Top Hacking Books for 2024 (plus Resources): FREE and Paid
☆36Mar 25, 2025Updated last year
Alternatives and similar repositories for Hacking-Books-2024
Users that are interested in Hacking-Books-2024 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- POC - CVE-2024–4956 - Nexus Repository Manager 3 Unauthenticated Path Traversal☆16Nov 26, 2024Updated last year
- POC - CVE-2024–10914- Command Injection Vulnerability in `name` parameter for D-Link NAS☆47Nov 27, 2024Updated last year
- A comprehensive collection of resources, tools, tips, and guides for preparing and succeeding in the OSCP (Offensive Security Certified P…☆448Jun 23, 2025Updated 10 months ago
- ☆19Aug 14, 2025Updated 8 months ago
- Port Invaders is an arcade-style educational game designed to help you learn and memorize common networking port numbers. Whether you're …☆19Sep 4, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆17May 7, 2025Updated 11 months ago
- Golang CLI binary used for installing and managing Ghostwriter☆19Apr 9, 2026Updated 3 weeks ago
- A collection of Python scripts to automate everyday tasks and solve common problems — from file management and productivity to web scrapi…☆27Feb 27, 2026Updated 2 months ago
- eJPTv2 Essentials: Notes & Machines to crush the eJPTv2 Exam.☆57Sep 1, 2025Updated 8 months ago
- Another pentest of a vulnerable windows server☆15Sep 17, 2021Updated 4 years ago
- Ready made ducky scripts to use in nethunter Duckhunter HID attack to perform bad usb attack right at your fingertips.☆13Mar 24, 2026Updated last month
- Derivate of the OpenPCR Project☆15Mar 16, 2017Updated 9 years ago
- AD concepts, attack surfaces and attack vectors notes, slides, video...☆17Dec 6, 2024Updated last year
- Python wrapper for gatttool from BlueZ to access Bluetooth LE Devices☆12Nov 13, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Misc stuff from internet☆12Apr 13, 2026Updated 3 weeks ago
- NjRAT is a Remote Administration Tool. This repository contains a Njrat Editions.☆18Oct 25, 2020Updated 5 years ago
- Mind Maps☆10Aug 20, 2024Updated last year
- ☆18Aug 20, 2025Updated 8 months ago
- BGP insight tool☆17Feb 1, 2024Updated 2 years ago
- Subscene subtitle list cleaner☆17Dec 24, 2023Updated 2 years ago
- The nightmare of WAFs & CDNs, Use multi tricks for bypass ratelimit of WAFs & CDNs & Webservers.☆16Apr 18, 2025Updated last year
- All About XSS☆16Oct 23, 2022Updated 3 years ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Mar 11, 2013Updated 13 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A utility to fetch and display dns names from the SSL/TLS cert data☆16Aug 11, 2023Updated 2 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- Bus Pirate 5 Hardware Documentation☆13May 28, 2025Updated 11 months ago
- document☆13Sep 1, 2015Updated 10 years ago
- Drupal distribuce pro českou a slovenskou státní správu a místní samosprávu.☆10Dec 18, 2025Updated 4 months ago
- Архив для истории. Я больше не занимаюсь системой "Кумир" и не афиллирован с НИИСИ. Актуальный репозиторий - здесь: https://github.com/a-…☆13Apr 13, 2020Updated 6 years ago
- ☆11Dec 27, 2024Updated last year
- XML-RPC Vulnerability Checker and Directory Fuzzer☆22Sep 28, 2023Updated 2 years ago
- OSINT Framework☆19Mar 31, 2021Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- Common code, such as validators and mixins, that are shared between ActiveModels in metasploit-framework and ActiveRecords in metasploit_…☆14Apr 14, 2026Updated 3 weeks ago
- Simple vulnerability labs that created using PHP and MySQL.☆16Dec 30, 2022Updated 3 years ago
- A simple Mac-Address Sniffer based on tshark☆12Dec 27, 2018Updated 7 years ago
- Inject VBA macro code into Excel documents☆30Oct 22, 2015Updated 10 years ago
- Beepy instantpi buildroot with drivers☆15Mar 12, 2024Updated 2 years ago