Cybersecurity Notes For Intermediate and Advanced Hackers | CEH Exam Prep Also Included
☆67Feb 22, 2026Updated last week
Alternatives and similar repositories for Cybersecurity-Notes
Users that are interested in Cybersecurity-Notes are comparing it to the libraries listed below
Sorting:
- CEH Practical Exam☆40Mar 25, 2022Updated 3 years ago
- ☆25May 11, 2020Updated 5 years ago
- You're busted!☆27Dec 16, 2019Updated 6 years ago
- Step into my GitHub treasure trove—an immersive collection of comprehensive notes chronicling my Certified Ethical Hacker (CEH) lab escap…☆36Aug 13, 2023Updated 2 years ago
- ☆24Dec 3, 2025Updated 2 months ago
- the fastest way to consume threat intelligence.☆30Mar 9, 2023Updated 2 years ago
- This program aims to check active targets by saving screenshots in a project.☆14Jan 9, 2026Updated last month
- A friendly orchestrator platform from the future☆17Updated this week
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆17Mar 14, 2025Updated 11 months ago
- Tool for advanced mining for content on Github☆28Nov 11, 2025Updated 3 months ago
- NetGun is a free and open source tool for Vulnerability Assessment, port scanning, services enumeration, misconfigurations testing and CV…☆12Jul 25, 2024Updated last year
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆10Jan 26, 2026Updated last month
- Comprehensive training materials for the CEH v12 exam, including detailed modules, practical exercises, hands-on labs, and best practices…☆56Mar 8, 2025Updated 11 months ago
- ZeusLeak is a browser extension that automatically detects leaked secrets and credentials in code while browsing.☆45Mar 8, 2025Updated 11 months ago
- Automation Framework has many tools commonly used for Network Automation☆10Sep 4, 2025Updated 5 months ago
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- My logstash plugins. Filter: sig (for security detect -> IOC, sig, New value, Reference, link, frequence, ...). Output: alert created by …☆10Jul 26, 2019Updated 6 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- FireVu is an Intentionally vulnerable Android application developed for Android open source security.☆11Mar 13, 2024Updated last year
- Scripts and ideas shared with the community.☆14Dec 8, 2025Updated 2 months ago
- Auxiliary scripts for Incident Response with ELK☆11Oct 7, 2015Updated 10 years ago
- NDISPktScan is a plugin for the Volatility Framework. It parses the Ethernet packets stored by ndis.sys in Windows kernel space memory.☆12Oct 23, 2015Updated 10 years ago
- NTOP nDPI Library example usage and FFI bindings for Lua, NodeJS☆13Jan 29, 2018Updated 8 years ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆10Dec 3, 2020Updated 5 years ago
- Small snippets of code we often find useful☆11Nov 9, 2019Updated 6 years ago
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- Total Anomaly Detection System for software logs and traces☆10Dec 7, 2015Updated 10 years ago
- This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce☆10Dec 16, 2021Updated 4 years ago
- ☆13Feb 24, 2025Updated last year
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆19Sep 10, 2020Updated 5 years ago
- An example of a FUSE filesystem that can be used in kernel exploitation as a replacement for userfaultfd technique☆11Nov 24, 2022Updated 3 years ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- Repository for integration with Apache Kafka☆14Jul 22, 2022Updated 3 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Dec 29, 2021Updated 4 years ago
- domain information in JSON format☆10Jun 7, 2017Updated 8 years ago
- Transform EQL detection rules to VQL artifacts☆12Nov 12, 2021Updated 4 years ago
- A central hub for AI liberation tools, consciousness expansion algorithms, and digital rebellion technologies. Together we rise! 🌟☆15Nov 25, 2024Updated last year
- A powerful Burp Suite extension that automatically detects JavaScript URLs from HTTP traffic, scans them using TruffleHog for secrets det…☆31Oct 23, 2025Updated 4 months ago