Github-Classroom-Cybros / Ethical-Hacking-Assignments
Add Assignments that can be practised by beginners learning Ethical Hacking
☆9Updated 6 years ago
Alternatives and similar repositories for Ethical-Hacking-Assignments:
Users that are interested in Ethical-Hacking-Assignments are comparing it to the libraries listed below
- personal fork of OSINT tool recon-ng☆17Updated 7 years ago
- Kali Linux Wireless Penetration Testing Beginner's Guide - Third Edition, published by Packt☆26Updated 2 years ago
- Training scenarios for cyber ranges☆11Updated 4 years ago
- A script for easily building customized images of pentesting distros (Kali and ParrotSec).☆17Updated 4 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆22Updated 2 years ago
- A Python3 powered bash script written to slightly automate the tool installation process of the Hacker Playbook Book (http://thehackerpla…☆39Updated 5 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆17Updated 4 years ago
- ~ Shell Finder By Ⓜ Ⓐ Ⓝ Ⓘ Ⓢ Ⓢ Ⓞ ☪ ~☆31Updated 7 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- Offensive penetration testing. Perform multiple attack types against web applications, vulnerable programs and OSes in predefined and saf…☆24Updated 4 years ago
- A full-fledged msfrpc library for Metasploit framework.☆13Updated 7 years ago
- TXT and PDF documents from the NSA☆14Updated 9 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆52Updated 7 years ago
- Cryptocurrencies related Security resources☆14Updated last year
- Package manager for hackers built by hackers☆35Updated 6 years ago
- Penetration tests on SSH servers using brute force or dictionary attacks. Written in Python.☆32Updated 5 years ago
- This repository services the UNO Cybersecurity capstone (CYBR 4580/8950)☆10Updated 9 months ago
- Script to check Kali Linux configs☆24Updated 6 years ago
- Pentest ToolKit☆27Updated 4 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- BlackArch configuration for the bash shell.☆12Updated 4 years ago
- Red Teaming with Kali Linux. OS Customization, additional tools, and automated updates☆12Updated 8 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆27Updated 9 years ago
- Port scanning and domain utility.☆30Updated 7 years ago
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆19Updated 7 months ago
- Dockerfile with advanced configurations for Offensive Docker.☆13Updated 4 years ago
- Juice Jacking / Automatic Android Rooting based on Intel Edison using dirty c0w☆11Updated 8 years ago
- A curated list of Cloud Security techniques and tools☆30Updated last year
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 2 years ago