Some useful books related to Cybersecurity, Linux and more.
☆79Feb 27, 2026Updated 3 weeks ago
Alternatives and similar repositories for CyberSec-Books
Users that are interested in CyberSec-Books are comparing it to the libraries listed below
Sorting:
- A Simple JS code to keylogger data and send it to the personal server☆31Dec 30, 2024Updated last year
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆33Apr 14, 2025Updated 11 months ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆40Apr 1, 2025Updated 11 months ago
- An AI-driven vulnerability scanner that uses Nmap to discover open services on a user-supplied IP, matches each service to relevant CVEs …☆46Jun 1, 2025Updated 9 months ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated last month
- 免杀木马样本☆105Oct 11, 2025Updated 5 months ago
- HackerOne Notifier is an automated bot that monitors new programs launched on HackerOne and sends Telegram Bot notifications whenever a n…☆22Nov 4, 2025Updated 4 months ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- MalwareScan is a lightweight and fast malware scanner written in Python. It supports both Windows and Linux platforms and provides an ope…☆13Jun 2, 2025Updated 9 months ago
- python keylogger and spying malware .☆15Apr 24, 2025Updated 10 months ago
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Dec 15, 2023Updated 2 years ago
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.☆73Jul 29, 2025Updated 7 months ago
- Elasticsearch Stack Overflow Vulnerability☆18Sep 23, 2023Updated 2 years ago
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- 蜜罐检测工具,支持自动化URL去重、多线程控制及智能速率限制。可识别伪装服务。☆16Jun 5, 2025Updated 9 months ago
- ☆15May 3, 2024Updated last year
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 11 months ago
- ☆11Aug 31, 2023Updated 2 years ago
- ☆20Sep 24, 2025Updated 5 months ago
- thelordseye searches and returns detailed information about devices that are directly connected to the internet [IoT] (Smart TV's, Fridge…☆77Oct 25, 2023Updated 2 years ago
- Analyse MSI files for vulnerabilities☆142Aug 30, 2024Updated last year
- ☆13Dec 21, 2023Updated 2 years ago
- BlackHat Asia 2025 code and presentations☆18Apr 13, 2025Updated 11 months ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- Advanced test for proxy & waf☆14Feb 10, 2026Updated last month
- A pixel-art exercise companion that nudges you to move during long Claude Code runs☆39Feb 26, 2026Updated 3 weeks ago
- ☆10Nov 14, 2018Updated 7 years ago
- ☆91Mar 17, 2025Updated last year
- Easy peasy file uploads☆32Aug 29, 2025Updated 6 months ago
- Yet Another Memory Analyzer for malware detection☆24Aug 4, 2023Updated 2 years ago
- Web File Manager☆11Aug 21, 2025Updated 7 months ago
- CVE-2023-20273 Exploit PoC☆14Apr 1, 2024Updated last year
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆147Jan 12, 2025Updated last year
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Sep 15, 2024Updated last year
- DorkEye | Automated Google Dorking Tool for OSINT & Recon. Generates and runs advanced search queries to surface exposed files, admin pan…☆82Updated this week
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆42Oct 18, 2023Updated 2 years ago