اشهر كتب الاختراق
☆100Jul 31, 2023Updated 2 years ago
Alternatives and similar repositories for popular-Hacking-books-
Users that are interested in popular-Hacking-books- are comparing it to the libraries listed below
Sorting:
- A collection of PDF/books about the modern web application security and bug bounty.☆1,782Dec 14, 2023Updated 2 years ago
- Repository of practice, guides, list, and scripts to help with cyber security.☆321Apr 16, 2023Updated 2 years ago
- Basic tool for Information Gathering 🚀☆23Mar 26, 2024Updated last year
- Best Penetration Tools | أفضل أدوات الاختراق☆32Mar 20, 2017Updated 8 years ago
- Developed a Software that detects students face and then marks attendance after training face recognizer☆10Apr 30, 2018Updated 7 years ago
- Installation guide for bWAPP on Kali Linux, Ubuntu, and Windows.☆13Sep 23, 2024Updated last year
- ☆14Sep 9, 2022Updated 3 years ago
- ☆24Dec 3, 2025Updated 3 months ago
- A basic NetMD assembler IDE. It allows you to easily write and execute assembly code on Sony NetMD portables.☆10Aug 14, 2024Updated last year
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- ☆13Nov 24, 2021Updated 4 years ago
- Podcast video downloader and converter☆16Feb 28, 2016Updated 10 years ago
- A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a syst…☆21Aug 2, 2025Updated 7 months ago
- Rats sources☆10Feb 23, 2022Updated 4 years ago
- Standalone Java implementation of the RFC-9285 Base45 Standard.☆13Jul 14, 2023Updated 2 years ago
- A pentesting Firefox spy extension - PoC☆10Jun 16, 2016Updated 9 years ago
- Test platform for various render and interface tests for next-gen VR system☆14Dec 11, 2022Updated 3 years ago
- Collection of red team scripts, resources & configs.☆15Feb 14, 2026Updated 3 weeks ago
- ☆10Oct 17, 2020Updated 5 years ago
- Unauthenticated Remote Code Execution in SPIP versions up to and including 4.2.12☆13Aug 12, 2024Updated last year
- MANRS Implementation Guide☆12Oct 19, 2022Updated 3 years ago
- qTox website source☆13Apr 20, 2025Updated 10 months ago
- Git CTF 🚩 Can you get on the leaderboards?☆12Dec 23, 2020Updated 5 years ago
- Script made for bypassing antivirus using Powershell Injection method. Place your shellcode from msfvenom on line 15, the script can be c…☆15Jun 14, 2023Updated 2 years ago
- ☆13Jun 29, 2023Updated 2 years ago
- ☆12Oct 21, 2024Updated last year
- CEH Practical Preparation☆11Oct 2, 2022Updated 3 years ago
- Openwrt port for Mikrotik RB3011☆12Dec 28, 2022Updated 3 years ago
- Windows Privilege Escalation Labs☆18May 10, 2021Updated 4 years ago
- Overflowme is a walkthrough to learn the basics of binary exploitation. Detailed instructions, stack diagrams and fully commented assembl…☆67Apr 30, 2025Updated 10 months ago
- 在学习Java反序列化漏洞的过程中,用来理解Java RMI程序的执行流程,演示如何攻击Java RMI程序的几个示例。☆11May 6, 2020Updated 5 years ago
- A repository which depicts writeups from different platforms and CTFs☆10Jul 7, 2024Updated last year
- ☆12Nov 22, 2016Updated 9 years ago
- Mikrotik Billing System Generate Voucher Hotspot PHP☆18Feb 22, 2022Updated 4 years ago
- zkSNARK implementation in JavaScript☆12Mar 20, 2022Updated 3 years ago
- PSVR2 SteamVR integration with eye-tracking support, releases are currently private.☆12Mar 6, 2023Updated 3 years ago
- CEH v13 exam resources & Tips☆35Jun 24, 2025Updated 8 months ago
- ☆66Jul 12, 2025Updated 7 months ago
- HACKING BOT is an automated bug bounty tool that streamlines security testing by running multiple cybersecurity tools in parallel. It all…☆19Mar 6, 2025Updated last year