CHackA_Hacking_Books
☆49May 17, 2025Updated 11 months ago
Alternatives and similar repositories for Hacking_Books
Users that are interested in Hacking_Books are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repository_Software☆11Aug 26, 2023Updated 2 years ago
- thelinuxchoice/blackeye☆12Jul 26, 2020Updated 5 years ago
- Ethical hacking☆54Jul 20, 2020Updated 5 years ago
- Exploits project Hacking Command Center☆52Sep 22, 2023Updated 2 years ago
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A BlackJack Counter Fap for Flipper Zero embedded Device.☆11Aug 26, 2025Updated 7 months ago
- This Repo contains the code for the project Internet and Manual Automation made using ESP32☆11Nov 12, 2019Updated 6 years ago
- Record X11 keypress events to a log file☆27Mar 19, 2018Updated 8 years ago
- awesome、python、C++、linux、database、php、sql、penetration、security、infosec、javascript、tips...☆13Jul 6, 2018Updated 7 years ago
- Burp extension to use updated token values, such as a bearer token☆24Dec 2, 2022Updated 3 years ago
- Spymax_4.0_Full Version By blackcat99999999☆14Jan 24, 2024Updated 2 years ago
- Drupal 7.x Services Module Remote Code Execution Exploit - https://www.ambionics.io/blog/drupal-services-module-rce☆14Mar 9, 2017Updated 9 years ago
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆34Apr 14, 2025Updated last year
- Generate sub-GHz brute-force files for the Flipper Zero.☆19Jul 13, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Script to change all MAC Addresses☆12Oct 3, 2013Updated 12 years ago
- A little explanation about this tool, Lazymux is a remote that works to automatically download and install a tool ,, what content do I me…☆19Jan 4, 2018Updated 8 years ago
- ☆15Sep 11, 2020Updated 5 years ago
- An OSINT tool to find data leaks on a targeted website☆17Mar 30, 2021Updated 5 years ago
- Control an Android device from Arduino or vice versa☆22May 8, 2022Updated 3 years ago
- rootX is a modern, feature-rich IRC client built with Python and Tkinter, offering a clean and intuitive graphical interface while mainta…☆13Dec 8, 2025Updated 4 months ago
- Argument injection vulnerability in PHP☆13Jun 15, 2024Updated last year
- This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to s…☆11May 24, 2024Updated last year
- Intagram Image And Video Downloader☆14Oct 1, 2020Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 11 years ago
- Kali NetHunter for Xiaomi Redmi Note 3 Pro☆10May 25, 2017Updated 8 years ago
- ☆10Sep 20, 2022Updated 3 years ago
- Flipper Zero u-blox GPS app☆26Aug 2, 2025Updated 8 months ago
- A PNG file-smuggling tool and library!☆26Mar 15, 2023Updated 3 years ago
- DuckyLogger: DuckyLogger is a Key Logger which captures every key stroke of traget and send them to attacker.☆10Apr 14, 2022Updated 4 years ago
- Undetectable Windows Payload Generation☆10Dec 2, 2017Updated 8 years ago
- trakttv everywhere☆27Mar 31, 2013Updated 13 years ago
- Let's you use any Windscribe server over a HTTP proxy. Uses Docker so multiple HTTP proxies at different locations can be created on the …☆12Jan 4, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Analyze Android APK files from a browser.☆14Sep 29, 2020Updated 5 years ago
- book source codes from _Hacking: The Art of Exploitation_ 2nd edition by Jon Erickson☆22Sep 28, 2012Updated 13 years ago
- Notes on Kali Linux on Nethunter by hcs0☆12Oct 13, 2019Updated 6 years ago
- Space theme for KDE☆25Dec 18, 2024Updated last year
- terminal customization☆10Dec 17, 2022Updated 3 years ago
- A cyber security toolkit blending manual testing with AI Agents☆122Apr 7, 2026Updated last week
- Java integration for Hex-Rays IDA Pro☆26Feb 15, 2017Updated 9 years ago