my books
☆51Aug 21, 2018Updated 7 years ago
Alternatives and similar repositories for MyBooks-1
Users that are interested in MyBooks-1 are comparing it to the libraries listed below
Sorting:
- ☆10Mar 31, 2024Updated last year
- A simple personal website stack☆14Feb 8, 2026Updated last month
- ☆21Dec 18, 2024Updated last year
- AD concepts, attack surfaces and attack vectors notes, slides, video...☆16Dec 6, 2024Updated last year
- A quick way to perform a bulk whois query. Utilizes Team Cymru's service. Requires netcat.☆11Feb 11, 2012Updated 14 years ago
- Bash Script to Hunt all the targets/Subdomains from Chaos by Project Discovery Team☆36Sep 26, 2020Updated 5 years ago
- ☆18Mar 12, 2024Updated 2 years ago
- Extract SSL certificate data (Subject Name, Subject Alt Names, Organisation)☆42Nov 10, 2025Updated 4 months ago
- AWS,AZURE,GOOGLE CLOUD IP CIDRS☆50Feb 14, 2022Updated 4 years ago
- Capture WPA/WPA2 4-way handshake using BW16 (RTL8720dn)☆16Feb 22, 2026Updated 3 weeks ago
- Service-Now Article Bruteforcer☆16Jun 5, 2020Updated 5 years ago
- Hash Kit is tool Programmed by me . It consist of three sections : Encoding Hash , Decoding Hash , and Identifying Hash Id .☆12Dec 5, 2021Updated 4 years ago
- A simple utility to generate domain names with all possible TLDs☆23Feb 3, 2023Updated 3 years ago
- Free Windows privilege escalation lab inspired by HTB Devel, built for PNPT and OSCP practice.☆23Jan 13, 2026Updated 2 months ago
- A list of OSINT resources and tools that may be useful when conducting investigations related to the Kingdom of Saudi Arabia☆12May 12, 2025Updated 10 months ago
- ☆11Aug 12, 2025Updated 7 months ago
- My personal Blog☆10Nov 27, 2025Updated 3 months ago
- Just your regular Qur'an apps on Android platform, except I'm trying to make it's app size as small as possible while not sacrificing any…☆15Nov 13, 2025Updated 4 months ago
- A framework for the detection of COSI vulnerabilities / XS-Leaks☆14Mar 29, 2023Updated 2 years ago
- Source code for 'Using the C++ Standard Template Libraries' by Ivor Horton☆39Jan 10, 2018Updated 8 years ago
- CTF Cheatsheet☆35Jun 1, 2020Updated 5 years ago
- Supporting material for the frida scripting guide☆22Jul 2, 2022Updated 3 years ago
- CyberPreacher cloud project collection☆16Dec 21, 2025Updated 2 months ago
- ☆13Sep 28, 2024Updated last year
- Sass folder structure => organizing project files.☆34May 14, 2021Updated 4 years ago
- Chaotic good security research☆19Mar 28, 2025Updated 11 months ago
- A curated list of resources for genealogical research using open-source intelligence (OSINT).☆16Jan 10, 2025Updated last year
- Blockchain for Medical Data Access and Permission Management☆13Jan 1, 2023Updated 3 years ago
- CCNA v7 Packet Tracer explanations and codes☆21Feb 28, 2021Updated 5 years ago
- ☆17May 5, 2020Updated 5 years ago
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆17Jun 11, 2024Updated last year
- ☆15Sep 3, 2018Updated 7 years ago
- Collected resources for OSWA preparation.☆26Jan 25, 2023Updated 3 years ago
- ☆11Jul 20, 2023Updated 2 years ago
- Some tools i made for personal use☆10Mar 15, 2024Updated 2 years ago
- Indicators of compromise☆17Jan 29, 2026Updated last month
- Manage attack surface data on Elasticsearch☆25Nov 20, 2023Updated 2 years ago
- This is a social media app built using the MERN stack. It includes authentication, posts, likes, comments, and follows.☆19Jul 14, 2024Updated last year
- Recon tool to query cloud prefixes for services associated with an IP address☆23Oct 2, 2024Updated last year