0xjashim / Top-100-Hacking-Security-E-Books-Free-Download-2019View external linksLinks
Hacking and Cyber Security Ebooks | For More Visit -
☆86Oct 12, 2019Updated 6 years ago
Alternatives and similar repositories for Top-100-Hacking-Security-E-Books-Free-Download-2019
Users that are interested in Top-100-Hacking-Security-E-Books-Free-Download-2019 are comparing it to the libraries listed below
Sorting:
- Code injection is a technique where a process can insert a part of or all of its code from its own running process into another target pr…☆14Jun 15, 2023Updated 2 years ago
- ☆18Sep 6, 2023Updated 2 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Apr 10, 2024Updated last year
- ☆47Feb 11, 2023Updated 3 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Jan 7, 2023Updated 3 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆24Jul 14, 2024Updated last year
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- Searches for the carrier unlock code for the Samsung Galaxy S 4G in a fast and easy way☆12May 18, 2015Updated 10 years ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- ☆52Feb 8, 2024Updated 2 years ago
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆321Aug 8, 2024Updated last year
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- Dont Gamble with Risk☆14Mar 4, 2024Updated last year
- ☆66Jan 14, 2023Updated 3 years ago
- Red Teaming tools and techniques☆56Feb 18, 2023Updated 2 years ago
- A collection of resources related to vulnerability management.☆15Aug 8, 2023Updated 2 years ago
- SSH Backdoor for android☆12Oct 4, 2024Updated last year
- This is a tool for bug hunters☆18Oct 16, 2025Updated 4 months ago
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Aug 13, 2023Updated 2 years ago
- A walkthrough of creating and using the Azure environment and Microsoft Sentinel to track attacks and plot attacks on a live map.☆23Mar 26, 2023Updated 2 years ago
- 1000 black hat tools Collected From github☆16Nov 28, 2019Updated 6 years ago
- A collection of random small Aggressor snippets that don't warrant their own repo☆25Mar 23, 2023Updated 2 years ago
- ☆14Mar 9, 2023Updated 2 years ago
- burpsuite extension☆14Feb 1, 2023Updated 3 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 2 years ago
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆34Feb 2, 2026Updated 2 weeks ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Jun 27, 2023Updated 2 years ago
- ☆138Apr 20, 2023Updated 2 years ago
- Cobalt Strike BOFS☆16Dec 20, 2023Updated 2 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- H&E- Burp Highlighter and Extractor☆18Mar 29, 2023Updated 2 years ago
- source code javascript by hoi dan it channel☆12Aug 29, 2021Updated 4 years ago
- "ImpELF: A Python-based ELF hashing utility that generates unique fingerprints for ELF binaries using their imported functions and librar…☆15Dec 26, 2023Updated 2 years ago
- Tool for scanning domains for .git directories.☆17Oct 2, 2023Updated 2 years ago
- Automated HTTP Request Repeating With Burp Suite☆40Apr 3, 2023Updated 2 years ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆42Apr 4, 2025Updated 10 months ago
- List of groups that are carrying out cyber actions in the conflict between Israel and Iran.☆30Updated this week
- ☆16Mar 11, 2024Updated last year