a collection of pdfs i like to read
☆26May 25, 2023Updated 2 years ago
Alternatives and similar repositories for cybersecurity-pdfs
Users that are interested in cybersecurity-pdfs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Jan 31, 2022Updated 4 years ago
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆14Dec 13, 2023Updated 2 years ago
- FEBREV venom is a RAT generator tool to create Android RATs through metasploit , signs the RAT apk , and sends the RAT apk to the victim…☆16Aug 13, 2019Updated 6 years ago
- A collection of cybsecurity tools, software, libraries, learning tutorials, frameworks, academic and practical resources in security.☆19Feb 29, 2024Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆16Jul 5, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆17Mar 17, 2022Updated 4 years ago
- Cybersecurity ethical hacking library and app☆17Jan 12, 2021Updated 5 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Mar 31, 2021Updated 4 years ago
- ☆27Jun 3, 2023Updated 2 years ago
- A project for web scraping one of the most prolific job sites for information concerning certifications you should pursue for your releva…☆32Nov 9, 2023Updated 2 years ago
- This a notes/handbook i made and gathered from a great resources on the internet. It consist of a very detailed cheat sheets and useful c…☆162Dec 19, 2022Updated 3 years ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engin…☆22Jan 1, 2022Updated 4 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆18Nov 17, 2019Updated 6 years ago
- An ongoing collection of of AWS tools, frameworks, libraries, learning tutorials for InfoSec and security professionals☆23Dec 16, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about SSL / TLS☆23Jun 24, 2024Updated last year
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆99Apr 19, 2023Updated 2 years ago
- Most of the notes, resources and scripts I used to prepare for the OSCP and pass it the first time.☆76Aug 24, 2022Updated 3 years ago
- Very messy code, made this for testing, is/was working. Mobile and Web API.☆11Dec 1, 2022Updated 3 years ago
- A collection of awesome software, libraries, documents, books, resources and cool stuff about cryptography in Cybersecurity.☆25May 24, 2025Updated 10 months ago
- Netbyte is a Netcat-style tool that facilitates probing proprietary TCP and UDP services. It is lightweight, fully interactive and provid…☆59Dec 15, 2025Updated 3 months ago
- ☆31Mar 21, 2023Updated 3 years ago
- Various Write Ups from OverTheWire, TryHackMe, HackTheBox, CrackMes.one and more!☆11Dec 25, 2022Updated 3 years ago
- An ongoing collection of awesome macOS and iOS security tools, software, libraries, learning tutorials, frameworks, academic and practica…☆34Dec 31, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Find Email Spoofing Vulnerablity of domains☆97Jul 30, 2024Updated last year
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆35Feb 9, 2025Updated last year
- List of red team resources☆100Nov 21, 2017Updated 8 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆28Jul 9, 2022Updated 3 years ago
- A Nginx reverse proxy that authenticates users using their personal certificates. Includes everything to create and revoke those certific…☆29Mar 8, 2021Updated 5 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- ☆41May 22, 2024Updated last year
- Quick and dirty scripts for pentesting.☆41Jun 12, 2020Updated 5 years ago
- ☆19Oct 25, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 4 months ago
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 3 months ago
- An ongoing collection of awesome ethical hacking tools, software, libraries, learning tutorials, frameworks, academic and practical resou…☆40Feb 24, 2023Updated 3 years ago
- ☆68Jul 12, 2025Updated 8 months ago
- 💬 Data forensics and recovery utility for Skype chats and history☆12Oct 29, 2021Updated 4 years ago
- ☆40Jan 7, 2022Updated 4 years ago
- Metabase Pre-auth RCE☆12Aug 3, 2023Updated 2 years ago