Further reading
Once you have read this book, you may find that the following resources provide further details on these topics:
- To learn Ruby programming, refer to http://ruby-doc.com/docs/ProgrammingRuby/.
- For assembly programming, refer to https://github.com/lurumdare/awesome-asm.
- For exploit development, refer to https://www.corelan.be/.
- For more general information, refer to the Metasploit wiki page at https://github.com/rapid7/metasploit-framework/wiki/.
- For SCADA-based exploitation, refer to https://scadahacker.com/.
- For in-depth attack documentation on Metasploit, refer to https://www.offensive-security.com/metasploit-unleashed/.