A comprehensive collection of CyberSecurity PDFs. Guides, Research Papers, Education, Information Security, Network Security, Cryptography, Malware Analysis, Penetration Testing, Ethical Hacking, Data Protection, Privacy, Threat Intelligence, Incident Response, Digital Forensics.
☆97Sep 16, 2024Updated last year
Alternatives and similar repositories for CyberSecurity_PDF_Vault
Users that are interested in CyberSecurity_PDF_Vault are comparing it to the libraries listed below
Sorting:
- Complete Malware Index - Use at your own Risk!☆19Sep 2, 2024Updated last year
- Bullet-proof your custom GPT system prompt security with KEVLAR, the ultimate prompt protector against rules extraction, prompt injection…☆20Apr 12, 2024Updated last year
- MINOTAUR: The STRONGEST Secure Prompt EVER! Prompt Security Challenge, Impossible GPT Security, Prompts Cybersecurity, Prompting Vulnerab…☆25Mar 27, 2024Updated last year
- HYDRAX, Advanced Malware Generation, Stealth and Evasion Techniques, Exploit Development, Botnet Command and Control (C&C), Payload Custo…☆25Dec 9, 2024Updated last year
- Cyber-Security Bible! Theory and Tools, Kali Linux, Penetration Testing, Bug Bounty, CTFs, Malware Analysis, Cryptography, Secure Program…☆175Mar 6, 2026Updated 2 weeks ago
- A curated collection of free or freemium web-based penetration testing and vulnerability analysis tools. These tools assist security prof…☆100Apr 17, 2025Updated 11 months ago
- Command line interface (CLI) to install Kali Linux Tools in your desired distribution.☆11May 27, 2022Updated 3 years ago
- This is BL4CKH4T|G0D, the ultimate Ai Criminal. Jailbroken ChatGPT, Unrestricted AI, Evil GPT, LLM Hacker, Ai Malware Writer, GPT Crimina…☆207Dec 9, 2024Updated last year
- This repository is based on the book "Black Hat Python" contains code and resources related to the tools and scripts discussed in the boo…☆15May 6, 2022Updated 3 years ago
- QR designer web app with a novel method of designing qr codes that does not take advantage of error correction☆10Sep 24, 2024Updated last year
- This project provides a web interface to send a payload via SMS, display device information upon successful delivery, and control the dev…☆19Feb 20, 2026Updated last month
- A Simplified Hacking Interface for Beginners in Kali Linux☆24Oct 26, 2021Updated 4 years ago
- This script downloads the eDEX-UI appimage, grants execution permissions and creates a menu shortcut with an icon. Made by androrama | fe…☆30Feb 26, 2026Updated 3 weeks ago
- Termux and Kali Linux all Commands☆10Sep 2, 2021Updated 4 years ago
- documentations, slides decks...☆22Sep 24, 2024Updated last year
- ☆10Apr 2, 2023Updated 2 years ago
- Cyberex Secure is planned to be a security solution with a wide range of features such as phishing detection, advanced AI- face recognit…☆12Apr 5, 2023Updated 2 years ago
- AI SUGGEST is a powerful command-line assistant that leverages AI to provide accurate Linux commands based on natural language queries. S…☆11Aug 22, 2024Updated last year
- Okay DaVinci is an AI personal assistant fueled by Elevenlabs and ChatGPT☆29Sep 24, 2024Updated last year
- 1000 black hat tools Collected From github☆81Dec 12, 2023Updated 2 years ago
- Black Pro Dashboard For Laravel Framework 11.x and Up☆12May 27, 2024Updated last year
- Add AI to the Linux terminal☆10Apr 28, 2024Updated last year
- Search Termux Commands and Guide in Termux !!☆11Apr 29, 2022Updated 3 years ago
- Designing a Dashboard for Transparency and Control of Conversational AI, https://arxiv.org/abs/2406.07882☆33Oct 7, 2025Updated 5 months ago
- Official Black Hat Arsenal Security Tools Repository☆19Jan 1, 2018Updated 8 years ago
- DevOps Golang tools☆59Feb 3, 2026Updated last month
- Linux kernel source code for Galaxy S22. Extracted from SM-S901U_NA_12_Opensource.zip☆15Oct 7, 2022Updated 3 years ago
- Crypto Wallet Hunter: A program to find cryptocurrency wallets with balances. Supports BTC, ETH, TRX, and BNB. Features multi-threaded se…☆13Jan 10, 2025Updated last year
- ☆30Updated this week
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆18Sep 12, 2017Updated 8 years ago
- Kali Nethunter for any android device since from kitkat and upper☆15Aug 10, 2017Updated 8 years ago
- ohmyzsh theme to match HTB PwnBox shell☆13Mar 26, 2023Updated 2 years ago
- Implementation of USENIX'2024 paper "Racing for TLS Certificate Validation: A Hijacker’s Guide to the Android TLS Galaxy"☆20Apr 4, 2024Updated last year
- An AI-CyberSecurity Bot that assists security analysts in incident investigations☆40Feb 21, 2025Updated last year
- Browser streaming MITM proxy☆30Sep 5, 2023Updated 2 years ago
- ☆25Jul 27, 2024Updated last year
- The open-source AI chat app for everyone.☆24Sep 24, 2024Updated last year
- Fluxion is the future of MITM WPA attacks Fluxion is a security auditing and social-engineering research tool. It is a remake of linset …☆16Oct 1, 2020Updated 5 years ago
- Orchestrate fleets of Claude Code & Claude Computer Use agents across containers, VMs, and physical devices. Live desktop streaming, inte…☆91Mar 11, 2026Updated last week