A support web page for my eJPT / eCPPT Certification Process
☆16Jan 18, 2018Updated 8 years ago
Alternatives and similar repositories for hack-help
Users that are interested in hack-help are comparing it to the libraries listed below
Sorting:
- This repository is intended for sharing files/tools/tutorials..etc that related to eCPPTv2 from eLearnSecurity☆64Nov 10, 2019Updated 6 years ago
- eCPPTv2 Notes☆13Jun 13, 2021Updated 4 years ago
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 3 years ago
- Notes on ECPPT☆25Dec 22, 2018Updated 7 years ago
- eJPT CheatSheet☆28Feb 4, 2021Updated 5 years ago
- ☆39Apr 23, 2024Updated last year
- Your NTDLL vaccine from modern direct syscall methods.☆36Apr 5, 2022Updated 3 years ago
- Kumpulan slide presentasi seminar, talk, workshop☆14Nov 11, 2025Updated 3 months ago
- Automated market maker algorithms, deployment fixtures and controls for Lyra V2 markets☆18Updated this week
- ☆11Oct 11, 2020Updated 5 years ago
- HOCig- Automatic HOC Information Gathering Tool V 1.2☆10May 4, 2021Updated 4 years ago
- OSCP tools and notes☆40Jan 21, 2019Updated 7 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- Are you able to use open source intelligence to solve this challenge?☆11Apr 14, 2019Updated 6 years ago
- Grab unsaved Notepad contents with a Beacon Object File☆11Jun 19, 2022Updated 3 years ago
- Quick and dirty reconnaissance hacks for BB and pentesting☆11Feb 20, 2023Updated 3 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 8 months ago
- Orchestration CLI for spinning up local development Bee cluster and FDP environment with Docker☆12Nov 30, 2025Updated 3 months ago
- Application Security Mind Maps☆11Apr 10, 2021Updated 4 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated 2 months ago
- Template to detect some malware☆14Aug 7, 2023Updated 2 years ago
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 6 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Automatic cloud backup of Kali Linux data☆12Feb 27, 2020Updated 6 years ago
- Domain, IPv4 & v6 address & network information gathering, web server analysis, DNS- & BGP- related information☆12Nov 29, 2023Updated 2 years ago
- Powershell-based Windows Security Auditing Toolbox☆10Aug 28, 2017Updated 8 years ago
- Network Infrastructure Penetration Testing Tool☆10Jan 7, 2015Updated 11 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- Sysmon Tools for PowerShell☆12Aug 17, 2018Updated 7 years ago
- XSS Payload Cheat Sheet☆11Sep 1, 2024Updated last year
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- this is a small script for extracting questions from try hack me room ,and creating a MD file☆12Mar 6, 2023Updated 2 years ago
- ☆11Jul 11, 2023Updated 2 years ago
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Oct 30, 2018Updated 7 years ago
- Educational Cybersecurity Gaming Experience☆10Dec 13, 2022Updated 3 years ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago