CSbyGB / Practical-Ethical-Hacking-ResourcesView external linksLinks
Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course
☆124Feb 12, 2022Updated 4 years ago
Alternatives and similar repositories for Practical-Ethical-Hacking-Resources
Users that are interested in Practical-Ethical-Hacking-Resources are comparing it to the libraries listed below
Sorting:
- CSbyGB PenTips Gitbook☆118Oct 18, 2025Updated 3 months ago
- Python3 script to quickly get various information from a domain controller through his LDAP service.☆11Feb 23, 2022Updated 3 years ago
- Aggregated wordlist pulled from commonly used tools for discovery, enumeration, fuzzing, and exploitation.☆11Dec 30, 2020Updated 5 years ago
- CSbyGB - Gabrielle B's new Blog!☆23Jul 29, 2025Updated 6 months ago
- Config files for my GitHub profile.☆13Oct 9, 2022Updated 3 years ago
- ☆21Jul 29, 2019Updated 6 years ago
- Virus Total Free - IOC parser and report generator☆25Mar 19, 2023Updated 2 years ago
- The "Virtual Whale" OSINT CTF at BSides DFW 2019!☆22Nov 2, 2019Updated 6 years ago
- RATs library 2003 to present☆16Oct 14, 2023Updated 2 years ago
- Burp Enterprise Toolkit☆12Feb 25, 2022Updated 3 years ago
- ☆12Apr 20, 2025Updated 9 months ago
- SIEM Cheat Sheet☆80Aug 15, 2023Updated 2 years ago
- Repository with some necessary information for you to create your PenTest consultancy☆101Jan 12, 2025Updated last year
- Yet Another SCA tool☆13Nov 10, 2022Updated 3 years ago
- 🎉 Happy 4th anniversary to the ResetHacker community! 🎉☆11Aug 8, 2024Updated last year
- Offensive Terraform module which creates an IAM role with trust relationship with attacker's AWS account and attaches managed IAM Policy …☆12Sep 18, 2020Updated 5 years ago
- Wanna TesT YoUr CyberSecurity Skills Below are the amazing platforms to level-up yourself☆19Jun 4, 2022Updated 3 years ago
- ☆317Jul 6, 2024Updated last year
- Raf Scanner IDE☆12Apr 14, 2023Updated 2 years ago
- ☆16Oct 12, 2021Updated 4 years ago
- ☆1,680Aug 19, 2022Updated 3 years ago
- ☆891Sep 5, 2023Updated 2 years ago
- ☆55May 18, 2024Updated last year
- ☆211Mar 4, 2022Updated 3 years ago
- Slides and materials for conference presentations☆11Jun 4, 2023Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆13Aug 26, 2021Updated 4 years ago
- DC540 hacking challenge 0x00005b.☆16Nov 26, 2025Updated 2 months ago
- ☆12Feb 10, 2020Updated 6 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆32Aug 28, 2023Updated 2 years ago
- This is a repository for network security tools and technologies.☆101Nov 6, 2022Updated 3 years ago
- A collection of snippets of codes and commands to make your life easier!☆2,866Sep 25, 2023Updated 2 years ago
- Summaries, transcripts, key points, and other useful insights from AWS re:inforce 2025 talks for those of us who don't have time to watch…☆103Jun 25, 2025Updated 7 months ago
- hackxpert labs☆18Jun 29, 2022Updated 3 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 8 months ago
- ThreatTrack | Shodan + ExploitDB + GitHub + NVD☆17Jul 16, 2024Updated last year
- CTFScore or the "Advanced CTF Scoring System" is a system intended to track the IDS alerts generated during the course of a CTF and provi…☆22Jul 26, 2022Updated 3 years ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆111Feb 6, 2020Updated 6 years ago
- ☆20Dec 29, 2024Updated last year
- AWS Trail Recon is an idea that came up during gohacking's offensive AWS security training. The idea is to use cloudtrail:lookupevents to…☆15May 14, 2024Updated last year