ec-council-learning / BlackHat-C-C-For-PentestersView external linksLinks
BlackHat C++ : C++ For Pentesters, by EC-Council
☆75Jun 27, 2023Updated 2 years ago
Alternatives and similar repositories for BlackHat-C-C-For-Pentesters
Users that are interested in BlackHat-C-C-For-Pentesters are comparing it to the libraries listed below
Sorting:
- Practical Bug Bounty Hunting for Hackers and Pentesters, by EC-Council☆23Oct 6, 2021Updated 4 years ago
- The Complete Mobile Ethical Hacking, by EC-Council☆38Dec 23, 2020Updated 5 years ago
- Black Hat Python: Python for Pentesters, by EC-Council☆33Jun 20, 2024Updated last year
- Mobile Legends Diamond Hack☆15Dec 5, 2017Updated 8 years ago
- اول اداة ددوس اتاك عربيه 🇱🇾☆23Jun 18, 2024Updated last year
- Libft is the first project of the 42cursus.☆11Sep 5, 2021Updated 4 years ago
- ☆18Mar 14, 2025Updated 11 months ago
- ChatGPT for Ethical Hackers, by EC-Council☆48Mar 18, 2025Updated 11 months ago
- ☆10Jan 26, 2023Updated 3 years ago
- ☆13Sep 28, 2024Updated last year
- ALL IN ONE Hacking Tool For Hackers☆10Jun 2, 2022Updated 3 years ago
- This is a repo for camphish tool for kali linux develop by thelinuxchoise and techchip☆10Nov 2, 2023Updated 2 years ago
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated last year
- ☆11Aug 18, 2023Updated 2 years ago
- YesMan☆16Nov 8, 2023Updated 2 years ago
- This guide provides comprehensive techniques for penetration testing Active Directory environments. It covers everything from initial rec…☆21Jul 3, 2025Updated 7 months ago
- Some Holy Sermons from The Dev Community☆11Feb 11, 2024Updated 2 years ago
- Kali for Penetration Testers, by EC-Council☆13Jan 10, 2023Updated 3 years ago
- Who needs authentication? This cache purge vulnerability finder doesn't!☆10Apr 20, 2023Updated 2 years ago
- ☆16Sep 9, 2025Updated 5 months ago
- Workshop material on Rust iterators, pattern matching and creative coding☆12Sep 8, 2022Updated 3 years ago
- OSINT oriented Web Browser☆15Feb 6, 2026Updated last week
- A Chrome extension that automatically scans web pages and internal links for user-defined keywords, storing results and sending notificat…☆24Sep 28, 2025Updated 4 months ago
- This python based tool can be used to discover API keys, access tokens, and other sensitive data in JavaScript files. It can scan JavaScr…☆14Oct 18, 2024Updated last year
- A keylogger is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer's keyboard. In th…☆13Mar 4, 2022Updated 3 years ago
- DroidSniper - Misconfigured Android Debug Bridge Scanner☆13Mar 26, 2024Updated last year
- 🎉 Happy 4th anniversary to the ResetHacker community! 🎉☆11Aug 8, 2024Updated last year
- Blank methodology sheet for the OSWE exam☆12Dec 17, 2021Updated 4 years ago
- ☆25Sep 21, 2024Updated last year
- Deep Dive into Hacking and Pentesting, by EC-Council☆17Oct 28, 2022Updated 3 years ago
- A simple, yet highly customizable, script to use with cloned websites for phishing and credentials harvesting☆19Nov 11, 2021Updated 4 years ago
- Flipper Zero KiCad Symbol and Footprint☆12Oct 18, 2022Updated 3 years ago
- CVE-2024-25641 - RCE Automated Exploit - Cacti 1.2.26☆10Aug 28, 2024Updated last year
- Buffer_Helper tool have you to discover classic buffer overflow vulnerabilities in application same like "FTP SERVER","FTPClient" etc , …☆15Oct 5, 2023Updated 2 years ago
- Brute Force Password Cracker using python☆16Jun 8, 2020Updated 5 years ago
- This is a repository for the public blog with Labs indicators of compromise and code☆18Jan 8, 2020Updated 6 years ago
- SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript files☆11Mar 29, 2021Updated 4 years ago
- Tweezer tool for tweezing tool to collect juicy information from files☆17Jan 10, 2025Updated last year
- Web version of OpenSwitchMaps.☆19Apr 4, 2025Updated 10 months ago