Unix Power Tools
Shelley Powers
Malware Data Science
Joshua Saxe, Hillary Sanders
Metasploit: The Penetration Tester's Guide
David Kennedy, Jim O'Gorman, Devon Kearns, Mati Aharoni
Practical Malware Analysis
Michael Sikorski and Andrew Honig
Cybersecurity Ops with bash
Paul Troncone & Carl Albing Ph.D.