some eJPT exam preparation notes
☆75Apr 29, 2021Updated 4 years ago
Alternatives and similar repositories for ejpt
Users that are interested in ejpt are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- eLearnSecurity Junior Penetration Tester Certificate (eJPT) PTS Notes☆151Jun 12, 2021Updated 4 years ago
- My notes taken during eJPT labs - in preparation for the exam☆121Feb 28, 2024Updated 2 years ago
- Some knowledge learnt during the eJPT studying.☆93May 27, 2020Updated 5 years ago
- Notes, Writeups, and Cheatsheet for eJPT☆29Jun 9, 2021Updated 4 years ago
- A collection of lab reports of the Penetration Testing Student course by INE which prepares you for the eJPT.☆51Jun 27, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆62Dec 9, 2022Updated 3 years ago
- Collection of notes to prepare for the eLearnSecurity eJPT certification exam.☆295May 15, 2025Updated 10 months ago
- A learning and testing environment for web application hacking and pentesting.☆27Jan 2, 2021Updated 5 years ago
- Vulnerabilities exploitation examples, python☆23May 22, 2023Updated 2 years ago
- All of my eJPT notes☆12May 31, 2024Updated last year
- CVE-2022-1040☆17Sep 25, 2022Updated 3 years ago
- 📕 My collection of notes for the eJPT certification.☆60Jul 23, 2021Updated 4 years ago
- My eJPT exam cheatSheet☆13Nov 9, 2021Updated 4 years ago
- Find kernel32 base and API addresses. Simple C++ implementation☆23Apr 7, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- a Ruby implementation of Java's ObjectInputStream and ObjectOutputStream.☆16May 28, 2022Updated 3 years ago
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16May 6, 2024Updated last year
- Notes I took while preparing for eJPT certification by INE Security (passed 19/20, fka eLearn Security)☆158Nov 1, 2025Updated 4 months ago
- A collection of GitHub dorks for bug bounty hunters☆18Jun 24, 2022Updated 3 years ago
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆129Mar 15, 2026Updated last week
- eJPT CheatSheet☆28Feb 4, 2021Updated 5 years ago
- eJPTv2 Cheatsheet for the exam, with commands and tools shown in the course.☆59Feb 7, 2023Updated 3 years ago
- Lab solutions and commands from studying for the eLearnSecurity Junior Penetration Tester certificate.☆202Jun 17, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆20Jan 12, 2022Updated 4 years ago
- ☆16Jun 7, 2020Updated 5 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- It is a project produced to expose the main logic of OSINT-AI tools offered for sale on the DarkWeb☆37Apr 12, 2024Updated last year
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- eCPPTv2 Notes☆13Jun 13, 2021Updated 4 years ago
- OSCP tools and notes☆40Jan 21, 2019Updated 7 years ago
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- eLearnSecurity Mobile Application Penetration Tester (eMAPT)☆34Feb 6, 2024Updated 2 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- Workflow for pentesting web applications.☆21Feb 19, 2019Updated 7 years ago
- ☆13Nov 3, 2023Updated 2 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆25Jul 19, 2024Updated last year
- Cybersecurity blog. Red Team, pentest, malware analysis and dev☆96Mar 15, 2026Updated last week
- [CVE-2024-4956] Nexus Repository Manager 3 Unauthenticated Path Traversal Bulk Scanner☆17Sep 26, 2024Updated last year