☆44Apr 9, 2016Updated 9 years ago
Alternatives and similar repositories for Mega-Hacking-E-Books-Collection
Users that are interested in Mega-Hacking-E-Books-Collection are comparing it to the libraries listed below
Sorting:
- Some useful websites for programmers.☆11Jun 7, 2017Updated 8 years ago
- These are the scripts & methodologies that can be used in Buffer Over Flow Fuzzing and Exploitation☆18Oct 3, 2021Updated 4 years ago
- Amp Rack Guitar Effects Processor for Linux and Windows☆15Mar 26, 2025Updated 11 months ago
- ☆12Feb 16, 2012Updated 14 years ago
- Silk File Reader☆14Mar 9, 2022Updated 4 years ago
- An ongoing & curated collection of awesome software practices and remediation, libraries and frameworks,payloads and techniques, best gui…☆41Sep 23, 2023Updated 2 years ago
- Future Of Phishing With less delay☆15Sep 21, 2023Updated 2 years ago
- Cowrie SSH/Telnet Honeypot http://cowrie.readthedocs.io☆13Jun 25, 2020Updated 5 years ago
- Command List for Hashcat and default keyspaces.☆17Feb 13, 2020Updated 6 years ago
- Minigotchi ported to multiple ESP32 devices. (Main Repo (Archived) by @dj1ch)☆14Aug 24, 2025Updated 6 months ago
- Weaponize.it is your go-to resource for gaining insights into pentesting, bug bounty hunting, and scripting.☆12Apr 3, 2025Updated 11 months ago
- Simple Golang WhatsApp Rest API☆12Mar 11, 2026Updated last week
- The Scorebot Engine is a platform that allows scoring, host checking and other cool stuff☆10Nov 10, 2024Updated last year
- Most powerfull Wifi Jammier.with fixes.☆13Oct 14, 2022Updated 3 years ago
- Low cost aerial surveillance drone☆19Apr 22, 2023Updated 2 years ago
- ☆16Mar 9, 2026Updated 2 weeks ago
- ☆12Mar 3, 2026Updated 2 weeks ago
- This project is about tool for detecting, quarantining, and alerting about suspicious phishing emails.☆17Aug 29, 2025Updated 6 months ago
- ☆10May 6, 2017Updated 8 years ago
- a script containing hacktools that make it easier to use for termux☆14Apr 23, 2022Updated 3 years ago
- Exercises for the O'Reilly Live Training, AWS Cloud Practitioner Essentials☆19May 6, 2021Updated 4 years ago
- ☆34Feb 23, 2026Updated 3 weeks ago
- Hackthebox tools☆13Mar 3, 2019Updated 7 years ago
- Pre-commit, pre-push, rust-centric☆20Mar 5, 2026Updated 2 weeks ago
- A curated collection of courses, videos, and resources to master network security from the ground up.☆10Jan 6, 2025Updated last year
- Burp suite - Python☆19Nov 2, 2018Updated 7 years ago
- cisco-auditing-tool : Scans cisco routers for common vulnerabilities☆15Sep 21, 2015Updated 10 years ago
- SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript files☆12Jun 8, 2020Updated 5 years ago
- a simple keylogger that records hardware inputs like keyboard, mouse, microphone and webcam and sends it to your e-mail.☆14Oct 18, 2024Updated last year
- This repository contains all labs for the Phase 2 Cybersecurity and Ethical Hacking Internship. Labs cover ethical hacking, penetration t…☆23Oct 17, 2025Updated 5 months ago
- Cybersecurity Free Resources | This repo collects 14 of free resources for Cybersecurity. 🛡️ Arm yourself with knowledge from our Cybers…☆61May 1, 2025Updated 10 months ago
- Script to install in a Fedora OS the main tools used in pentesting.☆16Nov 22, 2021Updated 4 years ago
- Short url specially for portforwarders links☆22May 1, 2022Updated 3 years ago
- Penetration Testing - Intermediate Level☆16Feb 25, 2020Updated 6 years ago
- CEHv12 Notes☆15Jun 11, 2023Updated 2 years ago
- ☆34Nov 14, 2025Updated 4 months ago
- DeepSeek Pentest AI - Burp Suite extension☆57Sep 14, 2025Updated 6 months ago
- [Mu Online] Tool to reading MuError.log file.☆10Feb 4, 2020Updated 6 years ago
- Bioinformatics with Python Cookbook - Fourth Edition, published by Packt☆40Mar 2, 2026Updated 3 weeks ago