☆29Aug 21, 2024Updated last year
Alternatives and similar repositories for eCTHP-Notes
Users that are interested in eCTHP-Notes are comparing it to the libraries listed below
Sorting:
- Collection of scripts and tools related to the eCTHPv2 exam by INE.☆19Jun 12, 2022Updated 3 years ago
- File Decrypter for the PS4 version 4.05☆16Jan 5, 2018Updated 8 years ago
- Comprehensive Toolkit for Boosting and Fostering Cybersecurity Compliance☆52Nov 26, 2024Updated last year
- An open-source computer forensics tool that can display summary as the result of Windows Event Log analysis based on the chosen function(…☆11Feb 2, 2023Updated 3 years ago
- The most powerful and fastest DoS Attack Tool☆12Dec 8, 2022Updated 3 years ago
- SYNAPSE (SYNthetic AI Pot for Security Enhancement) and SYNAPSE-to-MITRE code repository. This project has been realized for my MSc degre…☆16Sep 23, 2024Updated last year
- Flag submission system for Attack/Defense CTFs☆13Jul 5, 2021Updated 4 years ago
- Subdomain Takeover lab is FREE for everyone. This means here is a legal to takeover Subdomain of this website. Here you'll find more tha…☆24Jan 1, 2025Updated last year
- Open Repository for Assembly, Bytecode, Intermediate Representation, and all things related to low level code.☆21Mar 11, 2020Updated 6 years ago
- Source code used at TweetFeed.live☆47Nov 21, 2022Updated 3 years ago
- **SCAM ALERT !!!!!!! ALPHABAY VE DARK WEB TURKİSH DOLANDIRICIDIR BU KONUYU AÇANLARDA KENDİLERİDİR UZAK DURUN** **BÜYÜK BİR DOLANDIRICIL…☆10Jul 14, 2023Updated 2 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Mar 1, 2023Updated 3 years ago
- ☆22Sep 17, 2025Updated 6 months ago
- CommandInWiFi: Exploiting SSID Storage in WiFi Scanning for Command Injection☆36Mar 9, 2026Updated last week
- Digital Forensics and Incident Response notes and Autopsy tool walkthrough☆11Feb 3, 2022Updated 4 years ago
- ☆24Aug 8, 2024Updated last year
- Comprehensive notes and resources to ace the eLearnSecurity Junior Penetration Testing certificate, helping you master the art of ethical…☆13Nov 27, 2023Updated 2 years ago
- SWS-Recon is a Python Tool designed to performed Reconnaissance on the given target website- Domain or SubDomain. SWS-Recon collects info…☆22Mar 16, 2023Updated 3 years ago
- ☆12Nov 13, 2023Updated 2 years ago
- macos-collector - Automated Collection of macOS Forensic Artifacts for DFIR☆37Updated this week
- [SmartCom2017] An Effective Malware Detection based on Behaviour and Data Feature☆20Sep 14, 2018Updated 7 years ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆17Apr 23, 2025Updated 10 months ago
- KQL Detections for Microsoft Sentinel and Microsoft 365 Defender☆21Nov 15, 2024Updated last year
- Eset-Unload is a C++ tool that interacts with a process's loaded modules to identify and unload the ebehmoni.dll module, typically found …☆12Apr 21, 2025Updated 11 months ago
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆16Aug 29, 2025Updated 6 months ago
- KQL Queries for Advanced Hunting / Log Analytics☆13Jan 29, 2026Updated last month
- Notes created for preparation of EJPTv2☆279Jan 18, 2023Updated 3 years ago
- Some important DFIR Resources☆84Mar 16, 2023Updated 3 years ago
- Spring4Shell (CVE-2022-22965)☆12Apr 7, 2022Updated 3 years ago
- All binaries, tools,wordlists and tutorials you need to pass eCPPTv2 - For Free!☆26Jan 28, 2023Updated 3 years ago
- This is a Cheatsheet for eJPT.☆16Jan 26, 2021Updated 5 years ago
- [DEPRECIATED] All writeups are moved to my main website☆14Mar 15, 2024Updated 2 years ago
- Learning progress in CyberTalents Blue Team Scholarship 2023. Write-ups, solutions, and notes for challenges & topics. Join my cybersecur…☆25Sep 28, 2023Updated 2 years ago
- This repository is a comprehensive collection of resources, documentation, apps, and add-ons related to Splunk, a powerful data analytics…☆24Feb 16, 2026Updated last month
- Windows Forensics Salt States☆21Updated this week
- You can access the sigma rules to detect malicious activities. It is organized by Mitre Att&ck categories.☆13Feb 7, 2022Updated 4 years ago
- ☆97Dec 25, 2025Updated 2 months ago
- A curated awesome list of lists of interview questions. Feel free to contribute!☆22Jul 24, 2024Updated last year
- Inject shellcode into process via "EarlyBird"☆26Aug 30, 2021Updated 4 years ago