Top 5 ethical hacking books to get started? Top 5 practical hacking books? Top 5 cybersecurity books to get started? Did I miss any great books?
☆212Dec 20, 2023Updated 2 years ago
Alternatives and similar repositories for CyberSecurity-and-Pentesting-Exam-Resources
Users that are interested in CyberSecurity-and-Pentesting-Exam-Resources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- E-books related to hacking helps you to know more about hacking☆501Aug 14, 2020Updated 5 years ago
- GitHub config files for my profile☆17Feb 19, 2026Updated 2 months ago
- An ongoing & curated collection of awesome software practices and remediation, libraries and frameworks,payloads and techniques, best gui…☆41Sep 23, 2023Updated 2 years ago
- ☆2,251Sep 20, 2023Updated 2 years ago
- Hacking Books☆26Jan 27, 2024Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- collection of articles/books about programing☆589Updated this week
- Here you will get awesome collection of mostly all well-known and usefull cybersecurity books from beginner level to expert for all cyber…☆658Jul 12, 2022Updated 3 years ago
- ☆23May 18, 2024Updated last year
- Book collection☆162May 22, 2020Updated 5 years ago
- A Multi-Threaded PE Export Collection Utility☆14May 13, 2023Updated 2 years ago
- Hacking Books☆1,847Nov 25, 2019Updated 6 years ago
- ☆10Jul 29, 2022Updated 3 years ago
- "To competently perform rectifying security service, two critical incident response elements are necessary: information and organization.…☆61Apr 2, 2021Updated 5 years ago
- Ethical Hacking - A Hands-On Approach to Ethical Hacking [Video], published by Packt☆15May 10, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Stay up-to-date with the latest and greatest ethical hacking tools and resources.☆41Jan 21, 2022Updated 4 years ago
- A curated list of resources, tools, and wordlists for bug bounty hunters.☆19Feb 26, 2026Updated 2 months ago
- ☆47Nov 21, 2025Updated 5 months ago
- Learn Ethical Hacking From Scratch, published by Packt☆23Jan 30, 2023Updated 3 years ago
- To run Burpsuite from launcher, You may run it in terminal by script, But by this tool you will able to run it from Launcher with a Burp …☆11Sep 24, 2023Updated 2 years ago
- git for the owasp books project; setting up processes capabilities for publishing OWASP books☆19Aug 17, 2018Updated 7 years ago
- Educational collection of LLVM obfuscation passes. (Feel free to use it for your course)☆35Apr 22, 2026Updated 2 weeks ago
- A learning management system built on React for instructors and Students☆17Nov 21, 2025Updated 5 months ago
- ☆11Mar 21, 2020Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A basic webapp to test XSS payloads.☆27May 1, 2023Updated 3 years ago
- Step into my GitHub treasure trove—an immersive collection of comprehensive notes chronicling my Certified Ethical Hacker (CEH) lab escap…☆36Aug 13, 2023Updated 2 years ago
- Codes for malware, viruses and key-logger and other tools☆37Aug 14, 2021Updated 4 years ago
- Roadmap for Web Application Penetration Testing | FREE Resources (Not Pirated)☆438Aug 25, 2023Updated 2 years ago
- A basic SSH honeypot to capture IP Adresses, usernames, passwords, and commands.☆86Sep 24, 2024Updated last year
- This is my custom wordlist for WiFi passwords, tailored specifically for WiFi networks in Indonesia.☆19Nov 29, 2025Updated 5 months ago
- A collection of PDF/books about the modern web application security and bug bounty.☆1,871Dec 14, 2023Updated 2 years ago
- ☆12Jan 12, 2023Updated 3 years ago
- Welcome to my comprehensive course on python programming and ethical hacking. The course assumes you have NO prior knowledge in any of th…☆90Dec 26, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This repository contains some resources for ethical hackers penetration tester 😊 This may contain some files, tools, books, and links th…☆538Jan 6, 2025Updated last year
- Burp suite extension to find sensitive information by checking incoming text OR binary websocket messages☆58Apr 15, 2026Updated 3 weeks ago
- AI-Driven Breach and Attack Simulation Tool (Initial Proof of Concept for AI Pentest Copilot)☆27Jan 6, 2025Updated last year
- Modified ESP8266 Arduino core for Spacehuhn Projects☆15Aug 7, 2021Updated 4 years ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆1,857Feb 13, 2026Updated 2 months ago
- A tool for injecting custom JavaScript payloads into PDF files for penetration testing and XSS proof-of-concept generation.☆21Jan 10, 2025Updated last year
- Top Hacking Books for 2024 (plus Resources): FREE and Paid☆36Mar 25, 2025Updated last year