AlexielArdilla / Full-Red-Team-Ethical-Hacking-Libro-CmpletoLinks
Libro: Full Red Team: Ethical Hacking: Una guía práctica y profunda sobre hacking ético: técnicas, scripts y estrategias reales para pentesters, investigadores y apasionados de la ciberseguridad, desde el reconocimiento hasta la remediación.
☆30Updated 2 weeks ago
Alternatives and similar repositories for Full-Red-Team-Ethical-Hacking-Libro-Cmpleto
Users that are interested in Full-Red-Team-Ethical-Hacking-Libro-Cmpleto are comparing it to the libraries listed below
Sorting:
- ☆133Updated 6 months ago
- ☆318Updated this week
- ☆65Updated last year
- A powerful collection of tools designed for social engineering research, penetration testing, and security awareness training. These tool…☆55Updated 8 months ago
- Physical penetration testing is a critical aspect of security assessment that involves simulating real-world attacks to evaluate the effe…☆84Updated 2 weeks ago
- ☆248Updated 2 months ago
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆142Updated 11 months ago
- An AI-driven vulnerability scanner that uses Nmap to discover open services on a user-supplied IP, matches each service to relevant CVEs …☆47Updated 6 months ago
- ☆222Updated 8 months ago
- Admin Directory Finder is a tool designed to scan and identify directories under admin paths, such as admin/dashboard.php. It helps in se…☆33Updated 3 months ago
- Enhance Your Active Directory Password Spraying with User Intelligence.☆304Updated 3 months ago
- Househole prioritizes privacy, security, and control, while helping users remain undetected by services that identify temporary emails.☆33Updated last year
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆143Updated last year
- Laravel RCE Exploitation Toolkit☆48Updated last month
- Herramienta para detectar correos de phishing mediante análisis DKIM, SPF, y WHOIS☆32Updated last year
- A list of all Active Directory machines from HackTheBox☆189Updated 3 weeks ago
- Red Team Arsenal - a comprehensive collection of tools, scripts, and techniques for conducting red team operations and adversary simulati…☆76Updated 3 weeks ago
- A comprehensive automation script for penetration testing and reconnaissance.☆43Updated last year
- Bot creado por el proyecto Cibervengadores, automatiza la recolección de indicadores de compromiso en un repostiroio público de GitHub☆15Updated 5 months ago
- Some useful books related to Cybersecurity, Linux and more.☆64Updated 5 months ago
- ☆46Updated 3 weeks ago
- An interactive Bash-based network scanning tool that provides live host discovery, port scanning, traceroute, and ping tests, featuring v…☆46Updated 8 months ago
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆126Updated 7 months ago
- A collection of config files for linux focusing on hackthebox theme☆53Updated 2 months ago
- Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware an…☆44Updated 8 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆129Updated 8 months ago
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆215Updated 8 months ago
- Máquina virtual educativa que simula los sistemas usados por una empresa eléctrica: control de consumo, monitoreo industrial y cibersegur…☆45Updated last month
- Phone: A Mobile Phone Forensic Framework ( Android )☆206Updated 8 months ago
- 100 Hacking Tools and Resources☆110Updated 2 years ago