This repository contains a comprehensive collection of learning resources and notes that I've gathered on various topics, including cybersecurity, bug bounty, API security, cloud security, and more. All the resources belong to their respective copyright owners and not to me.
☆531Jan 22, 2026Updated 2 months ago
Alternatives and similar repositories for My-CyberSecurity-Store
Users that are interested in My-CyberSecurity-Store are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Discover hidden information on the web with "Elite Google Dorks Search by Biscuit." This collection offers smart and improved Google sear…☆20Aug 10, 2025Updated 8 months ago
- Documenting all the sources from where I'm learning Mobile(adnroid/IOS) bug bounty so if another researcher want to start with mobile bug…☆37Aug 13, 2025Updated 8 months ago
- Some great ebook for hacking☆29Sep 11, 2025Updated 7 months ago
- A collection of FREE cyber security books☆618Jul 14, 2025Updated 9 months ago
- just some notes on different computer science topics (linux, windows, networks, cybersecurity, machine learning...)☆19Dec 29, 2021Updated 4 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- HTB Jail Remote Exploit By Cneeliz - 2017☆15Jan 9, 2018Updated 8 years ago
- 15,000 most of common SSID names from https://wigle.net/stats#ssidstats☆11Nov 26, 2025Updated 4 months ago
- ExecEvasion is a lightweight execution-evasion toolkit that generates command variants designed to bypass naive filters and WAF rules by …☆50Jan 31, 2026Updated 2 months ago
- CVE-2023-46818 Python3 Exploit for ISPConfig <= 3.2.11 (language_edit.php) PHP Code Injection Vulnerability☆15Apr 16, 2025Updated last year
- Python-Based Log Analyzer That Detects Brute-Force Attacks, Directory Traversal, And Suspicious Behavior In System Or Web Server Logs. B…☆19Apr 30, 2025Updated 11 months ago
- Analyze your tryhackme progress!☆12May 27, 2024Updated last year
- ☆54Sep 26, 2025Updated 6 months ago
- Instagram scraping Discord bot☆20Aug 30, 2023Updated 2 years ago
- ☆16Jun 21, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆2,241Sep 20, 2023Updated 2 years ago
- A collection of PDF/books about the modern web application security and bug bounty.☆1,822Dec 14, 2023Updated 2 years ago
- AI/ML/LLM Penetration Testing Toolkit by Mr-Infect — the #1 GitHub resource for AI security, red teaming, and adversarial ML techniques.…☆173Feb 19, 2026Updated last month
- Aggressive Mass AP Deauth/Jammer (PWN ALL WIFI IN RANGE)☆14May 26, 2023Updated 2 years ago
- I will share my public tools here and strive to keep them updated in the future. Don't forget to give them a star! Your support is apprec…☆73Feb 4, 2026Updated 2 months ago
- Probe domains for as much information and site structure as possible.☆14Jul 18, 2024Updated last year
- Custom (non-official) evil-portals for the awesome Wifi Pineapple (https://wifipineapple.com)☆15Dec 7, 2017Updated 8 years ago
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆14Nov 1, 2024Updated last year
- Quaithe empowers you to execute multiple commands in parallel for blazing-fast performance.☆28Aug 20, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Top Hacking Books for 2024 (plus Resources): FREE and Paid☆36Mar 25, 2025Updated last year
- The most comprehensive Hack The Box writeup collection - 500+ machines, 400+ challenges, interactive knowledge graph, skill trees, attack…☆53Updated this week
- A Burp Suite extension that converts IP addresses to decimal notation, useful for SSRF bypass and WAF evasion testing. Created by Harshad…☆11Dec 9, 2024Updated last year
- 0xbro's cheatsheets and CTFs notes☆94Apr 11, 2026Updated last week
- ☆78Mar 9, 2026Updated last month
- Photo analysis and facial recognition and comparison for OSINT (Discord Bot). Uses Amazon's AWS Rekognition API.☆31Jan 29, 2024Updated 2 years ago
- Hacking Books☆24Jan 27, 2024Updated 2 years ago
- ☆14Feb 25, 2025Updated last year
- Intelligence gathering framework☆16Jul 23, 2015Updated 10 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Generic fuzzing wordlist to test for SQLi. Merged from different SQLi wordlists.☆18Jul 24, 2021Updated 4 years ago
- CVE, reports, research☆15Mar 17, 2021Updated 5 years ago
- GitleaksVerifier is a Python-based verification tool designed to enhance the functionality of Gitleaks by rigorously validating secrets f…☆29Mar 9, 2025Updated last year
- EthicalHacking, Python, Nmap, Metasploit☆306Oct 17, 2020Updated 5 years ago
- Welcome to the Cyber Security & Ethical Hacking Books Repository! 📚 Here, you'll find a curated collection of comprehensive books coveri…☆18May 24, 2024Updated last year
- Bug Bounty Resources from Scratch to start Hunting Bugs☆37Feb 21, 2025Updated last year
- A quick bug bounty guide for beginners☆92May 3, 2025Updated 11 months ago