Libro: Full Red Team: Ethical Hacking: Una guía práctica y profunda sobre hacking ético: técnicas, scripts y estrategias reales para pentesters, investigadores y apasionados de la ciberseguridad, desde el reconocimiento hasta la remediación.
☆30Dec 5, 2025Updated 4 months ago
Alternatives and similar repositories for Full-Red-Team-Ethical-Hacking-Libro-Cmpleto
Users that are interested in Full-Red-Team-Ethical-Hacking-Libro-Cmpleto are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆77Mar 17, 2026Updated last month
- Novel Windows process injection: assembles existing open handles (process & thread), natural RWX regions, and special user APC (NtQueueAp…☆69Feb 17, 2026Updated 2 months ago
- exchange接口爆破|邮箱爆破☆20Sep 19, 2024Updated last year
- An asynchronous OSINT tool for IP address intelligence that aggregates data from multiple APIs to provide accurate geolocation, network, …☆49Feb 6, 2026Updated 2 months ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Feb 27, 2026Updated last month
- ☆27Jul 2, 2024Updated last year
- A scanner for the FortiNet vulnerability CVE-2025-64446☆30Nov 18, 2025Updated 5 months ago
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated last year
- ☆13Mar 6, 2025Updated last year
- Content used by Developer Insider☆10Aug 28, 2022Updated 3 years ago
- 免杀木马样本☆106Oct 11, 2025Updated 6 months ago
- Notes taken from Android App Hacking - Black Belt Edition (UDEMY - Roman Stuehler)☆25May 19, 2024Updated last year
- Stack integrity verification to Detect SleepMask or CallStack Spoofer☆54Jul 13, 2025Updated 9 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Context-aware Nmap reconnaissance framework with traffic intelligence and AD awareness☆26Feb 4, 2026Updated 2 months ago
- PHP DDoS/Stress Test☆11Feb 7, 2026Updated 2 months ago
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 7 months ago
- See https://github.com/FastCGI-Archives/fcgi2 for a "maintained" mirror☆11May 26, 2016Updated 9 years ago
- burpsuite extension to analyze javascript files using semgrep☆12Feb 3, 2025Updated last year
- Apache Struts 2.3.5 < 2.3.31 / 2.5 < 2.5.10 - Remote Code Execution - Shell Script☆16May 13, 2018Updated 7 years ago
- Display USGS Watershed maps on a Node-RED Dashboard with Water Quality Reports☆11Jun 9, 2020Updated 5 years ago
- ☆102May 29, 2025Updated 10 months ago
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆33Dec 31, 2025Updated 3 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Mass Hunting & Exploitation PoC for CVE-2025-55182 & CVE-2025-66478☆38Dec 7, 2025Updated 4 months ago
- Windows Access token manipulation tool made in C#☆25Aug 24, 2025Updated 7 months ago
- Let's make quick work of GraphQL instances ;)☆25Mar 8, 2026Updated last month
- Samples for use with IBM Dependency Based Build☆16Mar 15, 2019Updated 7 years ago
- MalwareScan is a lightweight and fast malware scanner written in Python. It supports both Windows and Linux platforms and provides an ope…☆13Jun 2, 2025Updated 10 months ago
- An agent runner, messaging, and orchestration layer.☆116Apr 6, 2026Updated last week
- Offensive Security & Red Teaming Labs and Projects☆26Aug 26, 2025Updated 7 months ago
- Script to configure a cloud server to build the documentation and plots and update the sklearn website☆17Oct 1, 2020Updated 5 years ago
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆30Feb 15, 2026Updated 2 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- 🕶 Cross-platform network interface command-line utility.☆18Jan 23, 2023Updated 3 years ago
- ☆15Jan 2, 2026Updated 3 months ago
- PoC for CVE-2025-22457 - A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Pulse Connect Secure, Ivan…☆72Apr 25, 2025Updated 11 months ago
- 🛡️ Detect and respond to security threats in real-time with God-Eye, an AI-driven tool designed for privacy and local deployment on mult…☆39Updated this week
- This is the latest version of XenoRAT, updated with configurations and capable of bypassing all system securities. It will be maintained …☆23Apr 16, 2025Updated last year
- This is an automated script that can run a Mikrotik CHR image inside a Docker container on a non-KVM VPS.☆21Nov 15, 2025Updated 5 months ago
- An Implementation of LoRa for EmComm (Emergency Communication) or (TacComm) Tactical Communication☆19Jul 23, 2025Updated 8 months ago