A structured portfolio of weekly CEH v13 assessments, vulnerability labs, and ethical hacking documentation to demonstrate practical cybersecurity skills.
☆23Jun 25, 2025Updated 9 months ago
Alternatives and similar repositories for CEH-Assessments
Users that are interested in CEH-Assessments are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Step into my GitHub treasure trove—an immersive collection of comprehensive notes chronicling my Certified Ethical Hacker (CEH) lab escap…☆36Aug 13, 2023Updated 2 years ago
- ملخص شامل لمفاهيم وشروط شهادة CompTIA Security+ SY0-701، مستند إلى وثيقة CompTIA Security Plus SY0-701 Exam Objectives. يقدم معلومات مركز…☆14Mar 14, 2025Updated last year
- a breakdown of the Certified Ethical Hacker (CEH v13) course modules along with their key objectives. These modules are structured to al…☆23Jul 13, 2025Updated 8 months ago
- Simple Linux RootKit written in python☆10Dec 10, 2017Updated 8 years ago
- Not everyone can code, but everyone can learn. This Project is an AI powered DSA/Competitive Programming Helper with an inbuilt editor to…☆14Jun 3, 2025Updated 10 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Ethical Hacking - A Hands-On Approach to Ethical Hacking [Video], published by Packt☆15May 10, 2023Updated 2 years ago
- This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the…☆14Jun 27, 2023Updated 2 years ago
- A covert, feature-rich reverse shell for ethical hacking and penetration testing.☆19Mar 9, 2025Updated last year
- 🎩 [penetration testing Book], Kali Magic, Cryptography, Hash Crack, Botnet, Rootkit, Malware, Spyware, Python, Go, C|EH.☆17Apr 15, 2021Updated 4 years ago
- ☆23Mar 8, 2026Updated last month
- Kickstart your Ethical Hacking Journey with Fsociety by GDSC-SMIT Star the Repository and Open your First PR☆36Oct 25, 2023Updated 2 years ago
- A List Of Labs For People (Students) Who Want Learn OR Practice IT Security / Hacking / Penetration Testing In Ethical Way.☆90Nov 25, 2020Updated 5 years ago
- The Blockchain-based voting system will be secure, reliable, and anonymous, and will help increase the number of voters as well as the tr…☆12Nov 23, 2022Updated 3 years ago
- https://arxiv.org/pdf/1806.03589v2.pdf☆11Mar 24, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆13Sep 25, 2022Updated 3 years ago
- A GUI program that injects dylib or deb into ipa☆31Feb 20, 2025Updated last year
- Inventory Management System - C# Windows Forms and MySQL☆14Aug 8, 2020Updated 5 years ago
- Community curated list of templates for the OSINT template engine.☆22Jul 11, 2023Updated 2 years ago
- A cutting-edge PHP 7.4+ webshell designed for advanced penetration testing.☆26Feb 5, 2026Updated 2 months ago
- Config files for my GitHub profile.☆32Mar 27, 2026Updated 2 weeks ago
- CEH v13 i-labs , CEH v13 Engage Answers☆38Jul 5, 2025Updated 9 months ago
- Terminal Forensics CheatSheets☆13Jul 28, 2015Updated 10 years ago
- Malware & PoC☆14Dec 29, 2025Updated 3 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A reconnaissance tool for ethical hackers written in RUST☆21Apr 8, 2024Updated 2 years ago
- ✔️ An illustrative system designed for educational purposes to test a phishing project on the Instagram homepage.☆16Jan 15, 2024Updated 2 years ago
- Netcat binaries compiled for ARM that work on Android devices☆12Jun 12, 2015Updated 10 years ago
- MCP Armor continuously secures and monitors Model Context Protocol operations through static and dynamic scans, revealing hidden risks in…☆113Mar 27, 2026Updated 2 weeks ago
- Made it possible for **everyone** to walk around in a Zoom Meeting with Breakout Rooms, pre-September 21, 2020!☆15Sep 12, 2020Updated 5 years ago
- CEH v13 exam resources & Tips☆38Jun 24, 2025Updated 9 months ago
- Stack Based buffer overflow attack☆20Nov 25, 2023Updated 2 years ago
- List, utilize and cheatsheet of Ethical Hacking tools☆131Jan 21, 2024Updated 2 years ago
- DocQuery: Turn your documentation markdown to knowledgebase☆19Sep 14, 2025Updated 6 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Eternalblue & DoublePulsar scanner☆26Jun 9, 2017Updated 8 years ago
- Set up a network on the IBM Blockchain Platform and deploy a global finance on blockchain smart contract on the network.☆24Sep 17, 2025Updated 6 months ago
- An installation script to help with the setup of a Kali VM for The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim☆17Jul 21, 2015Updated 10 years ago
- Burp extension to fuzz/brute force GenAI/LLM prompts using a list of various payloads.☆32Sep 4, 2025Updated 7 months ago
- Actualización de Huron, distro Linux para Osint☆21Jul 30, 2019Updated 6 years ago
- ☆17Apr 16, 2020Updated 5 years ago
- A tutorial for beginners in Ethical Hacking☆39Mar 31, 2026Updated last week