اشهر كتب الاختراق
☆103Jul 31, 2023Updated 2 years ago
Alternatives and similar repositories for popular-Hacking-books-
Users that are interested in popular-Hacking-books- are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of PDF/books about the modern web application security and bug bounty.☆1,860Dec 14, 2023Updated 2 years ago
- Best Penetration Tools | أفضل أدوات الاختراق☆33Mar 20, 2017Updated 9 years ago
- Basic tool for Information Gathering 🚀☆28Mar 26, 2024Updated 2 years ago
- Store my 'Useful Commands' for HTB/OSCP and additional notes from my Obisidan. Merge into Obsidian for direct formatting. Also check out …☆16Aug 16, 2023Updated 2 years ago
- ☆68Jul 12, 2025Updated 9 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Коллекция русских книг для изучения хакинга☆41Aug 27, 2025Updated 8 months ago
- Installation guide for bWAPP on Kali Linux, Ubuntu, and Windows.☆16Sep 23, 2024Updated last year
- NoSecerets is a python script that is designed to crack hashes extremely fast. Faster even than Hashcat☆11Mar 13, 2022Updated 4 years ago
- Collection of red team scripts, resources & configs.☆15Feb 14, 2026Updated 2 months ago
- Mastering Linux Shell Scripting_Andrew Mallett☆32Oct 5, 2018Updated 7 years ago
- ☠️ Code for the Hackfest Workshop☆10Oct 12, 2024Updated last year
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆16Sep 10, 2025Updated 7 months ago
- This is useful if you are running an investigation to determine the usage of the same username on different social networks.☆12Dec 10, 2020Updated 5 years ago
- 🤖 The Modern Port Scanner 🤖☆16Nov 5, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Fake-Out : Fake-Out is an email spoofing tool created by HackEthics138, with security measures provided by Team Illusion. Thi…☆12Aug 19, 2024Updated last year
- given the fb url of a user profile, you can report the user as fake profile☆14Apr 19, 2017Updated 9 years ago
- A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a syst…☆22Aug 2, 2025Updated 9 months ago
- virustotal API-based project for checking the list of hashes against virustotal.com database☆11Feb 26, 2018Updated 8 years ago
- A PoC exploit for CVE-2023-51467 - Apache OFBiz Authentication Bypass☆12Dec 31, 2023Updated 2 years ago
- Script made for bypassing antivirus using Powershell Injection method. Place your shellcode from msfvenom on line 15, the script can be c…☆15Jun 14, 2023Updated 2 years ago
- ☆68Apr 21, 2026Updated 2 weeks ago
- reverse engineer practice☆17Oct 13, 2019Updated 6 years ago
- All-in-one tool for penetration testing☆40Oct 28, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Overflowme is a walkthrough to learn the basics of binary exploitation. Detailed instructions, stack diagrams and fully commented assembl…☆71Apr 30, 2025Updated last year
- Books☆19Feb 25, 2021Updated 5 years ago
- ☆24Dec 3, 2025Updated 5 months ago
- A collection of FREE cyber security books☆628Jul 14, 2025Updated 9 months ago
- Many companies are utilizing the cloud for their day to day activities. Many big cloud service providers like AWS, Microsoft Azure have b…☆11Nov 13, 2022Updated 3 years ago
- ☆13Oct 21, 2024Updated last year
- A simple full-stack clone of Netflix website using Django☆11Jan 3, 2023Updated 3 years ago
- CEH Practical Preparation☆11Oct 2, 2022Updated 3 years ago
- ☆14Oct 23, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆433May 21, 2025Updated 11 months ago
- ☆19Aug 1, 2019Updated 6 years ago
- CEH v13 exam resources & Tips☆40Jun 24, 2025Updated 10 months ago
- My note-taking for Professor Messer's CompTIA Security+ SY0-701 certification course as I study for the exam myself.☆53Aug 6, 2024Updated last year
- This repo contains Machines and Notes for practicing for EJPTv1/2 exam☆17Aug 24, 2023Updated 2 years ago
- ☆11Dec 18, 2023Updated 2 years ago
- This project was created to bring together most of the tools used in CTF to solve steganography challenges.☆18Jul 26, 2023Updated 2 years ago