7h3pr0xy / hacking-ebooksView external linksLinks
penetration testing ebooks for free
☆12Nov 4, 2019Updated 6 years ago
Alternatives and similar repositories for hacking-ebooks
Users that are interested in hacking-ebooks are comparing it to the libraries listed below
Sorting:
- Get latest Exploit Databases notification on your Desktop☆16Jan 29, 2020Updated 6 years ago
- Secured RESTful service with HTTP basic and JWT☆16May 31, 2022Updated 3 years ago
- Chat app using Node js.Using socket .io how we made our chat app without a database☆15Sep 19, 2020Updated 5 years ago
- A Tools For Spoon (https://spooncast.net), to Increase Tap Love, Fans, Viewers Of Fans, Report, and etc.☆10Nov 9, 2022Updated 3 years ago
- Microservice base Oauth2 authorization Server. this program is designed using Java and Spring Boot, which can be used to register and aut…☆22Sep 12, 2022Updated 3 years ago
- Pentdroid is a handy utility tool which helps in automating tedious apk operations required during android app security assessments☆26Jun 24, 2017Updated 8 years ago
- RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocol☆36Apr 26, 2021Updated 4 years ago
- Logr - logging and metrics service☆14Jul 6, 2025Updated 7 months ago
- en temel anlamıyla yazılım öğrenme sürecini anlamaya ve anlatmaya çalışmak☆12Dec 3, 2020Updated 5 years ago
- ☆10Nov 24, 2018Updated 7 years ago
- My code and notes for "From Day Zero to Zero Day", a book on vulnerability research by Eugene Lim.☆27Nov 10, 2025Updated 3 months ago
- Captain Crunch is a modern wordlist generator that lets you specify a collection of character sets and then generate all possible permuta…☆11Feb 2, 2021Updated 5 years ago
- this used to be a private virus but i have it so now its not☆12Oct 18, 2021Updated 4 years ago
- A High Performance PCRE Regex Package That Uses A Cache.☆12Oct 15, 2023Updated 2 years ago
- siml is a CLI tool for discovering similar, related to, competitive, or alternative options to a given site.☆14Apr 30, 2023Updated 2 years ago
- Planeta Linux SCM repo☆21Sep 19, 2009Updated 16 years ago
- A lightweight WAF (web app firewall) written in Golang☆13May 3, 2021Updated 4 years ago
- A high-performance matcher designed to solve LOGICAL and TEXT VARIATIONS problems in word matching, implemented in Rust.☆17Jan 2, 2026Updated last month
- Runtime enforcement of software supply chain capabilities in Go☆19Nov 12, 2025Updated 3 months ago
- 🦈 Prometheus exporter for pcap metrics☆16Feb 15, 2023Updated 3 years ago
- ☆10Jul 7, 2018Updated 7 years ago
- A modular, scalable, fast and reliable phishing detection framework☆11Dec 1, 2018Updated 7 years ago
- Malware WinXPSP2.Cermalus Windows Kernel Virus☆16Aug 11, 2023Updated 2 years ago
- Using this tool you can increase visitors in your blog. Just copy link and paste, enter number of visitors and wait for the process. Not …☆10Aug 18, 2020Updated 5 years ago
- ☆11Dec 19, 2024Updated last year
- Allows you to claim the vehicle you are in as your personal vehicle.☆11Dec 12, 2025Updated 2 months ago
- PoC for CVE-2025-48384☆20Jul 9, 2025Updated 7 months ago
- Go library to abstract away communication with the fail2ban socket☆18Jun 20, 2024Updated last year
- Golang logger to different configurable writers.☆12Dec 27, 2020Updated 5 years ago
- SSL Pinning Plugin Flutter☆48Nov 19, 2023Updated 2 years ago
- teler Caddy integrates the powerful security features of teler WAF into the Caddy web server, ensuring your web servers remain secure and…☆17Feb 24, 2025Updated 11 months ago
- This is a simple web application that allows a company to track the transaction that are done for a product before its is bought by the u…☆12May 1, 2023Updated 2 years ago
- Data Backend server that uses eBPF to monitor network connections and provide real-time network analytics.☆18Aug 14, 2025Updated 6 months ago
- Unofficial Iranian hackers group disk wiper malware aka "Shamoon" in .NET 2.0☆13Dec 23, 2018Updated 7 years ago
- Website vuln example.☆11Sep 26, 2025Updated 4 months ago
- ☆12Jul 27, 2022Updated 3 years ago
- A fast, deterministic, non-cryptographic hash for use in hash tables for Rust☆15Jan 12, 2021Updated 5 years ago
- Penetration Testing Methodology - short notes☆11May 30, 2015Updated 10 years ago
- CPU/Battery power management tool for Linux systems☆32Feb 6, 2026Updated last week