📜"En este repositorio encontrarás una variedad de archivos PDF relacionados con ciberseguridad, tipos de auditorías, redes, hacking y el modelo OSI. Son materiales muy completos; te recomiendo totalmente que les des una mirada, no te arrepentirás. Además, incluí un resumen personal de cada PDF."
☆51Feb 7, 2026Updated 2 months ago
Alternatives and similar repositories for CIBERSEGURIDAD.TODOS-LOS-PDF
Users that are interested in CIBERSEGURIDAD.TODOS-LOS-PDF are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repositorio en el cual se guardaran varios recursos relacionados a la ciberseguridad para aprender.☆43Aug 29, 2019Updated 6 years ago
- ☆45Feb 28, 2024Updated 2 years ago
- Artículos relacionados a la Ciberseguridad y Hacking.☆181Oct 12, 2025Updated 6 months ago
- Simple Android app to sign APKs☆20Sep 4, 2024Updated last year
- eJPT is a hands-on, entry-level Red Team certification that simulates skills utilized during real-world engagements.☆36Apr 29, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Recursos de hacking ético☆283May 4, 2021Updated 4 years ago
- Collection of username lists for enumerating kerberos domain users☆107Dec 18, 2017Updated 8 years ago
- ☆14Oct 18, 2022Updated 3 years ago
- An easy to use library for interfacing the OpenAI chatGPT API with any WiFi enabled Arduino or ESP32.☆20Dec 11, 2024Updated last year
- Lista de proyectos de diseños y efectos web FrontEnd.☆18Jul 23, 2022Updated 3 years ago
- ☆17Jan 23, 2019Updated 7 years ago
- These are the notes i have been taking since i started learning about ethical hacking and cybersecurity☆24Oct 16, 2023Updated 2 years ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆104Dec 13, 2023Updated 2 years ago
- ☆45Apr 9, 2016Updated 10 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Useful tool to track location or mobile number.☆76Mar 10, 2026Updated last month
- ¿Quieres empezar en el mundo hacking? En esta revista te enseño a instalar Kali Linux desde cero y a manipular herramientas esenciales en…☆72Feb 2, 2025Updated last year
- E-books related to hacking helps you to know more about hacking☆491Aug 14, 2020Updated 5 years ago
- The most complete Phishing Tool, with 32 templates +1 customizable☆68Aug 7, 2018Updated 7 years ago
- Libro Aprende Python desde cero a experto☆99Jun 22, 2022Updated 3 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆226May 8, 2021Updated 4 years ago
- اشهر كتب الاختراق☆103Jul 31, 2023Updated 2 years ago
- ☆139May 17, 2017Updated 8 years ago
- A dos (denial of service) attack for local networks using dead router attack (IPv6) and ARP attack (IPv4) simultaneously☆139Apr 29, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A collection of FREE cyber security books☆625Jul 14, 2025Updated 9 months ago
- A production-grade, single codebase cross-platform UI framework with reactive signals, streaming SSR, and GPU rendering.☆63Feb 19, 2026Updated 2 months ago
- Notes I took while preparing for eJPT certification by INE Security (passed 19/20, fka eLearn Security)☆157Nov 1, 2025Updated 5 months ago
- Curso para aprender Ciberseguridad desde cero, en español y 100% gratis. Abarca 5 dominios fundamentales que necesitas conocer para poder…☆120May 27, 2023Updated 2 years ago
- Hi here will be a tool to disguise phishing sites.☆90May 29, 2023Updated 2 years ago
- Swiss army knife of hacking written in Golang, capable of performing various kinds of attacks 🐉☆189Sep 10, 2025Updated 7 months ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆448Jan 5, 2025Updated last year
- PassDetective is a command-line tool that scans shell command history to detect mistakenly written passwords, API keys, and secrets. Usin…☆145Jan 16, 2026Updated 3 months ago
- Frontend TODO List - CleanArchitecture | Hexagonal Architecture | DDD | React☆114Mar 1, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- The best Duolingo hack ever.☆89Jun 2, 2024Updated last year
- A living document for penetration testing and offensive security.☆316Jun 20, 2024Updated last year
- Reverse-Engineered Tools Count-119☆539Aug 11, 2023Updated 2 years ago
- MINIX 3 is a free, open-source, operating system designed to be highly reliable, flexible, and secure. http://www.minix3.org☆141Feb 6, 2023Updated 3 years ago
- Kali Linux advanced setup☆145Feb 28, 2026Updated 2 months ago
- Notes created for preparation of EJPTv2☆281Jan 18, 2023Updated 3 years ago
- GTK/VTE based terminal emulator☆220Apr 27, 2025Updated last year