"OffSec's Exploit Database Archive". www.exploit-db.com. Archived from the original on 2016-07-29. Retrieved 2024-05-21. https://www.exploit-db.com/
Clarke, Glen E. (2020-10-26). CompTIA PenTest+ Certification For Dummies. John Wiley & Sons. ISBN 978-1-119-63357-0. Archived from the original on 2024-05-21. Retrieved 2024-06-09. 978-1-119-63357-0
Chapple, Mike; Seidl, David (2018-10-23). CompTIA PenTest+ Study Guide: Exam PT0-001. John Wiley & Sons. ISBN 978-1-119-50424-5. 978-1-119-50424-5
Hughes, Chris; Robinson, Nikki (2024-03-22). Effective Vulnerability Management: Managing Risk in the Vulnerable Digital Ecosystem. John Wiley & Sons. ISBN 978-1-394-22121-9. 978-1-394-22121-9
Schultz, Corey P.; Perciaccante, Bob (2017-09-12). Kali Linux Cookbook. Packt Publishing Ltd. ISBN 978-1-78439-425-7. Archived from the original on 2024-05-21. Retrieved 2024-06-09. 978-1-78439-425-7
Baloch, Rafay (2017-09-29). Ethical Hacking and Penetration Testing Guide. CRC Press. pp. 135, 136, 137, 272, 431. ISBN 978-1-4822-3162-5. Archived from the original on 2024-05-21. Retrieved 2020-12-10. 978-1-4822-3162-5
Messier, Ric (2019-06-25). CEH v10 Certified Ethical Hacker Study Guide. John Wiley & Sons. pp. 235, 236, 243, 536, 547. ISBN 978-1-119-53319-1. Archived from the original on 2024-06-09. Retrieved 2024-06-09. 978-1-119-53319-1
"milw0rm productions - work in progress". 2004-05-08. Archived from the original on 2004-05-08. Retrieved 2024-05-21. https://web.archive.org/web/20040508202920/http://www.milw0rm.com/
"Penetration Testing: Milw0rm / Str0ke Not Dead". seclists.org. Archived from the original on 2024-06-09. Retrieved 2024-05-21. https://seclists.org/pen-test/2009/Nov/25
Koch, Christian (January 31, 2023). "Which Programming Languages Do Hackers Use?". Towards Data Science. https://towardsdatascience.com/which-programming-languages-do-hackers-use-ac3ed9d3e8f8