🛡️ The Ultimate Cybersecurity Library | 160+ curated books, guides & resources covering Ethical Hacking, Penetration Testing, Bug Bounty, Red/Blue Team, OSINT, Malware Analysis, CEH, OSCP, CISSP, CHFI, Network Security, Kali Linux, Web Security & more. Free, organized, and clickable. Knowledge should be accessible to everyone.
☆53Mar 5, 2026Updated 3 weeks ago
Alternatives and similar repositories for Security-Books
Users that are interested in Security-Books are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SQLMap with Autonomous AI, phased workflows, RAG memory, and MCP Agent Tools☆89Feb 26, 2026Updated last month
- Automation of some MAPT activities and interaction with the mobile Android device.☆27Sep 28, 2025Updated 6 months ago
- Bof of RegPwn by MDSec☆93Mar 15, 2026Updated 2 weeks ago
- This is a collection of stealers for educational purposes☆22Aug 13, 2025Updated 7 months ago
- Recovered samples, extracted Wasm/binaries, decoded payloads & analysis scripts from the Coruna iOS/macOS exploit kit (b27.icu). 28 JS mo…☆49Mar 9, 2026Updated 2 weeks ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- DragonJAR Automatic Windows Forensic☆13May 23, 2017Updated 8 years ago
- ☆22May 18, 2024Updated last year
- Document Dropper w/ integrated c2☆34Oct 23, 2025Updated 5 months ago
- Full stack web application using ReactJS, NodeJS and MySQL.☆21Mar 10, 2025Updated last year
- A bash script to convert FROM gif, bmp, pdf, webp, pcx, pict, pct, png, tif, tiff, xcf, crw, cr2, arw, sr2 & nef TO jpg/jpeg formats.☆18May 12, 2015Updated 10 years ago
- Configurations to implement Wazuh☆12Nov 28, 2022Updated 3 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- ☆38Dec 10, 2025Updated 3 months ago
- ☆73Nov 7, 2025Updated 4 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆37Feb 17, 2026Updated last month
- A montage of ethical hacking based resources, please ensure you do not upload anything that violates copyright law☆12Nov 29, 2020Updated 5 years ago
- A command-line tool to extract dylib files from the dyld shared cache file.☆13Nov 12, 2021Updated 4 years ago
- ast pattern matching with automated structure recovery for hex-rays decompiler☆32Mar 11, 2026Updated 2 weeks ago
- ☆17Nov 6, 2021Updated 4 years ago
- Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass☆123Jan 29, 2026Updated 2 months ago
- ☆16Aug 27, 2025Updated 7 months ago
- Codes for demos, labs for the OCI AI Foundations☆23Mar 4, 2026Updated 3 weeks ago
- ☆13Oct 24, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Grab form parameters easily☆14Dec 11, 2024Updated last year
- Curso de formación para el profesorado de la Comunidad de Madrid sobre el desarrollo backend con SrpingBoot☆18Jun 15, 2023Updated 2 years ago
- Sample Project from Developer.apple.com☆30Apr 16, 2011Updated 14 years ago
- ddc ci utility for linux which live in you tray. Brightnress, sound and input.☆31Jul 3, 2025Updated 8 months ago
- Enumerate Callbacks and all Object Types☆16Jan 9, 2023Updated 3 years ago
- Gophert NPS-1601 front panel reverse engineering☆12May 11, 2020Updated 5 years ago
- Practical Web Penetration Testing, published by Packt☆25Jan 30, 2023Updated 3 years ago
- An intuitive approach towards understanding how Retrieval Augmented Generation (RAG) systems work, for the curious yet daunted reader☆28Jul 12, 2025Updated 8 months ago
- A multi-agent SOC/DFIR assistant powered by LangChain, LangGraph, and OpenAI models. Automates IOC extraction, MITRE ATT&CK mapping, CVE …☆69Mar 19, 2026Updated last week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆15Dec 24, 2024Updated last year
- ☆14Oct 14, 2022Updated 3 years ago
- CCNA 200-301 Material☆17Mar 28, 2023Updated 3 years ago
- RabbitMQ exploit and Pentesting guide for penetration tester☆20Nov 22, 2023Updated 2 years ago
- ☆15Aug 10, 2018Updated 7 years ago
- Phantom is project created to perform loading and executing .NET assemblies directly in memory within an IIS environment running in full‑…☆90Mar 10, 2026Updated 2 weeks ago
- e2e Scanning research module☆24Updated this week