Cybersecurity Notes For Intermediate and Advanced Hackers | CEH Exam Prep Also Included
☆67Feb 22, 2026Updated 3 weeks ago
Alternatives and similar repositories for Cybersecurity-Notes
Users that are interested in Cybersecurity-Notes are comparing it to the libraries listed below
Sorting:
- ☆14Sep 28, 2023Updated 2 years ago
- ☆25May 11, 2020Updated 5 years ago
- Step into my GitHub treasure trove—an immersive collection of comprehensive notes chronicling my Certified Ethical Hacker (CEH) lab escap…☆36Aug 13, 2023Updated 2 years ago
- Digital Forensics Essentials (DFE)☆13Mar 18, 2024Updated 2 years ago
- Made a sample fileless malware which could cause potential harm if used correctly.☆18Dec 9, 2023Updated 2 years ago
- CEH Practical☆55Aug 14, 2023Updated 2 years ago
- Enhance your hacking toolkit with my Chrome Extension. Designed for ethical hacking and red team activities, it offers tailored features …☆53Apr 5, 2025Updated 11 months ago
- Tool to automate corporate network segmentation test☆21Aug 6, 2020Updated 5 years ago
- A Powerful XSS,RXSS,BXSS finding tool☆31Oct 29, 2025Updated 4 months ago
- A powerful Burp Suite extension that automatically detects JavaScript URLs from HTTP traffic, scans them using TruffleHog for secrets det…☆31Oct 23, 2025Updated 4 months ago
- Welcome to my GitHub repository housing comprehensive handwritten notes from the IBM Cybersecurity Analyst Professional certification. Di…☆23Feb 27, 2024Updated 2 years ago
- PowerShell script to generate ShellCode in various formats☆45Sep 25, 2024Updated last year
- A gadget for converting PE files to shellcode.☆15Jan 9, 2020Updated 6 years ago
- ShootCutMe an .LNK file creator tool for redteamer☆16Oct 2, 2024Updated last year
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆17Mar 14, 2025Updated last year
- You're busted!☆28Dec 16, 2019Updated 6 years ago
- An ongoing curated collection of awesome software, libraries, frameworks, talks & videos, best practices, learning tutorials and importan…☆21Jul 29, 2022Updated 3 years ago
- ☆70Jun 16, 2022Updated 3 years ago
- Cybersecurity Notes☆169Apr 11, 2024Updated last year
- A simple Password Manager using Tkinter.☆16Aug 6, 2017Updated 8 years ago
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- ☆24Dec 3, 2025Updated 3 months ago
- CEH Practical Exam Notes (ilab), Blog and video☆204Nov 17, 2022Updated 3 years ago
- NDISPktScan is a plugin for the Volatility Framework. It parses the Ethernet packets stored by ndis.sys in Windows kernel space memory.☆12Oct 23, 2015Updated 10 years ago
- ☆12Oct 21, 2024Updated last year
- ☆28Jul 5, 2023Updated 2 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆11Mar 12, 2026Updated last week
- NetGun is a free and open source tool for Vulnerability Assessment, port scanning, services enumeration, misconfigurations testing and CV…☆12Jul 25, 2024Updated last year
- Shellcode Loader Library.☆14Sep 21, 2025Updated 6 months ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- ⚙️ Map and execute EXE in memory