PacktPublishing / Network-Hacking-Continued---Intermediate-to-AdvancedLinks
Network Hacking Continued - Intermediate to Advanced, published by Packt
☆17Updated 4 years ago
Alternatives and similar repositories for Network-Hacking-Continued---Intermediate-to-Advanced
Users that are interested in Network-Hacking-Continued---Intermediate-to-Advanced are comparing it to the libraries listed below
Sorting:
- Explore effective penetration testing techniques with Metasploit☆15Updated 2 years ago
- Black Hat Python for Pentesters & Hackers, published by Packt☆23Updated 4 years ago
- Python for Offensive PenTest, published by Packt☆145Updated 2 years ago
- Code Repository for CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019, published by Packt☆12Updated 2 years ago
- Hands-On Penetration Testing on Windows, published by Packt☆25Updated 2 years ago
- Internal Network Penetration Test Playbook☆16Updated 3 years ago
- CompTIA Pentest+ (Ethical Hacking) Course and Practice Exam, published by Packt☆112Updated 2 years ago
- Knowledge Management for Offensive Security Professionals Official Repository☆147Updated 5 months ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆114Updated last year
- notes and ramblings from my OSCP/PenTesting Studies☆92Updated last year
- Python for Security and Networking, Published by Packt☆82Updated 3 months ago
- Simple CLI program that will fetch and convert a HackTheBox Academy module into a local file in Markdown format.☆43Updated last year
- Quick scripts I developed to streamline OSCP tasks☆147Updated last month
- Extract Windows Wi-Fi Passwords to Remote URL☆266Updated 2 years ago
- The Black Hat Bash book repository☆283Updated 2 weeks ago
- Obsidian Templates for OSCP, CPTS, and Training labs☆90Updated 5 months ago
- Scripts for offensive security☆144Updated 2 months ago
- Ethical Hacking - A Hands-On Approach to Ethical Hacking [Video], published by Packt☆11Updated 2 years ago
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆242Updated last month
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker …☆274Updated 5 months ago
- PentBox is a tool that allows us to create honeypot in our system this is written in ruby language.☆127Updated last year
- Digital Forensics with Kali Linux, Second Edition, Published by Packt☆13Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆14Updated 4 years ago
- Legion is an open source, easy-to-use, super-extensible and semi-automated network penetration testing tool that aids in discovery, recon…☆37Updated last month
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆88Updated this week
- Scripts featured in the book How to Hack Like a Legend☆147Updated 2 years ago
- A basic SSH honeypot to capture IP Adresses, usernames, passwords, and commands.☆73Updated 10 months ago
- ☆59Updated 3 weeks ago
- An in-depth guide to help people who are new to penetration testing or red teaming and are looking to gain an overview of the penetration…☆141Updated 7 months ago
- AWS Penetration Testing, published by Packt☆31Updated 2 years ago