Step into my GitHub treasure trove—an immersive collection of comprehensive notes chronicling my Certified Ethical Hacker (CEH) lab escapades. Journey through the intricate art of hacking, traversing from covert reconnaissance to the boundless realms of cloud computing. Prepare to illuminate your path in the captivating cosmos of ethical hacking…
☆36Aug 13, 2023Updated 2 years ago
Alternatives and similar repositories for CEH-Lab-Notes
Users that are interested in CEH-Lab-Notes are comparing it to the libraries listed below
Sorting:
- A structured portfolio of weekly CEH v13 assessments, vulnerability labs, and ethical hacking documentation to demonstrate practical cybe…☆21Jun 25, 2025Updated 8 months ago
- Certified Ethical H@cking v13 with AI PDFs☆23Nov 6, 2024Updated last year
- TikTok Phishing Attack Simulation Tool designed for ethical hacking, security awareness, and educational purposes.☆25Aug 2, 2025Updated 7 months ago
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆17Mar 14, 2025Updated last year
- Certified Ethical Hacker (CEH) v12 Notes☆305Sep 25, 2025Updated 5 months ago
- CMSC389R course at UMD☆11Oct 2, 2019Updated 6 years ago
- ☆31Jun 8, 2023Updated 2 years ago
- Simple smtp server in go☆11Jul 17, 2017Updated 8 years ago
- An ongoing collection of awesome ethical hacking tools, software, libraries, learning tutorials, frameworks, academic and practical resou…☆40Feb 24, 2023Updated 3 years ago
- ☆16Feb 10, 2025Updated last year
- Powerful WiFi Hacking penetration testing tools for Linux, designed for ethical hacking, security testing, and network auditing.☆16Nov 18, 2025Updated 4 months ago
- AI-powered vulnerability scanner extension for Burp Suite with multi-provider support (Ollama, OpenAI, Claude, Gemini)☆210Feb 22, 2026Updated 3 weeks ago
- Detectify is a deep learning system that detects AI-generated fake videos (deepfakes) using CNN and LSTM-based RNNs. Trained on datasets …☆17Jun 6, 2024Updated last year
- The People's LLM cost tracker & cache. 100% local, fiercely private, built for OpenClaw. Track every penny, cache every response.☆21Feb 16, 2026Updated last month
- Read data from ascii tables☆11May 4, 2018Updated 7 years ago
- ☆24Mar 20, 2023Updated 3 years ago
- This Repo will help you to prepare better for CEH - Practical Exam☆54Jun 2, 2025Updated 9 months ago
- Writeups of CTFLearn Challenges , by EdbR - EladBeber☆15Feb 21, 2026Updated last month
- ☆28Jul 5, 2023Updated 2 years ago
- ☆13Sep 25, 2022Updated 3 years ago
- ☆11May 30, 2021Updated 4 years ago
- Ethical hacking notes pdf☆51Sep 28, 2024Updated last year
- The objective of Smart File Hunter (SFH) is the efficient identification of files containing sensitive information like passwords or priv…☆14Sep 3, 2022Updated 3 years ago
- Set of test cases that can be used to test custom implementations of the SecRules language (ModSecurity rules format).☆17Feb 25, 2025Updated last year
- my MSTICpy practice and custom tools repository☆11Apr 23, 2025Updated 10 months ago
- Community curated list of templates for the OSINT template engine.☆22Jul 11, 2023Updated 2 years ago
- Git All the Payloads! A collection of web attack payloads.☆10Dec 31, 2018Updated 7 years ago
- This is a collection of Bug Bounty Tips collected from security researchers / bug hunters on Twitter.☆13Feb 19, 2021Updated 5 years ago
- Config files for my GitHub profile.☆31Updated this week
- CEH v13 i-labs , CEH v13 Engage Answers☆34Jul 5, 2025Updated 8 months ago
- Network security related project collection.☆77Jan 16, 2020Updated 6 years ago
- This project is about tool for detecting, quarantining, and alerting about suspicious phishing emails.☆17Aug 29, 2025Updated 6 months ago
- Pentester Academy notes and commands from the CRTP/CRTE/PACES courses☆15Apr 29, 2022Updated 3 years ago
- A starter project to create Arc jobs using the Jupyter Notebook interface☆22Mar 25, 2021Updated 4 years ago
- My Personal Notes that I used on the Exam as a Cheatsheet☆70Aug 14, 2023Updated 2 years ago
- ☆112May 12, 2023Updated 2 years ago
- A reconnaissance tool for ethical hackers written in RUST☆21Apr 8, 2024Updated last year
- This report was written for the Digital Forensics Analysis coursework, specifically the first assignment. In which, steps and screenshots…☆13Jul 17, 2023Updated 2 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago