Step into my GitHub treasure trove—an immersive collection of comprehensive notes chronicling my Certified Ethical Hacker (CEH) lab escapades. Journey through the intricate art of hacking, traversing from covert reconnaissance to the boundless realms of cloud computing. Prepare to illuminate your path in the captivating cosmos of ethical hacking…
☆36Aug 13, 2023Updated 2 years ago
Alternatives and similar repositories for CEH-Lab-Notes
Users that are interested in CEH-Lab-Notes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Certified Ethical H@cking v13 with AI PDFs☆24Nov 6, 2024Updated last year
- Certified Ethical Hacker (CEH) v12 Notes☆307Sep 25, 2025Updated 7 months ago
- CMSC389R course at UMD☆11Oct 2, 2019Updated 6 years ago
- Download all epss data, and import database. We can explore the data by SQL querys!☆11May 23, 2024Updated last year
- ☆36Jun 8, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- 🚧 Bypass Android SSL Pinning with ProxyMan and Frida☆32Aug 1, 2024Updated last year
- An ongoing collection of awesome ethical hacking tools, software, libraries, learning tutorials, frameworks, academic and practical resou…☆42Feb 24, 2023Updated 3 years ago
- A compilation of resources for studying for the eCPPTv2☆19Sep 28, 2022Updated 3 years ago
- ZeroTrace is a personal project I created to practice ethical hacking 🛡️. This AI-powered tool 🤖 generates optimized Google Dorks to un…☆85Dec 17, 2025Updated 5 months ago
- Kickstart your Ethical Hacking Journey with Fsociety by GDSC-SMIT Star the Repository and Open your First PR☆40Oct 25, 2023Updated 2 years ago
- FUD Linux Remote Access Trojan☆19Nov 18, 2022Updated 3 years ago
- Detection for CVE-2025-61675, CVE-2025-61678 & CVE-2025-66039☆47Dec 15, 2025Updated 5 months ago
- CEH Practical Exam☆19Dec 29, 2020Updated 5 years ago
- ☆26Sep 5, 2025Updated 8 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆13Sep 25, 2022Updated 3 years ago
- ☆10May 30, 2021Updated 4 years ago
- The objective of Smart File Hunter (SFH) is the efficient identification of files containing sensitive information like passwords or priv…☆14Sep 3, 2022Updated 3 years ago
- Ethical hacking notes pdf☆56Sep 28, 2024Updated last year
- Git All the Payloads! A collection of web attack payloads.☆10Dec 31, 2018Updated 7 years ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- Community curated list of templates for the OSINT template engine.☆22Jul 11, 2023Updated 2 years ago
- AI-powered vulnerability scanner extension for Burp Suite with multi-provider support (Ollama, OpenAI, Claude, Gemini)☆284Mar 19, 2026Updated 2 months ago
- This is a collection of Bug Bounty Tips collected from security researchers / bug hunters on Twitter.☆13Feb 19, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Config files for my GitHub profile.☆34Mar 27, 2026Updated last month
- Network security related project collection.☆79Jan 16, 2020Updated 6 years ago
- CEH v13 i-labs , CEH v13 Engage Answers☆43Jul 5, 2025Updated 10 months ago
- This project is about tool for detecting, quarantining, and alerting about suspicious phishing emails.☆19Aug 29, 2025Updated 8 months ago
- Pentester Academy notes and commands from the CRTP/CRTE/PACES courses☆15Apr 29, 2022Updated 4 years ago
- A starter project to create Arc jobs using the Jupyter Notebook interface☆22Mar 25, 2021Updated 5 years ago
- ☆10May 6, 2017Updated 9 years ago
- Malware & PoC☆14Dec 29, 2025Updated 4 months ago
- This report was written for the Digital Forensics Analysis coursework, specifically the first assignment. In which, steps and screenshots…☆13Jul 17, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- My Personal Notes that I used on the Exam as a Cheatsheet☆71Aug 14, 2023Updated 2 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago
- ESP32 Marauder Portable IDE creation script☆10Oct 10, 2022Updated 3 years ago
- AI hacking snippets for prompt injection, jailbreaking LLMs, and bypassing AI filters. Ideal for ethical hackers and security researchers…☆61Apr 7, 2026Updated last month
- Netcat binaries compiled for ARM that work on Android devices☆12Jun 12, 2015Updated 10 years ago
- WhoDAT is an InfoSec Analyzer for Nerds using VirusTotal, Google Safe Browsing, URLScan, Hybrid-Analysis, and OpenAI. Scan URLs, emails, …☆15Jan 4, 2026Updated 4 months ago
- ToolShell scanner - CVE-2025-53770 and detection information☆18Dec 7, 2025Updated 5 months ago