Step into my GitHub treasure trove—an immersive collection of comprehensive notes chronicling my Certified Ethical Hacker (CEH) lab escapades. Journey through the intricate art of hacking, traversing from covert reconnaissance to the boundless realms of cloud computing. Prepare to illuminate your path in the captivating cosmos of ethical hacking…
☆36Aug 13, 2023Updated 2 years ago
Alternatives and similar repositories for CEH-Lab-Notes
Users that are interested in CEH-Lab-Notes are comparing it to the libraries listed below
Sorting:
- A structured portfolio of weekly CEH v13 assessments, vulnerability labs, and ethical hacking documentation to demonstrate practical cybe…☆20Jun 25, 2025Updated 8 months ago
- Certified Ethical H@cking v13 with AI PDFs☆23Nov 6, 2024Updated last year
- CHFI - Cyber Forensics Full Course Content☆22Jul 31, 2021Updated 4 years ago
- Powerful WiFi Hacking penetration testing tools for Linux, designed for ethical hacking, security testing, and network auditing.☆16Nov 18, 2025Updated 3 months ago
- TikTok Phishing Attack Simulation Tool designed for ethical hacking, security awareness, and educational purposes.☆21Aug 2, 2025Updated 6 months ago
- Recopilación de Reglas y Diccionarios para Password Cracking☆28May 2, 2019Updated 6 years ago
- Certified Ethical Hacker (CEH) v12 Notes☆303Sep 25, 2025Updated 5 months ago
- This project is about tool for detecting, quarantining, and alerting about suspicious phishing emails.☆17Aug 29, 2025Updated 6 months ago
- ☆10May 17, 2025Updated 9 months ago
- A python application to steal chrome data and push it back to you.☆19May 10, 2020Updated 5 years ago
- This is my custom wordlist for WiFi passwords, tailored specifically for WiFi networks in Indonesia.☆13Nov 29, 2025Updated 3 months ago
- An ongoing collection of awesome ethical hacking tools, software, libraries, learning tutorials, frameworks, academic and practical resou…☆40Feb 24, 2023Updated 3 years ago
- IS2C - CC Cybersecurity Course Notes to help you prepare for the exam☆23Sep 27, 2025Updated 5 months ago
- AI-powered vulnerability scanner extension for Burp Suite with multi-provider support (Ollama, OpenAI, Claude, Gemini)☆151Feb 22, 2026Updated last week
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆17Mar 14, 2025Updated 11 months ago
- Config files for my GitHub profile.☆31Updated this week
- SSH brute-forcing tool written in python☆15Feb 10, 2023Updated 3 years ago
- CEH v13 i-labs , CEH v13 Engage Answers☆32Jul 5, 2025Updated 7 months ago
- ☆11May 30, 2021Updated 4 years ago
- Ethical hacking notes pdf☆48Sep 28, 2024Updated last year
- Travel Landing Page using simple HTML, CSS and JavaScript☆11Jan 31, 2022Updated 4 years ago
- Financial Applications Features - Security Guidelines (FAFSG) is a set of two FREE checklists created to provide guidelines on the securi…☆12Aug 23, 2021Updated 4 years ago
- ☆14Jul 18, 2019Updated 6 years ago
- Guide to building Nethunter kernels for Android devices.☆20Feb 3, 2026Updated 3 weeks ago
- OSCP material tools and helpful scripts.☆11Mar 14, 2025Updated 11 months ago
- Tool Desgined to remove unwanted apps from Xioami Devices.☆13Oct 22, 2023Updated 2 years ago
- Download all epss data, and import database. We can explore the data by SQL querys!☆11May 23, 2024Updated last year
- a breakdown of the Certified Ethical Hacker (CEH v13) course modules along with their key objectives. These modules are structured to al…☆19Jul 13, 2025Updated 7 months ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- Detectify is a deep learning system that detects AI-generated fake videos (deepfakes) using CNN and LSTM-based RNNs. Trained on datasets …☆17Jun 6, 2024Updated last year
- Automatic cloud backup of Kali Linux data☆12Feb 27, 2020Updated 6 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- The Plant Store -Ecommerce Website - for beginer using HTML, CSS, Vanilla JavaScript☆13Aug 12, 2022Updated 3 years ago
- Get latest Exploit Databases notification on your Desktop☆16Jan 29, 2020Updated 6 years ago
- CISSP Books Free Download☆20Jul 27, 2024Updated last year
- ☆14Feb 27, 2025Updated last year
- This report was written for the Digital Forensics Analysis coursework, specifically the first assignment. In which, steps and screenshots…☆13Jul 17, 2023Updated 2 years ago
- Git All the Payloads! A collection of web attack payloads.☆10Dec 31, 2018Updated 7 years ago
- CMSC389R course at UMD☆11Oct 2, 2019Updated 6 years ago