linuxqueenn12 / popular-Hacking-books-View external linksLinks
اشهر كتب الاختراق
☆100Jul 31, 2023Updated 2 years ago
Alternatives and similar repositories for popular-Hacking-books-
Users that are interested in popular-Hacking-books- are comparing it to the libraries listed below
Sorting:
- A collection of PDF/books about the modern web application security and bug bounty.☆1,766Dec 14, 2023Updated 2 years ago
- Basic tool for Information Gathering 🚀☆23Mar 26, 2024Updated last year
- Developed a Software that detects students face and then marks attendance after training face recognizer☆10Apr 30, 2018Updated 7 years ago
- ☆24Dec 3, 2025Updated 2 months ago
- bot net ufonet con ia☆12Jul 7, 2024Updated last year
- Test platform for various render and interface tests for next-gen VR system☆14Dec 11, 2022Updated 3 years ago
- work in progress ....☆10Mar 4, 2020Updated 5 years ago
- A pentesting Firefox spy extension - PoC☆10Jun 16, 2016Updated 9 years ago
- I was searching for such resource to work as cheat sheet series and guide me through different attack scenarios for API attacks, didn’t f…☆15May 5, 2025Updated 9 months ago
- Podcast video downloader and converter☆16Feb 28, 2016Updated 9 years ago
- A basic NetMD assembler IDE. It allows you to easily write and execute assembly code on Sony NetMD portables.☆10Aug 14, 2024Updated last year
- A minimal Linux that runs as a coreboot or LinuxBoot ROM payload to provide a secure, flexible boot environment for laptops and servers.☆13Apr 7, 2022Updated 3 years ago
- qTox website source☆13Apr 20, 2025Updated 9 months ago
- ☆13Jun 29, 2023Updated 2 years ago
- ☆10Oct 17, 2020Updated 5 years ago
- Collection of red team scripts, resources & configs.☆15May 9, 2025Updated 9 months ago
- Openwrt port for Mikrotik RB3011☆12Dec 28, 2022Updated 3 years ago
- MANRS Implementation Guide☆12Oct 19, 2022Updated 3 years ago
- CEH Practical Preparation☆11Oct 2, 2022Updated 3 years ago
- OSINT datatabase (France / Internationale)☆32Jan 16, 2026Updated 3 weeks ago
- ☆12Oct 21, 2024Updated last year
- Unauthenticated Remote Code Execution in SPIP versions up to and including 4.2.12☆13Aug 12, 2024Updated last year
- A repository which depicts writeups from different platforms and CTFs☆10Jul 7, 2024Updated last year
- Writeups for VishwaCTF'24 Mini and VishwaCTF'24☆11Apr 1, 2024Updated last year
- ☆12Jul 8, 2020Updated 5 years ago
- This repository contains tips, tricks, and examples of aggressor script functions. The intent is to share bite size examples that can be …☆16Aug 12, 2025Updated 6 months ago
- CEH v13 exam resources & Tips☆32Jun 24, 2025Updated 7 months ago
- HACKING BOT is an automated bug bounty tool that streamlines security testing by running multiple cybersecurity tools in parallel. It all…☆15Mar 6, 2025Updated 11 months ago
- Mikrotik Billing System Generate Voucher Hotspot PHP☆18Feb 22, 2022Updated 3 years ago
- ☆65Jul 12, 2025Updated 7 months ago
- Practicing PostgreSQL using real questions from FAANG interviews☆12Dec 12, 2021Updated 4 years ago
- All the free ebooks I've found online about hacking and such. Everyone should have access to these.....☆14Nov 30, 2018Updated 7 years ago
- Multicore EVTX to Elasticsearch ingestor for incident responders.☆14May 12, 2021Updated 4 years ago
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆365May 21, 2025Updated 8 months ago
- A small tool that can run in a household constantly monitoring the SONOS systems on what is being played. Whenever an audiobook or podcas…☆18Nov 21, 2016Updated 9 years ago
- A set of scripts and Taskfile to build and manage RouterOS configuration scripts for mulitple routers and switches, including support for…☆16Sep 6, 2024Updated last year
- Web scraped Data Science Interview Questions from Towards Data Science/ Medium.com asked by FAANG/Top Product based companies in last 4-5…☆16Jan 16, 2023Updated 3 years ago
- Pen Hunter is a comprehensive vulnerability scanning tool designed for penetration testers, security researchers and bug bounties. it aut…☆21Dec 10, 2024Updated last year
- Public exploits (re)writed while learning.☆14Aug 7, 2013Updated 12 years ago