Some useful books related to Cybersecurity, Linux and more.
☆76Updated this week
Alternatives and similar repositories for CyberSec-Books
Users that are interested in CyberSec-Books are comparing it to the libraries listed below
Sorting:
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆33Apr 14, 2025Updated 10 months ago
- A Simple JS code to keylogger data and send it to the personal server☆31Dec 30, 2024Updated last year
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆40Apr 1, 2025Updated 10 months ago
- An AI-driven vulnerability scanner that uses Nmap to discover open services on a user-supplied IP, matches each service to relevant CVEs …☆46Jun 1, 2025Updated 8 months ago
- ☆19Sep 24, 2025Updated 5 months ago
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 2 years ago
- 蜜罐检测工具,支持自动化URL去重、多线程控制及智能速率限制。可识别伪装服务。☆16Jun 5, 2025Updated 8 months ago
- ☆11Aug 31, 2023Updated 2 years ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 weeks ago
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Dec 15, 2023Updated 2 years ago
- HackerOne Notifier is an automated bot that monitors new programs launched on HackerOne and sends Telegram Bot notifications whenever a n…☆22Nov 4, 2025Updated 3 months ago
- CVE-2023-20273 Exploit PoC☆14Apr 1, 2024Updated last year
- ☆15May 3, 2024Updated last year
- 免杀木马样本☆103Oct 11, 2025Updated 4 months ago
- BlackHat Asia 2025 code and presentations☆18Apr 13, 2025Updated 10 months ago
- ☆13Dec 21, 2023Updated 2 years ago
- MalwareScan is a lightweight and fast malware scanner written in Python. It supports both Windows and Linux platforms and provides an ope…☆13Jun 2, 2025Updated 8 months ago
- Advanced test for proxy & waf☆14Feb 10, 2026Updated 2 weeks ago
- ☆16Oct 18, 2024Updated last year
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Sep 15, 2024Updated last year
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- python keylogger and spying malware .☆15Apr 24, 2025Updated 10 months ago
- A tool to check microsofts user real endpoint to get data about a tenant.☆16Feb 6, 2025Updated last year
- Elasticsearch Stack Overflow Vulnerability☆18Sep 23, 2023Updated 2 years ago
- This is the latest version of XenoRAT, updated with configurations and capable of bypassing all system securities. It will be maintained …☆23Apr 16, 2025Updated 10 months ago
- Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploit☆18Jun 3, 2024Updated last year
- Guía completa para configurar y utilizar servicios financieros NO-KYC. Este repositorio cubre herramientas de finanzas digitales anónimas…☆16Aug 7, 2024Updated last year
- Unauthorized Docker Exploitation Tool☆37Dec 24, 2023Updated 2 years ago
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Dec 14, 2023Updated 2 years ago
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆42Oct 18, 2023Updated 2 years ago
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆24Nov 12, 2024Updated last year
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 8 months ago
- GBounty Profiles are customizable security test definitions used by the GBounty web scanner to identify vulnerabilities in web applicatio…☆25Mar 11, 2025Updated 11 months ago
- Proof of Concept Exploit for CVE-2024-9464☆45Oct 9, 2024Updated last year
- Discovering Typo Squatting on your domains!☆80Jul 30, 2024Updated last year
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.☆73Jul 29, 2025Updated 7 months ago
- It automates the generation of search queries to discover exposed resources such as sensitive files, admin panels, open directories, and …☆76Updated this week