اشهر كتب الاختراق
☆101Jul 31, 2023Updated 2 years ago
Alternatives and similar repositories for popular-Hacking-books-
Users that are interested in popular-Hacking-books- are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- تجمع جميع ادوات الاختراق في اداة واحدة بدون تعب او شيء اخر تحديث كل يوم☆10May 14, 2020Updated 5 years ago
- A collection of PDF/books about the modern web application security and bug bounty.☆1,822Dec 14, 2023Updated 2 years ago
- Best Penetration Tools | أفضل أدوات الاختراق☆33Mar 20, 2017Updated 9 years ago
- Basic tool for Information Gathering 🚀☆26Mar 26, 2024Updated 2 years ago
- Hands-on lab materials for Fundamentals of Terraform in Cybrary☆10Oct 24, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆68Jul 12, 2025Updated 9 months ago
- Коллекция русских книг для изучения хакинга☆28Aug 27, 2025Updated 7 months ago
- Collection of red team scripts, resources & configs.☆15Feb 14, 2026Updated 2 months ago
- Mastering Linux Shell Scripting_Andrew Mallett☆32Oct 5, 2018Updated 7 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆16Sep 10, 2025Updated 7 months ago
- A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a syst…☆22Aug 2, 2025Updated 8 months ago
- virustotal API-based project for checking the list of hashes against virustotal.com database☆11Feb 26, 2018Updated 8 years ago
- Script made for bypassing antivirus using Powershell Injection method. Place your shellcode from msfvenom on line 15, the script can be c…☆15Jun 14, 2023Updated 2 years ago
- reverse engineer practice☆18Oct 13, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Apr 8, 2026Updated last week
- Overflowme is a walkthrough to learn the basics of binary exploitation. Detailed instructions, stack diagrams and fully commented assembl…☆70Apr 30, 2025Updated 11 months ago
- Offsec PWB Lab Tools☆13Nov 14, 2013Updated 12 years ago
- A collection of FREE cyber security books☆618Jul 14, 2025Updated 9 months ago
- ☆24Dec 3, 2025Updated 4 months ago
- ☆13Oct 21, 2024Updated last year
- This is Web Application Penetration Testing Report made for everybody who wanted a glance of how to make a professional report for pentet…☆18Sep 3, 2021Updated 4 years ago
- CEH Practical Preparation☆12Oct 2, 2022Updated 3 years ago
- ☆14Oct 23, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆422May 21, 2025Updated 10 months ago
- CEH v13 exam resources & Tips☆38Jun 24, 2025Updated 9 months ago
- All About XSS☆16Oct 23, 2022Updated 3 years ago
- ☆39Jul 1, 2025Updated 9 months ago
- A web security research tool for DOM testing☆25Feb 7, 2026Updated 2 months ago
- Collection of username lists for enumerating kerberos domain users☆107Dec 18, 2017Updated 8 years ago
- Google Dorks that can be used for penetration testing, security research, and information gathering.☆37Jan 25, 2026Updated 2 months ago
- ☆36Mar 28, 2025Updated last year
- This repository is aimed to contain all basic tools and resources for cybersecurity. In this repository you will get all material which y…☆74Oct 25, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- CEHv12 Notes☆16Jun 11, 2023Updated 2 years ago
- Hikvision camera backdoor exploit for beef framework (hikvision versions 5.2.0 - 5.3.9)☆20Aug 12, 2020Updated 5 years ago
- Advanced SQL Injection Techniques for Bug Bounty Hunters☆76Jul 23, 2024Updated last year
- اداة باللغة العربية لتحميل اساسيات ترمكس☆51Jan 24, 2022Updated 4 years ago
- ICSGoat: A Damn Vulnerable ICS Infrastructure☆32Aug 26, 2024Updated last year
- A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1☆20Mar 19, 2024Updated 2 years ago
- ☆14Nov 2, 2023Updated 2 years ago