PDFs of awesome cybersecurity info
☆24Jan 19, 2026Updated last month
Alternatives and similar repositories for Resources-
Users that are interested in Resources- are comparing it to the libraries listed below
Sorting:
- WiFi Cha0s t00lkit☆77Feb 22, 2026Updated last week
- BLE cha0s t00lkit xox☆73Dec 20, 2025Updated 2 months ago
- QR code Ghostmode☆25Jul 30, 2025Updated 7 months ago
- Get ready for the World Wide WarDrive, or your next big stumbling adventure!☆15Jul 11, 2024Updated last year
- Hijacking Bluetooth Accessories Using Google Fast Pair: WhisperPair CVE-2025-36911 Reference Implementation & Vulnerability Verification …☆66Jan 18, 2026Updated last month
- ☆30Sep 4, 2024Updated last year
- Satanic Crypter A powerful tool designed to convert EXE files into BAT files with advanced features and a modern GUI interface.☆11Jan 4, 2025Updated last year
- Material For Malware Analysis Fundamentals Workshop By Eslam Abbas "Mr Robot"☆23Oct 9, 2025Updated 4 months ago
- Advanced phishing investigation and disruption toolkit☆60Feb 16, 2026Updated 2 weeks ago
- Automated pipeline for downloading, staging, ingesting, and investigating leaked and declassified archives (DDoSecrets, National Security…☆31Sep 22, 2025Updated 5 months ago
- Model Context Protocol server for Aiven☆12Feb 15, 2026Updated 2 weeks ago
- Export your Snapchat Memories to Apple Photos with ease☆25Dec 11, 2025Updated 2 months ago
- A CRT pixelation effect for backgrounds and decyphering animation.☆10Oct 9, 2025Updated 4 months ago
- ☆14May 14, 2022Updated 3 years ago
- Discord RAT made in powershell (open source)☆13Jul 16, 2025Updated 7 months ago
- Flipper Zero Bad USB script designed to grab all the wireless access points a windows machine has ever connected to and dump their passwo…☆10Feb 13, 2025Updated last year
- A backdoor is a tool used to gain remote access to a machine. Typically, backdoor utilities such as NetCat have 2 main functions: to pip…☆13Apr 26, 2021Updated 4 years ago
- Researching vulnerabilities with iOS Shortcuts.☆15Apr 15, 2025Updated 10 months ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- Angry Oxide running on Raspberry Pi Zero 2 with waveshare 2.13” e paper HAT☆11May 28, 2024Updated last year
- This project enables malware to resurrect and remain hidden even after termination, using a User-Mode Program and Kernel-Mode Driver as p…☆10Jan 7, 2025Updated last year
- A tool to Disable / Enable Gatekeeper from macOS 10.15 to macOS 15☆12Jul 24, 2025Updated 7 months ago
- Mac configuration☆14Updated this week
- Personal Library Manager☆45Updated this week
- a script for Kali Linux☆10Jun 28, 2013Updated 12 years ago
- SMS flooding tool☆23May 3, 2025Updated 10 months ago
- All my POC related to malware development☆15Feb 19, 2026Updated 2 weeks ago
- Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum…☆17Jun 12, 2025Updated 8 months ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆15Jan 14, 2019Updated 7 years ago
- OSINT oriented Web Browser☆15Feb 22, 2026Updated last week
- Reverse Shell troll software☆12Sep 24, 2019Updated 6 years ago
- ☆12Apr 25, 2025Updated 10 months ago
- SubnetWizard is a Python Based CLI tools for subnet calculating☆52Apr 4, 2024Updated last year
- WiFi Hacking Suite☆34Feb 9, 2026Updated 3 weeks ago
- VBS Crypter, Exe To VBS☆15Aug 5, 2022Updated 3 years ago
- sms sniffer and imsi catcher☆18Apr 9, 2021Updated 4 years ago
- Hermes — an ephemeral, Docker-powered OSINT framework for testing, tinkering, and secure investigative automation.☆32Jan 18, 2026Updated last month
- Freaking Injector is a tool which made for injecting dlls into other processes in Windows x64 systems with bunch of diffrent injection me…☆11Dec 3, 2020Updated 5 years ago
- XHacks: Python-fueled nightmare for X account defenses. AI-driven brute-force tears through with ruthless stealth and speed. Ethical hack…☆16Nov 14, 2025Updated 3 months ago