Libro: Full Red Team: Ethical Hacking: Una guía práctica y profunda sobre hacking ético: técnicas, scripts y estrategias reales para pentesters, investigadores y apasionados de la ciberseguridad, desde el reconocimiento hasta la remediación.
☆31Dec 5, 2025Updated 5 months ago
Alternatives and similar repositories for Full-Red-Team-Ethical-Hacking-Libro-Cmpleto
Users that are interested in Full-Red-Team-Ethical-Hacking-Libro-Cmpleto are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆76Mar 17, 2026Updated last month
- Novel Windows process injection: assembles existing open handles (process & thread), natural RWX regions, and special user APC (NtQueueAp…☆70Feb 17, 2026Updated 2 months ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 months ago
- An asynchronous OSINT tool for IP address intelligence that aggregates data from multiple APIs to provide accurate geolocation, network, …☆50Feb 6, 2026Updated 3 months ago
- A scanner for the FortiNet vulnerability CVE-2025-64446☆31Nov 18, 2025Updated 5 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆27Jul 2, 2024Updated last year
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated last year
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated 4 months ago
- 免杀木马样本☆106Oct 11, 2025Updated 6 months ago
- FARO - Document Sensitivity Detector☆10Sep 30, 2022Updated 3 years ago
- Stack integrity verification to Detect SleepMask or CallStack Spoofer☆54Jul 13, 2025Updated 9 months ago
- Context-aware Nmap reconnaissance framework with traffic intelligence and AD awareness☆26Feb 4, 2026Updated 3 months ago
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 7 months ago
- See https://github.com/FastCGI-Archives/fcgi2 for a "maintained" mirror☆11May 26, 2016Updated 9 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- burpsuite extension to analyze javascript files using semgrep☆12Feb 3, 2025Updated last year
- Notes taken from Android App Hacking - Black Belt Edition (UDEMY - Roman Stuehler)☆25May 19, 2024Updated last year
- Apache Struts 2.3.5 < 2.3.31 / 2.5 < 2.5.10 - Remote Code Execution - Shell Script☆16May 13, 2018Updated 7 years ago
- eBPF-powered silent observer for containerized runtimes, built for malware analysis sandboxes and Agentic AI monitoring.☆92Apr 13, 2026Updated 3 weeks ago
- Android Jiagu unpacker - Automated DEX extraction and restoration from obfuscated APKs☆35Oct 29, 2025Updated 6 months ago
- Display USGS Watershed maps on a Node-RED Dashboard with Water Quality Reports☆11Jun 9, 2020Updated 5 years ago
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆33Dec 31, 2025Updated 4 months ago
- Mass Hunting & Exploitation PoC for CVE-2025-55182 & CVE-2025-66478☆38Dec 7, 2025Updated 5 months ago
- ☆105May 29, 2025Updated 11 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Windows Access token manipulation tool made in C#☆25Aug 24, 2025Updated 8 months ago
- Let's make quick work of GraphQL instances ;)☆26Mar 8, 2026Updated 2 months ago
- MalwareScan is a lightweight and fast malware scanner written in Python. It supports both Windows and Linux platforms and provides an ope…☆13Jun 2, 2025Updated 11 months ago
- Offensive Security & Red Teaming Labs and Projects☆27Aug 26, 2025Updated 8 months ago
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆30Feb 15, 2026Updated 2 months ago
- 🕶 Cross-platform network interface command-line utility.☆18Jan 23, 2023Updated 3 years ago
- ☆15Jan 2, 2026Updated 4 months ago
- PoC for CVE-2025-22457 - A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Pulse Connect Secure, Ivan…☆73Apr 25, 2025Updated last year
- Programs used in the Exploitation Tutorial. Check out thehackerway.com☆20Mar 11, 2014Updated 12 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- 🛡️ Detect and respond to security threats in real-time with God-Eye, an AI-driven tool designed for privacy and local deployment on mult…☆39Updated this week
- This is the latest version of XenoRAT, updated with configurations and capable of bypassing all system securities. It will be maintained …☆23Apr 16, 2025Updated last year
- This is an automated script that can run a Mikrotik CHR image inside a Docker container on a non-KVM VPS.☆22Nov 15, 2025Updated 5 months ago
- DSCourier is a proof-of-concept that uses the WinGet Configuration COM API to apply DSC configurations through Microsoft-signed binaries.☆181Apr 16, 2026Updated 3 weeks ago
- An Implementation of LoRa for EmComm (Emergency Communication) or (TacComm) Tactical Communication☆20Jul 23, 2025Updated 9 months ago
- TrueMedia.org web application for querying multiple deepfake detection models and analyzing results☆23Jan 24, 2025Updated last year
- CVE-2025-22457: Python Exploit POC Scanner to Detect Ivanti Connect Secure RCE☆19Apr 17, 2025Updated last year