Hacking and Cyber Security Ebooks | For More Visit -
☆86Oct 12, 2019Updated 6 years ago
Alternatives and similar repositories for Top-100-Hacking-Security-E-Books-Free-Download-2019
Users that are interested in Top-100-Hacking-Security-E-Books-Free-Download-2019 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Sep 6, 2023Updated 2 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Jan 7, 2023Updated 3 years ago
- Searches for the carrier unlock code for the Samsung Galaxy S 4G in a fast and easy way☆13May 18, 2015Updated 10 years ago
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆322Aug 8, 2024Updated last year
- Code injection is a technique where a process can insert a part of or all of its code from its own running process into another target pr…☆14Jun 15, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆48Feb 11, 2023Updated 3 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Jul 14, 2024Updated last year
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- ☆65Jan 14, 2023Updated 3 years ago
- Red Teaming tools and techniques☆57Feb 18, 2023Updated 3 years ago
- Progress of learning kernel development☆14Nov 20, 2022Updated 3 years ago
- A Web Platform API proposal for Blob URL☆10Feb 24, 2023Updated 3 years ago
- HTTP_POST Login BruteForce☆36Sep 26, 2022Updated 3 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆14Mar 9, 2023Updated 3 years ago
- A collection of resources related to vulnerability management.☆15Aug 8, 2023Updated 2 years ago
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Mar 15, 2024Updated 2 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Apr 10, 2024Updated 2 years ago
- Use to copy a file from an NTFS partitioned volume by reading the raw volume and parsing the NTFS structures.☆118Apr 22, 2021Updated 5 years ago
- ☆10Dec 13, 2022Updated 3 years ago
- ☆51Feb 8, 2024Updated 2 years ago
- H&E- Burp Highlighter and Extractor☆18Mar 29, 2023Updated 3 years ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Aug 13, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the t…☆767Mar 11, 2022Updated 4 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Jun 27, 2023Updated 2 years ago
- XOR-based shellcode encoder☆29Apr 20, 2023Updated 3 years ago
- A collection of random small Aggressor snippets that don't warrant their own repo☆25Mar 23, 2023Updated 3 years ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆41Apr 4, 2025Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆53Jul 25, 2023Updated 2 years ago
- A tool capable of bypassing easy root detection mechanisms by patching applications automatically (without frida).☆32Jun 20, 2024Updated last year
- Quick network scanner library. https://crates.io/crates/qscan☆93Dec 26, 2022Updated 3 years ago
- Linux Security and Hardening Security Guide☆215Sep 17, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆35Feb 2, 2026Updated 2 months ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 3 years ago
- Hacking and Learning consistently for 100 days straight af.☆18Apr 12, 2022Updated 4 years ago
- I have collected many Free Resources. Feel free share more resources☆317Feb 1, 2023Updated 3 years ago
- This repository contains a curated list of resources I suggest on LinkedIn and Twitter.📝🌝☆657May 4, 2024Updated last year
- A simple command line tool which quickly audits the Disallow entries of a site's robots.txt.☆23Apr 5, 2023Updated 3 years ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago