux - An Ethical Hackers Cookbook
- Learn to Program with C
- Linux Basics for Hackers
- Mastering Metasploit Write and implement sophisticated attack vectors
- Metasploit Penetration Testing Cookbook Evade antiviruses, bypass firewalls, and exploit complex environments
- Programming Windows
- Social Engineering The Art of Human Hacking
- The Hacker Playbook 3
- The web application hacker’s handbook
- Threat_Hunting_Hacking_and_Intrusion_Detection_SCADA_Dark_Web
- Launching_Exploits_One_Small_Vulnerability_For_A_Company,_One_Giant
- Assembly Language for x86 processors
- Reversing-Secrets of Reverse Engineering
- Open Source Fuzzing Tools
- Hacking_ the art of exploitation
- Penetration Testing Shellcode
- Packt.Practical.Hardware.Pentesting
- Buffer Overflow Attacks_ Detect, Exploit, Prevent
- Antivirus hackers handbook
- Windows System Programming
- intel IA 32 _ 64 arch complete manual
- memory manegment --- msdn-documentation
- list of ports