vaibhavkrjha / Hacking-Security-EbooksView external linksLinks
Top 100 Hacking & Security E-Books (Free Download)
☆44Sep 18, 2019Updated 6 years ago
Alternatives and similar repositories for Hacking-Security-Ebooks
Users that are interested in Hacking-Security-Ebooks are comparing it to the libraries listed below
Sorting:
- Malduino compatible USB rubber ducky payloads☆14Jun 7, 2019Updated 6 years ago
- XXE Injection Payloads☆28Jul 30, 2019Updated 6 years ago
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- Escalation Servers and Scripts for Priv Escalation☆18Jul 20, 2019Updated 6 years ago
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- A privilege escalation exploit in the Steam Client☆13Aug 11, 2019Updated 6 years ago
- A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study mater…☆26Oct 4, 2019Updated 6 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Oct 11, 2021Updated 4 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Sep 8, 2025Updated 5 months ago
- simple code directory brute☆17Feb 26, 2021Updated 4 years ago
- A general Javascript keylogger to be used in an XSS PoC☆19Feb 23, 2020Updated 5 years ago
- A sub-domain enumeration tool☆20May 18, 2020Updated 5 years ago
- ☆14Oct 1, 2021Updated 4 years ago
- Scanning in the middlelayer, v2☆10Feb 10, 2026Updated last week
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- ☆21Oct 3, 2019Updated 6 years ago
- ☆25Mar 21, 2020Updated 5 years ago
- FireVu is an Intentionally vulnerable Android application developed for Android open source security.☆11Mar 13, 2024Updated last year
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- Visualizing Path Finding using A* algorithm☆14Nov 7, 2022Updated 3 years ago
- ☆26Sep 2, 2025Updated 5 months ago
- Shodan Favicon Hash Generator By Aziz Hakim @eternyle☆26May 25, 2024Updated last year
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- A simple reverse shell in Nim langauge. It should bypass AV-s (don't submit binaries)☆16Oct 10, 2019Updated 6 years ago
- Accompanying material needed for the workshop☆11Jun 14, 2023Updated 2 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- ☆10Feb 22, 2023Updated 2 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Sep 22, 2021Updated 4 years ago
- SqlMap_BurpSuite☆51Aug 15, 2019Updated 6 years ago
- Tool for checking reflecting Parameters in a URL.☆10Aug 31, 2020Updated 5 years ago
- Python script that automate the process of generating various reverse shells.☆15Mar 22, 2021Updated 4 years ago
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆31Sep 30, 2019Updated 6 years ago
- Unauthenticated RCE at Woody Ad Snippets / CVE-2019-15858 (PoC)☆32Apr 25, 2023Updated 2 years ago
- A tool that scans a list of given domains, and returns the status codes for each domain on both port 80 & 443☆17Jan 8, 2021Updated 5 years ago
- Code files from my official tutorial channel, LearnWithHasinHayder☆17Mar 1, 2018Updated 7 years ago
- Exploit for win10 SMB3.1☆18Apr 5, 2020Updated 5 years ago
- A automated Meterpreter payload generator script in Bash That can start Listener automatically for specified payload. (only for KALI Linu…☆15Jul 25, 2021Updated 4 years ago
- An0n 3xPloiTeR Shell☆35Oct 4, 2019Updated 6 years ago