GrayHatHacking / GHHv5Links
Official code repository for: Gray Hat Hacking, The Ethical Hacker's Handbook, 5th Edition.
☆196Updated 4 years ago
Alternatives and similar repositories for GHHv5
Users that are interested in GHHv5 are comparing it to the libraries listed below
Sorting:
- Writeups/solutions☆97Updated 5 years ago
- Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆148Updated 5 years ago
- All CTF events☆75Updated 4 years ago
- A curated list of awesome security platforms,including CTF/Security Response Center/Bug Tracker and so on.☆312Updated 2 years ago
- Exploiting challenges in Linux and Windows☆122Updated 5 years ago
- EmpireCTF – write-ups, capture the flag, cybersecurity☆131Updated 2 weeks ago
- Malware Analyst's Cookbook stuffs☆156Updated 9 years ago
- ☆64Updated 3 weeks ago
- Please refer to The Treasure Trove repo below and read the guidelines before accessing this database☆80Updated 10 years ago
- Resources to help get started with IoT Pentesting☆168Updated 6 years ago
- Collection of things made during my preparation to take on OSCE☆189Updated 3 years ago
- Useful CTF Tools☆278Updated 3 years ago
- IoT Penetration Testing Cookbook, published by Packt☆120Updated 2 years ago
- Exercise writeups from the book Practical Malware Analysis.☆226Updated last year
- Wiki-like CTF write-ups repository, maintained by the community. 2018☆270Updated 6 years ago
- ImmunityDebugger☆327Updated 4 years ago
- Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.☆211Updated 2 years ago
- Reverse Engineering Resources☆225Updated 7 years ago
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆182Updated 5 years ago
- PA Toolkit is a collection of traffic analysis plugins focused on security☆433Updated 5 years ago
- The legacy Exploit Database paper repository - New repo located at https://gitlab.com/exploit-database/exploitdb-papers☆455Updated 2 years ago
- Writeups of Capture The Flag Competitions☆122Updated 3 years ago
- Wiki-like CTF write-ups repository by ByteBandits☆101Updated last year
- CTF Writeups: Collection of CTF "technical" writeups by PersianCats.☆218Updated 2 years ago
- A colleciton of CTF write-ups all using pwntools☆514Updated 8 years ago
- Search an exploit in the local exploitdb database by its CVE☆173Updated 2 years ago
- A Virtual environment for Pentesting IoT Devices☆429Updated 2 weeks ago
- SPIKE is a protocol fuzzer creation kit. It provides an API that allows a user to create their own fuzzers for network based protocols us…☆83Updated 8 years ago
- Exploitation and Mitigation Slides☆129Updated last year
- Red Team Tactics, Techniques, and Procedures☆406Updated last month