noluvv / cybersecurity-pdfsView external linksLinks
a collection of pdfs i like to read
☆25May 25, 2023Updated 2 years ago
Alternatives and similar repositories for cybersecurity-pdfs
Users that are interested in cybersecurity-pdfs are comparing it to the libraries listed below
Sorting:
- ☆12Jan 31, 2022Updated 4 years ago
- FEBREV venom is a RAT generator tool to create Android RATs through metasploit , signs the RAT apk , and sends the RAT apk to the victim…☆16Aug 13, 2019Updated 6 years ago
- Automatically exported from code.google.com/p/ra2-dom-xss-scanner☆29Jan 4, 2016Updated 10 years ago
- A project for web scraping one of the most prolific job sites for information concerning certifications you should pursue for your releva…☆31Nov 9, 2023Updated 2 years ago
- ☆31Mar 21, 2023Updated 2 years ago
- A simple program to quickly and efficiently check accounts on snapchat,☆11Feb 5, 2023Updated 3 years ago
- Notes for the PJPT exam!☆14Aug 8, 2024Updated last year
- Troyano espía, Keylogger para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. Envía los datos mediante G…☆12May 9, 2020Updated 5 years ago
- This a notes/handbook i made and gathered from a great resources on the internet. It consist of a very detailed cheat sheets and useful c…☆162Dec 19, 2022Updated 3 years ago
- instagram bot reports spam☆10Oct 19, 2020Updated 5 years ago
- ☆15Jul 30, 2022Updated 3 years ago
- Find Email Spoofing Vulnerablity of domains☆96Jul 30, 2024Updated last year
- Very messy code, made this for testing, is/was working. Mobile and Web API.☆11Dec 1, 2022Updated 3 years ago
- ☆11Feb 16, 2024Updated last year
- ☆12Aug 22, 2017Updated 8 years ago
- Utilize IBM Cloud Functions with OAuth 2.0 to enable authentication and authorization☆11Feb 14, 2022Updated 4 years ago
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- Zeroscan is a Domain Controller vulnerability scanner, that currently includes checks for Zerologon (CVE-2020-1472), MS-PAR/MS-RPRN and S…☆11Apr 9, 2022Updated 3 years ago
- This repository is a collection of notes, links, tutorials, and experiences aimed at helping others. If you find it useful, please consid…☆18Jun 24, 2025Updated 7 months ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- Brute force your iOS Restrictions Passcode from the key & salt☆14Aug 27, 2019Updated 6 years ago
- Run command as root without password☆12Jul 20, 2022Updated 3 years ago
- MITM to Capture FTP Credentials☆14Apr 27, 2022Updated 3 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 2 years ago
- This bot attends the online classes held on Microsoft teams, according to the given timetable.Informs if bot is successfully joined the m…☆11Feb 2, 2022Updated 4 years ago
- A simple application that shows how to exploit the CVE-2022-42889 vulnerability☆10Nov 6, 2022Updated 3 years ago
- ☆41May 22, 2024Updated last year
- tl;tr; jhaddix bhmv5☆10Jul 2, 2020Updated 5 years ago
- ☆14Jan 31, 2026Updated 2 weeks ago
- Play 2048 in notepad.exe☆13Feb 16, 2015Updated 10 years ago
- ☄️ Fast, 100% Accurate, Anti Honeypot SSH Cracker 🔑☆15May 1, 2022Updated 3 years ago
- A super dope tool, that generates "corrupted" .PDF files of randomly unique file sizes (no two files of the same size or byte combination…☆14Oct 12, 2021Updated 4 years ago
- ☆11Aug 11, 2012Updated 13 years ago
- Information gathering tool by Arjun arz☆11Jul 3, 2020Updated 5 years ago
- Chromium Browser Credential Extractor☆10Updated this week
- OhNo - The Evil Image Builder & Meta Manipulator☆11Jun 5, 2014Updated 11 years ago
- This is a project with .net server crypter for bypass AV's Runtime detection.☆11Sep 8, 2017Updated 8 years ago
- ☆14Updated this week
- Installs ADDS and configures a vulnerable domain via a powershell script☆12Jul 13, 2023Updated 2 years ago