i will upload all the books that helped me in learning in this repo
☆21Jan 6, 2023Updated 3 years ago
Alternatives and similar repositories for Books
Users that are interested in Books are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- List of custom Nuclei templates☆16Nov 4, 2023Updated 2 years ago
- replace the shellcode chatacters so that reduce the entropy☆18Sep 14, 2023Updated 2 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- How to do recon on a web-application properly☆15Jul 12, 2022Updated 3 years ago
- ☆14Feb 12, 2026Updated 2 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- Ultimate Internet of Things/Industrial Control Systems reconnaissance tool.☆11Feb 11, 2022Updated 4 years ago
- Jarbou3 is rat tool coded in python with C&C which can accept multiple connections from clients☆29Nov 30, 2023Updated 2 years ago
- A launcher to load a DLL with xored cobalt strike shellcode executed in memory through process hollowing technique☆28Nov 11, 2022Updated 3 years ago
- ☆13Oct 22, 2023Updated 2 years ago
- quick'n dirty hack to invoke ARM SMC instruction from userland through debugfs☆15Sep 4, 2016Updated 9 years ago
- Burp Suite extension that enhances Burp Active Scan by adding template engine specific SSTI payloads.☆25Feb 20, 2024Updated 2 years ago
- Large language models (LLMs) made easy, EasyLM is a one stop solution for pre-training, finetuning, evaluating and serving LLMs in JAX/Fl…☆11Apr 26, 2023Updated 2 years ago
- Based on ossiozac/Raspberry-Pi-Zero-Rubber-Ducky-Duckberry-Pi☆12Oct 27, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆12Jul 29, 2021Updated 4 years ago
- ☆10Jul 29, 2024Updated last year
- one-click deepfake (face swap)☆10May 30, 2023Updated 2 years ago
- ☆12Jan 28, 2023Updated 3 years ago
- LLM Frontend for Power Users.☆12Feb 7, 2024Updated 2 years ago
- Nuclei template generator for WordPress plugins☆23Apr 22, 2024Updated last year
- Priv8 Tools Software Mass Dork Auto Exploit.☆12Feb 1, 2023Updated 3 years ago
- Configuration tool for AMD Overdrive6 devices.☆20Mar 7, 2016Updated 10 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 16, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Lists of hacking: Blog, Forums, Telegram channel and all kind of resources in spanish and english.☆15Mar 7, 2021Updated 5 years ago
- Various scripts for working with local LLMs☆16Oct 19, 2023Updated 2 years ago
- ☆16Jun 7, 2025Updated 10 months ago
- Network-based Startup Module Framework (Network Dropper)☆14Dec 11, 2023Updated 2 years ago
- CMSC389R course at UMD☆11Oct 2, 2019Updated 6 years ago
- Advanced AI Jailbreak. Uses steganography and fernet encryption to pass data that is hidden in images to AI models undetected.☆11Jan 28, 2024Updated 2 years ago
- Simple netcat-like binary for Windows, created with python and py2exe.☆13Feb 1, 2019Updated 7 years ago
- Using the "AdGuard DNS" DNS system-lessly! As simple as that and block ads and trackers.☆13Dec 13, 2023Updated 2 years ago
- ☆10Oct 24, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Modified proxmark3 firmware to perform brute forcing of 26-Bit ProxCards☆12Sep 26, 2016Updated 9 years ago
- Crosswalk Nessus findings with the CISA Known and Exploited Vulnerabilities (KEV) catalog.☆12Mar 21, 2023Updated 3 years ago
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆17Sep 25, 2025Updated 6 months ago
- This tool helps you remove ghost followers to boost your instagram engagement!☆15Sep 13, 2023Updated 2 years ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆17Dec 23, 2024Updated last year
- Full python reverse shell and bind shell payloads☆16Apr 30, 2020Updated 5 years ago
- DEDSEC_GHOSTMAILER is a Linux-based tool ability to send emails without the need to disclose user's real identity☆10Aug 26, 2025Updated 7 months ago