Includes all the mateerial required for Security Testing
☆63Nov 28, 2023Updated 2 years ago
Alternatives and similar repositories for HackerBooks
Users that are interested in HackerBooks are comparing it to the libraries listed below
Sorting:
- ☆22Feb 3, 2026Updated last month
- A collection of my Semester 3 coding solutions for ADSA (Advanced Data Structures & Algorithms) and Python. Includes practice problems fr…☆14Sep 29, 2025Updated 5 months ago
- This lab seeks to put the pieces of information learned in my CCNP journey together and come up with a working topology☆11Jan 12, 2026Updated last month
- Solutions for Codility lessons and challenges.☆11Mar 12, 2017Updated 8 years ago
- Cài đặt thuật & tóm tắt lí thuyết Mã hóa mật mã - fit@hcmus☆16May 24, 2022Updated 3 years ago
- A collection of PDF/books about the modern web application security and bug bounty.☆25Apr 13, 2023Updated 2 years ago
- ☆12Jan 31, 2020Updated 6 years ago
- Knowledge Based Authentication Performance Metrics Projec☆12Nov 20, 2014Updated 11 years ago
- ☆11Feb 9, 2026Updated 3 weeks ago
- Animations made by python☆10Jun 19, 2020Updated 5 years ago
- ☆15Apr 10, 2025Updated 10 months ago
- A basic RayCasting demo written in c☆10Sep 27, 2022Updated 3 years ago
- Brute force Keepass database passwords☆22May 27, 2025Updated 9 months ago
- P Ghost (IPG) is a powerful Bash-based tool for network scanning and OSINT (Open Source Intelligence). It allows users to detect connecte…☆10Feb 16, 2025Updated last year
- ☆10Dec 26, 2025Updated 2 months ago
- here is the largest collection of hacking and pentesting books, for all my dudes who cant afford to buy them! feel free to join my Telegr…☆11Nov 18, 2022Updated 3 years ago
- CyberTalents Blue Team Scholarship 2023 By Trend Micro☆12Sep 28, 2023Updated 2 years ago
- Leonardo-Arduino script and python keylogger for BAD-USB aka Poor Man's RUBBER-DUCKY☆12Aug 14, 2020Updated 5 years ago
- CVE-2025-6218 is a directory traversal vulnerability in WinRAR that allows an attacker to place files outside the intended extraction dir…☆15Jul 10, 2025Updated 7 months ago
- ☆14Dec 3, 2020Updated 5 years ago
- Translate your CSV files effortlessly across multiple languages and save your time and effort.☆19Jul 2, 2024Updated last year
- React wrapper around Papaya medical image viewer.☆10Sep 15, 2021Updated 4 years ago
- ☆13Aug 1, 2023Updated 2 years ago
- CVE-2023-20273 Exploit PoC☆14Apr 1, 2024Updated last year
- Map-generating tool for the indie game Minecraft, written in Python. NO LONGER DEVELOPED☆33Sep 25, 2010Updated 15 years ago
- Hey there! Welcome to my collection of bug bounty and security testing resources. Whether you're just starting out or already deep into y…☆11Dec 25, 2025Updated 2 months ago
- Rail fence cipher☆14Oct 8, 2025Updated 4 months ago
- Challenges of the alpha ctf 2022☆13Jan 4, 2024Updated 2 years ago
- API Penetration Testing Notes☆16Sep 25, 2025Updated 5 months ago
- ☆15Jul 28, 2024Updated last year
- This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the…☆14Jun 27, 2023Updated 2 years ago
- CVE-2023-20198 PoC (!)☆11Oct 17, 2023Updated 2 years ago
- TeaVin - Ultimate ESP32 EvilTwin☆13Mar 25, 2024Updated last year
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆16Oct 22, 2025Updated 4 months ago
- Convert flashcards in PDF notes to Anki Flashcards.☆13Oct 24, 2025Updated 4 months ago
- A collection of 10 network security tools using Scapy for traffic analysis, penetration testing, and network manipulation. Ideal for cybe…☆17Oct 20, 2024Updated last year
- ☆10Mar 4, 2018Updated 8 years ago
- Repository of the GINI index official repository.☆17Jul 1, 2025Updated 8 months ago
- ☆63Jul 14, 2025Updated 7 months ago