☆44Apr 9, 2016Updated 10 years ago
Alternatives and similar repositories for Mega-Hacking-E-Books-Collection
Users that are interested in Mega-Hacking-E-Books-Collection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Contains some of the E-Books for the field of Computer Engineering☆24Mar 22, 2017Updated 9 years ago
- Some of CrackMes made by me :)☆18Dec 24, 2021Updated 4 years ago
- code for my video guide about raycasting https://www.youtube.com/watch?v=DFZnzCbmlng☆10Jan 18, 2021Updated 5 years ago
- RESEARCH PROJECT - A project meant to explore some of the common UX/DX issues related to Solana's ecosystem and finding ways around them☆11Jan 29, 2022Updated 4 years ago
- Ressources for following my youtube C tutorials☆13Jun 25, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Amp Rack Guitar Effects Processor for Linux and Windows☆17Mar 26, 2025Updated last year
- Boilerplate to Setup Authentication using Django-all auth 🚀☆14Aug 30, 2021Updated 4 years ago
- ☆16Jan 9, 2022Updated 4 years ago
- Graphical model of a TCP/IP stack which can be used as a cheatsheet when developing BPF filters.☆16Dec 10, 2019Updated 6 years ago
- The dining philosophers problem is an example problem often used in concurrent algorithm design to illustrate synchronization issues and …☆12Aug 30, 2021Updated 4 years ago
- Silk File Reader☆14Mar 9, 2022Updated 4 years ago
- An ongoing & curated collection of awesome software practices and remediation, libraries and frameworks,payloads and techniques, best gui…☆41Sep 23, 2023Updated 2 years ago
- Cowrie SSH/Telnet Honeypot http://cowrie.readthedocs.io☆13Jun 25, 2020Updated 5 years ago
- Capture WPA/WPA2 4-way handshake using BW16 (RTL8720dn)☆17Feb 22, 2026Updated last month
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- DNS delegation path traceroute☆12May 17, 2016Updated 9 years ago
- a collection of elf file infectors☆27Oct 10, 2021Updated 4 years ago
- 2.4Ghz Wifi networks spot jamming device, utilizing ESP32 and nRF24L01+☆14Jan 5, 2024Updated 2 years ago
- WebEngineering Project☆13Nov 16, 2011Updated 14 years ago
- FULL v0, Cursor, Manus, Same.dev, Lovable, Devin, Replit Agent, Windsurf Agent, VSCode Agent, Dia Browser & Trae AI (And other Open Sourc…☆17May 31, 2025Updated 10 months ago
- SubScout: Discover Hidden Subdomains Effortlessly☆15Oct 14, 2024Updated last year
- This is a collection of Bug Bounty Tips collected from security researchers / bug hunters on Twitter.☆13Feb 19, 2021Updated 5 years ago
- Network Security docos☆18Mar 3, 2025Updated last year
- Needed a way to filter all my pwnagotchi handshakes.☆13Feb 8, 2020Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- The codes from the book Python Bookcamp☆18Jan 16, 2021Updated 5 years ago
- This project is about tool for detecting, quarantining, and alerting about suspicious phishing emails.☆17Aug 29, 2025Updated 7 months ago
- ☆10May 6, 2017Updated 8 years ago
- Fast, cross-platform PowerShell module to find files & folders, grep file content, and measure sizes—Linux-style find/grep/du made simple…☆22Updated this week
- WhoDAT is an InfoSec Analyzer for Nerds using VirusTotal, Google Safe Browsing, URLScan, Hybrid-Analysis, and OpenAI. Scan URLs, emails, …☆13Jan 4, 2026Updated 3 months ago
- Hackthebox tools☆13Mar 3, 2019Updated 7 years ago
- Pull Hashes Decryption From Online Sources Using Python☆15Jun 25, 2024Updated last year
- This repository stores my learning journey and write-ups throughout the security blue team's Blue Team Junior Analyst Certification☆19May 12, 2024Updated last year
- Educational repository with source code examples☆12Jun 3, 2025Updated 10 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- cisco-auditing-tool : Scans cisco routers for common vulnerabilities☆15Sep 21, 2015Updated 10 years ago
- a simple keylogger that records hardware inputs like keyboard, mouse, microphone and webcam and sends it to your e-mail.☆18Oct 18, 2024Updated last year
- Vulnerable Windows Application for Pentesters from the house of DarkRelay Security Labs. The project is along the lines of DVWA, AWSGoat …☆14Dec 28, 2023Updated 2 years ago
- ⚠ For educational purposes. ⚠ Private Unleashed V2 Flipper Zero Firmware PCFW 2.0☆50Jan 4, 2026Updated 3 months ago
- Cybersecurity Free Resources | This repo collects 14 of free resources for Cybersecurity. 🛡️ Arm yourself with knowledge from our Cybers…☆61May 1, 2025Updated 11 months ago
- Script to install in a Fedora OS the main tools used in pentesting.☆16Nov 22, 2021Updated 4 years ago
- (l)user friendly WinDBG theme.☆21Mar 16, 2019Updated 7 years ago