A collection of FREE cyber security books
☆628Jul 14, 2025Updated 9 months ago
Alternatives and similar repositories for cyber-security-books
Users that are interested in cyber-security-books are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Here you will get awesome collection of mostly all well-known and usefull cybersecurity books from beginner level to expert for all cyber…☆658Jul 12, 2022Updated 3 years ago
- This repository has E-books on Cybersecs☆124Jun 12, 2021Updated 4 years ago
- This repository contains a comprehensive collection of learning resources and notes that I've gathered on various topics, including cyber…☆573Jan 22, 2026Updated 3 months ago
- اشهر كتب الاختراق☆103Jul 31, 2023Updated 2 years ago
- List of CyberSecurity Resources and some different Sub-Domains of CyberSecurity☆560Aug 9, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Vulnerable Windows Application for Pentesters from the house of DarkRelay Security Labs. The project is along the lines of DVWA, AWSGoat …☆15Dec 28, 2023Updated 2 years ago
- Коллекция из нескольких сотен онлайн-инструментов для OSINT☆56Feb 11, 2022Updated 4 years ago
- A cybersecurity guy's curated list of useful browser bookmarks☆15Mar 6, 2025Updated last year
- Tool made in Flask to search for users on different platforms, to make OSINT. 🕵🏽♂️☆29Feb 3, 2026Updated 3 months ago
- Some great ebook for hacking☆30Sep 11, 2025Updated 7 months ago
- ☆2,251Sep 20, 2023Updated 2 years ago
- Step into my GitHub treasure trove—an immersive collection of comprehensive notes chronicling my Certified Ethical Hacker (CEH) lab escap…☆36Aug 13, 2023Updated 2 years ago
- WebSocket and SQL Injection Exploit Script☆41Feb 27, 2025Updated last year
- A curated collection of amazing software, libraries, documents, books, resources, and other cool security-related content.☆14Nov 13, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- CEHv12 Notes☆16Jun 11, 2023Updated 2 years ago
- ☆11Oct 10, 2020Updated 5 years ago
- ☆46Feb 28, 2024Updated 2 years ago
- An ongoing curated collection of awesome software, libraries, frameworks, talks & videos, best practices, learning tutorials and importan…☆21Jul 29, 2022Updated 3 years ago
- Comprehensive SOC Analyst notes covering incident response, threat hunting, SOC workflows, and cybersecurity concepts—perfect for exam pr…☆122Feb 26, 2026Updated 2 months ago
- A list of OSINT tools that may be useful to you when conducting investigations related to Russian Federation☆72Aug 8, 2025Updated 9 months ago
- Hacking-Beginner-to-Expert-Guide-by-James-Patterson☆18Mar 27, 2021Updated 5 years ago
- Resources for Cyber Security☆11Oct 30, 2018Updated 7 years ago
- Short deep dive into Threat Hunting on AWS☆19Oct 15, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Single-Clich-Proxy-Chains☆13Mar 29, 2021Updated 5 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆19Aug 10, 2019Updated 6 years ago
- 🎓 Because Education should be free. Contributions welcome! 🕵️☆2,914Aug 9, 2025Updated 9 months ago
- A checklist for systematically going through the OWASP Testing Guide V4☆17Jan 14, 2025Updated last year
- ResetRyder - Open Source Brute Force Password Reset Tool☆18Mar 10, 2025Updated last year
- Cisco Certified CyberOps Associate 200-201 Certification Guide, published by Packt☆29Jan 30, 2023Updated 3 years ago
- This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.☆335Feb 17, 2023Updated 3 years ago
- Top 5 ethical hacking books to get started? Top 5 practical hacking books? Top 5 cybersecurity books to get started? Did I miss any great…☆212Dec 20, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Complete Solution for VAPT/AppSec and Pentesting Guide: Web | Mobile | API | Thick Client | Source Code Review | DevSecOps | Wireless | …☆1,669Apr 26, 2026Updated last week
- Collection of Cyber Security Projects written in Python Script (executable on Linux terminal)☆136May 17, 2022Updated 3 years ago
- ☆36Mar 28, 2025Updated last year
- A collection of PDF/books about the modern web application security and bug bounty.☆1,860Dec 14, 2023Updated 2 years ago
- Code snippets for Qiling Tutorials☆21Aug 22, 2020Updated 5 years ago
- A Model Context Protocol (MCP) server that integrates Volatility 3 memory forensics framework with Claude☆38Jul 7, 2025Updated 10 months ago
- Study material (pdfs, notes, free course download links etc) for HACKERS☆31Nov 18, 2023Updated 2 years ago