Study materials for ethical hacking and cyber security
☆16Jan 8, 2020Updated 6 years ago
Alternatives and similar repositories for HackingBooks
Users that are interested in HackingBooks are comparing it to the libraries listed below
Sorting:
- Same @Mebus/cupp tool but best speed and Creates every possible word using the information you provide.☆20Nov 30, 2025Updated 2 months ago
- This project contains source code of our Nexmon-based jammer app presented as a demo at WiSec 2017.☆18Nov 5, 2021Updated 4 years ago
- A small java based program to delete EXIF metadata from images.☆12May 4, 2023Updated 2 years ago
- CNN for detecting malicious PDF☆11Jul 25, 2024Updated last year
- self contained mfkey tool for all 3 mfkeys☆18Sep 20, 2024Updated last year
- Program to easily upload files to Catbox.moe☆17Aug 6, 2022Updated 3 years ago
- This keylogger takes the input of keyboard (Android) and mails it to the given mail.....☆11Oct 30, 2022Updated 3 years ago
- A template for quickly creating basic Android project (Jetpack Compose Version).☆13Jun 24, 2025Updated 8 months ago
- ☆17Aug 18, 2022Updated 3 years ago
- complete guide to download and install Wi-Fi-driver in kali and parrot linux and Wi-Fi hacking basics and dos☆25Feb 10, 2026Updated 2 weeks ago
- Reverse Engineering UR-C Tools to configure the Steinberg UR-C audio interfaces on Linux.☆21Dec 27, 2024Updated last year
- takes shellcode bad-bytes and banishes them, returning cleaned shellcode with preserved functionalities☆58Updated this week
- M5StickC watch with a hacker's touch☆23Oct 4, 2021Updated 4 years ago
- Share threat intelligence and detect tools about APT "NightEgle" (APT-Q-95)☆41Jul 4, 2025Updated 7 months ago
- Aircrack, Airodump, Aireplay, MDK3 and Reaver GUI Application for Android☆45Oct 30, 2025Updated 3 months ago
- A deep learning project which uses a method that converts malware .bytes files into gray-scale images and uses a CNN deep learning model …☆35Oct 6, 2022Updated 3 years ago
- light weight dos attack tool to attack to a single port to any network.☆31May 30, 2023Updated 2 years ago
- Install A virus that forwards all sms to you what victim gets☆32Nov 4, 2023Updated 2 years ago
- Install Kali Linux/Nethunter terminal and gui☆35Nov 5, 2023Updated 2 years ago
- OnePlus 8 Series kernel based on CAF 4.19 and linux-stable sources☆30Sep 3, 2021Updated 4 years ago
- Learning Python for Forensics, Second Edition, Published by Packt☆47Nov 22, 2022Updated 3 years ago
- Automatically scan the file system to identify Electron applications vulnerable to ASAR tampering.☆149Nov 28, 2025Updated 3 months ago
- Search algorithms(BFS, DFS, UCS, A*) in python.Berkeley Pacman Project 1.☆41Feb 16, 2018Updated 8 years ago
- [DEPRECATED] 🌴️ An efficient Reflection API for Java and Android built in Kotlin.☆44Jun 25, 2025Updated 8 months ago
- A swiss army knife for pentesting Windows/Active Directory environments☆50Apr 3, 2016Updated 9 years ago
- RegRipper4.0☆82Dec 10, 2025Updated 2 months ago
- ☆72Jan 31, 2025Updated last year
- A suite of WiFi/Bluetooth offensive and defensive tools for the ESP32☆75Nov 20, 2024Updated last year
- ALL IN ONE Hacking Tool For Hackers by Z4nzu☆83Oct 29, 2020Updated 5 years ago
- A tool to automatically redirect all traffic through the TOR and change the IP every 0 to x seconds. And provides a custom MAC address. <…☆101Jan 13, 2026Updated last month
- This repository contains a few leaked files of HookBot.☆106Jul 22, 2023Updated 2 years ago
- A collection of FREE cyber security books☆595Jul 14, 2025Updated 7 months ago
- ANDRAX The first and unique Penetration Testing platform for Android smartphones☆114Oct 7, 2018Updated 7 years ago
- Collection of shell scripts to automate everything on your android phone using termux app. Including incremental encrypted app backup to …☆130Sep 13, 2025Updated 5 months ago
- Here Are Some Bug Bounty Resource From Twitter☆120Feb 18, 2026Updated last week
- 315Mhz jammer with Menu☆131Oct 22, 2023Updated 2 years ago
- Wifi Cracking☆479Sep 2, 2025Updated 5 months ago
- RealTek RTL8188eus WiFi driver with monitor mode & frame injection support☆152Sep 29, 2025Updated 4 months ago
- Python programs & tools built in the Ethical Hacking with Python EBook☆139Jul 17, 2024Updated last year