a collection of pdfs i like to read
☆26May 25, 2023Updated 2 years ago
Alternatives and similar repositories for cybersecurity-pdfs
Users that are interested in cybersecurity-pdfs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Jan 31, 2022Updated 4 years ago
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆14Dec 13, 2023Updated 2 years ago
- Security test tool for Blind XSS☆26Mar 5, 2020Updated 6 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆17Mar 17, 2022Updated 4 years ago
- Cybersecurity ethical hacking library and app☆17Jan 12, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆17Jul 5, 2022Updated 3 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Mar 31, 2021Updated 5 years ago
- ☆27Jun 3, 2023Updated 2 years ago
- A project for web scraping one of the most prolific job sites for information concerning certifications you should pursue for your releva…☆32Nov 9, 2023Updated 2 years ago
- This a notes/handbook i made and gathered from a great resources on the internet. It consist of a very detailed cheat sheets and useful c…☆162Dec 19, 2022Updated 3 years ago
- ☆10Apr 2, 2023Updated 3 years ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engin…☆23Jan 1, 2022Updated 4 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆18Nov 17, 2019Updated 6 years ago
- An ongoing collection of of AWS tools, frameworks, libraries, learning tutorials for InfoSec and security professionals☆23Dec 16, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆99Apr 19, 2023Updated 2 years ago
- Most of the notes, resources and scripts I used to prepare for the OSCP and pass it the first time.☆76Aug 24, 2022Updated 3 years ago
- Very messy code, made this for testing, is/was working. Mobile and Web API.☆11Dec 1, 2022Updated 3 years ago
- A collection of awesome software, libraries, documents, books, resources and cool stuff about cryptography in Cybersecurity.☆25May 24, 2025Updated 10 months ago
- Netbyte is a Netcat-style tool that facilitates probing proprietary TCP and UDP services. It is lightweight, fully interactive and provid…☆59Dec 15, 2025Updated 4 months ago
- ☆31Mar 21, 2023Updated 3 years ago
- Various Write Ups from OverTheWire, TryHackMe, HackTheBox, CrackMes.one and more!☆12Dec 25, 2022Updated 3 years ago
- An ongoing collection of awesome macOS and iOS security tools, software, libraries, learning tutorials, frameworks, academic and practica…☆35Dec 31, 2021Updated 4 years ago
- Find Email Spoofing Vulnerablity of domains☆96Jul 30, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- List of red team resources☆100Nov 21, 2017Updated 8 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆29Jul 9, 2022Updated 3 years ago
- ☆136Jun 28, 2023Updated 2 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- ☆41May 22, 2024Updated last year
- Quick and dirty scripts for pentesting.☆41Jun 12, 2020Updated 5 years ago
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 4 months ago
- ☆68Jul 12, 2025Updated 9 months ago
- 💬 Data forensics and recovery utility for Skype chats and history☆12Oct 29, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆40Jan 7, 2022Updated 4 years ago
- Metabase Pre-auth RCE☆12Aug 3, 2023Updated 2 years ago
- tl;tr; jhaddix bhmv5☆10Jul 2, 2020Updated 5 years ago
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆77Jul 13, 2021Updated 4 years ago
- NTFSx is a tool for extracting files from an NTFS filesystem that are otherwise inaccessible.☆14Jul 26, 2013Updated 12 years ago
- A collection of awesome software, libraries, learning tutorials, documents and books, awesome resources and cool stuff about ARM and Wind…☆51Jan 6, 2024Updated 2 years ago
- Termux üçün Hacking Tool / Hacking Tool for Termux☆37Nov 20, 2023Updated 2 years ago