☆11Feb 28, 2022Updated 4 years ago
Alternatives and similar repositories for hackingin-mavi-tarafi
Users that are interested in hackingin-mavi-tarafi are comparing it to the libraries listed below
Sorting:
- ☆13Mar 23, 2023Updated 2 years ago
- Tools & TTP's for Active Directory Red Teaming☆31Dec 22, 2024Updated last year
- ETİK HACKER EL KİTABI #1 KENDİMİ SİBER GÜVENLİK ALANINDA GELİŞTİRMEYE ÇALIŞIYORUM VE BU ZAMAN İÇİNDE ELİME GEÇEN HER ŞEYİ DEĞERLENDİRMEYE…☆27Apr 23, 2024Updated last year
- Arduino Kitabimizda Gecen Ornek Kodlar☆10Feb 23, 2017Updated 9 years ago
- ☆18Mar 14, 2025Updated 11 months ago
- Arduino and Raspberry PI Development Kit☆10Jun 28, 2017Updated 8 years ago
- HOCig- Automatic HOC Information Gathering Tool V 1.2☆10May 4, 2021Updated 4 years ago
- DBProgramming-Sep-2021☆11May 9, 2023Updated 2 years ago
- Mastering Internet of Things by Packt☆11Jan 30, 2023Updated 3 years ago
- SDN Laboratory☆11May 6, 2021Updated 4 years ago
- ☆12Dec 23, 2025Updated 2 months ago
- ☆11Sep 1, 2022Updated 3 years ago
- A tool for generating reverse shell payloads on the fly.☆10Jun 18, 2022Updated 3 years ago
- SOC bilgileri yer almaktadır.☆22Jul 2, 2025Updated 8 months ago
- Tutorial for SICSS-Istanbul☆11Jul 6, 2020Updated 5 years ago
- ☆15Jan 5, 2025Updated last year
- Aggregated wordlist pulled from commonly used tools for discovery, enumeration, fuzzing, and exploitation.☆11Dec 30, 2020Updated 5 years ago
- Ders Notları☆10Jul 22, 2019Updated 6 years ago
- 🐍 Python notlarım☆12Jul 2, 2023Updated 2 years ago
- VLAN attacks toolkit☆12Sep 1, 2022Updated 3 years ago
- Materials and Information for Ethics of Artificial Intelligence and Machine Learning☆11Sep 29, 2023Updated 2 years ago
- Wanna TesT YoUr CyberSecurity Skills Below are the amazing platforms to level-up yourself☆19Jun 4, 2022Updated 3 years ago
- Creating a Cybersecurity Resume: Tips and Resources" is a comprehensive guide to crafting an effective and professional cybersecurity res…☆15Jan 8, 2023Updated 3 years ago
- A comprehensive reconnaissance and vulnerability scanning tool that combines multiple security assessment capabilities into a single auto…☆26Jun 24, 2025Updated 8 months ago
- ☆10Dec 14, 2024Updated last year
- Reactive webapp running on a Raspberry Pi cluster☆16May 21, 2015Updated 10 years ago
- Ansible script to install cassandra on a raspberry pi cluster☆12Apr 13, 2015Updated 10 years ago
- Hacking files and scripts☆12Mar 21, 2018Updated 7 years ago
- Spring4Shell reproduce☆11Apr 1, 2022Updated 3 years ago
- 25.11.2021 Siber Güvenlik İçin Python Eğitiminde Yazılan Kodlar☆13Nov 25, 2021Updated 4 years ago
- CEHv12 Notes☆15Jun 11, 2023Updated 2 years ago
- Automated tool for domains & Subdomains Gathering☆14Updated this week
- ☆12Dec 14, 2021Updated 4 years ago
- Pentest automation resources for Burp☆15Mar 10, 2024Updated last year
- Predicting the probability of an exploit being released after a CVE is published (by Machine learning algorithm)☆13Aug 8, 2023Updated 2 years ago
- ☆16Oct 18, 2025Updated 4 months ago
- ☆12Nov 22, 2016Updated 9 years ago
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆15Oct 16, 2024Updated last year
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆18Aug 7, 2024Updated last year