i will upload all the books that helped me in learning in this repo
☆21Jan 6, 2023Updated 3 years ago
Alternatives and similar repositories for Books
Users that are interested in Books are comparing it to the libraries listed below
Sorting:
- Simple Tool for webhacking☆12Apr 4, 2023Updated 2 years ago
- Raspberry Pi powered Digital Clock for Amateur Radio using TM1637 4 digit displays☆11Mar 20, 2021Updated 4 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- Ultimate Internet of Things/Industrial Control Systems reconnaissance tool.☆11Feb 11, 2022Updated 4 years ago
- An automation framework for CyberSecurity Tools☆12Dec 6, 2025Updated 3 months ago
- ☆12Jul 29, 2021Updated 4 years ago
- quick'n dirty hack to invoke ARM SMC instruction from userland through debugfs☆14Sep 4, 2016Updated 9 years ago
- The Zonemaster GUI - part of the Zonemaster project☆17Updated this week
- ☆13Oct 22, 2023Updated 2 years ago
- Using the "AdGuard DNS" DNS system-lessly! As simple as that and block ads and trackers.☆12Dec 13, 2023Updated 2 years ago
- The method and files used to generate Sysmon event logs, push them to a remote Splunk, and ingest/normalize the data for analysis.☆10Sep 28, 2020Updated 5 years ago
- Advanced AI Jailbreak. Uses steganography and fernet encryption to pass data that is hidden in images to AI models undetected.☆11Jan 28, 2024Updated 2 years ago
- virustotal API-based project for checking the list of hashes against virustotal.com database☆11Feb 26, 2018Updated 8 years ago
- ☆10Oct 24, 2022Updated 3 years ago
- urlscan.io API wrapper for Ruby☆13Oct 16, 2023Updated 2 years ago
- Based on ossiozac/Raspberry-Pi-Zero-Rubber-Ducky-Duckberry-Pi☆12Oct 27, 2020Updated 5 years ago
- Decision trees generated via Graphviz to inform pragmatic threat modelling.☆11Jan 16, 2021Updated 5 years ago
- Google Dorking Payloads☆12Jun 24, 2024Updated last year
- Simple Captive Portal for Evil Crow Keylogger: Access point (Free WiFi) with a registration form. Information is stored on the MicroSD ca…☆13Oct 6, 2020Updated 5 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- one-click deepfake (face swap)☆10May 30, 2023Updated 2 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 16, 2020Updated 5 years ago
- ☆14Feb 12, 2026Updated 3 weeks ago
- COD Mobile - norecoil/spread/speed hack/fly/highview sit/highview☆13Oct 30, 2019Updated 6 years ago
- Utility to attempt to find the passphrase of a GPG secret key☆10May 23, 2024Updated last year
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆11Jan 8, 2023Updated 3 years ago
- ☆12Dec 26, 2022Updated 3 years ago
- Configuration tool for AMD Overdrive6 devices.☆20Mar 7, 2016Updated 9 years ago
- Full python reverse shell and bind shell payloads☆16Apr 30, 2020Updated 5 years ago
- ☆15Jun 7, 2025Updated 8 months ago
- Encompile Cython New By Tumbal Termux☆11Mar 13, 2022Updated 3 years ago
- A very fast network scanner of SSL server configurations☆11Mar 28, 2016Updated 9 years ago
- Simple netcat-like binary for Windows, created with python and py2exe.☆13Feb 1, 2019Updated 7 years ago
- ☆16May 9, 2016Updated 9 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- LFI/RFI scanner by Iman Karim (fimap.dev@gmail.com)☆10Jul 3, 2015Updated 10 years ago
- Hey there! Welcome to my collection of bug bounty and security testing resources. Whether you're just starting out or already deep into y…☆11Dec 25, 2025Updated 2 months ago
- ESP8266 ROM Bootloader utility☆17Jul 17, 2017Updated 8 years ago
- ☆14May 14, 2024Updated last year