Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course
☆124Feb 12, 2022Updated 4 years ago
Alternatives and similar repositories for Practical-Ethical-Hacking-Resources
Users that are interested in Practical-Ethical-Hacking-Resources are comparing it to the libraries listed below
Sorting:
- CSbyGB PenTips Gitbook☆118Oct 18, 2025Updated 4 months ago
- Python3 script to quickly get various information from a domain controller through his LDAP service.☆11Feb 23, 2022Updated 4 years ago
- Aggregated wordlist pulled from commonly used tools for discovery, enumeration, fuzzing, and exploitation.☆11Dec 30, 2020Updated 5 years ago
- CSbyGB - Gabrielle B's new Blog!☆23Jul 29, 2025Updated 7 months ago
- Config files for my GitHub profile.☆13Oct 9, 2022Updated 3 years ago
- Script related in Active Directory Attacks Domain☆24Aug 19, 2023Updated 2 years ago
- The "Virtual Whale" OSINT CTF at BSides DFW 2019!☆22Nov 2, 2019Updated 6 years ago
- Virus Total Free - IOC parser and report generator☆25Mar 19, 2023Updated 2 years ago
- ☆12Apr 20, 2025Updated 10 months ago
- ☆12Feb 9, 2025Updated last year
- Burp Enterprise Toolkit☆12Feb 25, 2022Updated 4 years ago
- SIEM Cheat Sheet☆80Aug 15, 2023Updated 2 years ago
- Repository with some necessary information for you to create your PenTest consultancy☆102Jan 12, 2025Updated last year
- Offensive Terraform module which creates an IAM role with trust relationship with attacker's AWS account and attaches managed IAM Policy …☆12Sep 18, 2020Updated 5 years ago
- 🎉 Happy 4th anniversary to the ResetHacker community! 🎉☆11Aug 8, 2024Updated last year
- ☆317Jul 6, 2024Updated last year
- Raf Scanner IDE☆12Apr 14, 2023Updated 2 years ago
- ☆17Oct 12, 2021Updated 4 years ago
- 25.11.2021 Siber Güvenlik İçin Python Eğitiminde Yazılan Kodlar☆13Nov 25, 2021Updated 4 years ago
- ☆892Sep 5, 2023Updated 2 years ago
- Azure and AWS Attacks☆1,114Nov 25, 2022Updated 3 years ago
- ☆54May 18, 2024Updated last year
- ☆210Mar 4, 2022Updated 4 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆58Jan 10, 2023Updated 3 years ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆42Jun 27, 2021Updated 4 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆13Aug 26, 2021Updated 4 years ago
- Slides and materials for conference presentations☆11Jun 4, 2023Updated 2 years ago
- ☆12Feb 10, 2020Updated 6 years ago
- DC540 hacking challenge 0x00005b.☆16Nov 26, 2025Updated 3 months ago
- This repository contains links to awesome security articles.☆42Aug 2, 2025Updated 7 months ago
- Oh-My-Tmux script for TryHackMe, HackTheBox, or other VPN practice site☆14Mar 30, 2025Updated 11 months ago
- This is a repository for network security tools and technologies.☆101Nov 6, 2022Updated 3 years ago
- A collection of snippets of codes and commands to make your life easier!☆2,875Sep 25, 2023Updated 2 years ago
- ☆484Aug 12, 2022Updated 3 years ago
- Summaries, transcripts, key points, and other useful insights from AWS re:inforce 2025 talks for those of us who don't have time to watch…☆103Jun 25, 2025Updated 8 months ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 9 months ago
- ☆65Jun 5, 2021Updated 4 years ago
- ThreatTrack | Shodan + ExploitDB + GitHub + NVD☆17Jul 16, 2024Updated last year
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆111Feb 6, 2020Updated 6 years ago