INE/eLearnSecurity Certified Professional Penetration Tester (eCPPT) / PTP v2 and v3 Notes
☆60Dec 28, 2024Updated last year
Alternatives and similar repositories for eCPPTv3-Notes
Users that are interested in eCPPTv3-Notes are comparing it to the libraries listed below
Sorting:
- ☆26Jun 6, 2023Updated 2 years ago
- TempMailCLI: generate and manage temporary emails from the Linux terminal for quick and private message reception.☆25Nov 8, 2024Updated last year
- Open Spotify for mobile☆26Jan 30, 2023Updated 3 years ago
- Satoshi-Blockchain is a simple blockchain ecosystem written in java language☆26Jan 9, 2023Updated 3 years ago
- Web Application Penetration Tester (WAPT) Notes☆37Nov 9, 2024Updated last year
- Command-line tool designed to perform directory brute-force attacks☆25May 18, 2024Updated last year
- My personal repository☆29Updated this week
- My Writeups and Walkthroughs☆57Jul 14, 2025Updated 7 months ago
- Certified Red Team Professional (CRTP) - Notes☆73Jun 3, 2025Updated 8 months ago
- INE/eLearnSecurity Certified Professional Penetration Tester (eCPPT) / PTP v2 and v3 Notes☆87Dec 23, 2024Updated last year
- INE/eLearnSecurity Web Application Penetration Tester eXtreme (eWPTXv3) Notes☆34Apr 15, 2025Updated 10 months ago
- INE/eLearnSecurity Web Application Penetration Tester (eWPTv2) Notes☆160Jun 9, 2024Updated last year
- List, utilize and cheatsheet of Ethical Hacking tools☆127Jan 21, 2024Updated 2 years ago
- INE eCPPTv3 Cheat Sheet / Course Notes. You'll find my comprehensive course notes, which also serve as cheat sheets for the eCPPTv3 cours…☆63Aug 24, 2025Updated 6 months ago
- ☆18Mar 14, 2025Updated 11 months ago
- A fun way to express your feelings if you are a programmer☆10Oct 25, 2022Updated 3 years ago
- ☆10Sep 3, 2024Updated last year
- ReconX is a powerful automated reconnaissance and vulnerability scanning tool designed for ethical hackers, penetration testers, and secu…☆16Feb 27, 2025Updated last year
- This program aims to check active targets by saving screenshots in a project.☆14Jan 9, 2026Updated last month
- An advanced AI-driven vulnerability scanner and penetration testing tool that integrates multiple AI providers (OpenAI, Grok, OLLAMA, Cla…☆34Nov 7, 2025Updated 3 months ago
- Jenkins pre-auth RCE exploit. More info at https://jenkins.io/security/advisory/2019-01-08/#SECURITY-1266 https://blog.orange.tw/2019/02/…☆10Mar 15, 2019Updated 6 years ago
- AWS security training tasks for your first projects☆12Nov 4, 2024Updated last year
- Con este script podras crear virus potentes en link ya no es necesario una apk para meterle virus a tu enemig@ ya solo con mandarle el li…☆10Dec 18, 2021Updated 4 years ago
- Small snippets of code we often find useful☆11Nov 9, 2019Updated 6 years ago
- ☆18Sep 9, 2025Updated 5 months ago
- FireVu is an Intentionally vulnerable Android application developed for Android open source security.☆11Mar 13, 2024Updated last year
- This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce☆10Dec 16, 2021Updated 4 years ago
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆10Dec 3, 2020Updated 5 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- Android webviews and securiy☆23Sep 18, 2025Updated 5 months ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆47Mar 22, 2017Updated 8 years ago
- LEMPO (Ldap Exposure on POrtainer) is an exploit for CVE-2018-19466 (LDAP Credentials Disclosure on Portainer). Featured @ DevFest Siberi…☆11May 12, 2020Updated 5 years ago
- Credit Card Number Generator Workflow for Alfred 2☆19Jul 21, 2013Updated 12 years ago
- Cybersecurity Notes For Intermediate and Advanced Hackers | CEH Exam Prep Also Included☆67Feb 22, 2026Updated last week
- Linux password crack☆14Apr 11, 2022Updated 3 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆10Jan 27, 2014Updated 12 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Mar 24, 2019Updated 6 years ago
- Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode.☆36Feb 5, 2026Updated 3 weeks ago