☆66Apr 1, 2019Updated 6 years ago
Alternatives and similar repositories for Books
Users that are interested in Books are comparing it to the libraries listed below
Sorting:
- Malware Analysis (Zararlı Yazılım Analizi)☆33Aug 1, 2019Updated 6 years ago
- DataCamp 2020 Reinforcement Learning Workshop - Bogazici University, UGURKAN ATES☆27Nov 8, 2020Updated 5 years ago
- Sample code material for BoF exploit training☆10May 12, 2020Updated 5 years ago
- ☆11Jun 10, 2025Updated 9 months ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆45May 2, 2025Updated 10 months ago
- Writeup for the challenges in Really Awesome CTF 2020☆13Aug 3, 2020Updated 5 years ago
- Remote Code Execution vulnerability on ArcSight Logger☆20Jan 24, 2021Updated 5 years ago
- Python tool for detecting subdomain takeover vulnerabilities by resolving CNAME records and checking for known error messages. It support…☆15Feb 2, 2025Updated last year
- CTF WriteUps by team TWC☆16Jun 3, 2025Updated 9 months ago
- This is an automated tool collection written in Python for vulnerability assessment and exploitation. It also includes solution of SPSE -…☆21Mar 21, 2017Updated 8 years ago
- Random tips and tricks RE: ransomware☆14Aug 17, 2021Updated 4 years ago
- eLdap is a tool that helps users searching and filtering queries in Ldap environment.☆19Apr 22, 2022Updated 3 years ago
- ☆12Feb 8, 2023Updated 3 years ago
- ☆11Oct 31, 2021Updated 4 years ago
- ☆11Jul 18, 2022Updated 3 years ago
- https://twitch.com/scottsec adresinde yapılan yayınların arşiv, link ve kaynakların bulunduğu repo☆12Feb 1, 2021Updated 5 years ago
- هذا المستودع هي محاولة منا لاثراء المحتوي العربي بخصوص البج بونتي ومايحتويه من انواع ثغرات الي تقنيات مختلفة الي مصادر متعددة☆38Apr 26, 2022Updated 3 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆59Apr 18, 2021Updated 4 years ago
- ☆21Feb 10, 2026Updated last month
- CEH Practical Exam☆19Dec 29, 2020Updated 5 years ago
- This repository is a place to leave and share notes on Hak5 scripts - credit to the many authors for sharing great content.☆14Nov 27, 2021Updated 4 years ago
- Google Dorks and keywords for bug hunters.☆15Aug 16, 2021Updated 4 years ago
- ☆18Jun 28, 2020Updated 5 years ago
- Simple Repo for me to note down useful techniques, scripts and tools.☆20Nov 28, 2017Updated 8 years ago
- The Repository contains various payloads, tools, tips and tricks from various hackers around the world. Please take a quick look down her…☆15May 15, 2025Updated 10 months ago
- Threat Hunter's Knowledge Base☆22Dec 27, 2021Updated 4 years ago
- This repository is created for personal use and added tools from my blog post.☆14Aug 27, 2023Updated 2 years ago
- ☆18Dec 19, 2025Updated 3 months ago
- A standalone collection of widely used technologies with default credentials enabled, which can be utilized for establishing an initial f…☆20Jun 1, 2024Updated last year
- Elevate your bug bounty game with our treasure trove of FREE resources! 🚀 Dive into a world of expert guides, cheat sheets, and tools to…☆22Oct 19, 2024Updated last year
- The Chupacabra case study was created by the ADEO dfir team due to the lack of resources and applications in the digital forensics field.…☆23May 6, 2022Updated 3 years ago
- ☆20May 24, 2021Updated 4 years ago
- This tool was created to automatically send 53 different types of USPS branded boxes, with the maximum quantities to any address (about 5…☆30Nov 6, 2020Updated 5 years ago
- ☆25Jan 15, 2024Updated 2 years ago
- Just a Repo of pure ASCII art ;'..;'☆18May 27, 2024Updated last year
- Free AWS Security Specialty (SCS-C02) study guide with interactive quizzes☆25Updated this week
- A simple and minimal terminal style browser start page with Dracula colors☆18Oct 27, 2020Updated 5 years ago
- My CEH Practical Preparation☆24Mar 16, 2021Updated 5 years ago
- a Machine Learning powered CSRF attacks finding tool☆27Mar 8, 2019Updated 7 years ago