ec-council-learning / Digital-Forensics-for-Pentesters-Hands-on-LearningLinks
Digital Forensics for Pentesters - Hands-on Learning, by EC-Council
☆19Updated 3 years ago
Alternatives and similar repositories for Digital-Forensics-for-Pentesters-Hands-on-Learning
Users that are interested in Digital-Forensics-for-Pentesters-Hands-on-Learning are comparing it to the libraries listed below
Sorting:
- Cybersecurity Security Operations Center (SOC) Analyst NOW, by EC-Council☆32Updated 2 years ago
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆64Updated 2 years ago
- A curated list of tools useful within the field of cyber security, for both blue and red team operations.☆96Updated 7 months ago
- This repo shares blue team security notes and resources for detecting and preventing cyber attacks. Topics covered include email, file, l…☆46Updated 4 months ago
- a curated, categorised collection of useful projects 👨👩👧☆115Updated last week
- Strumenti di Acquisizione e Analisi di copie Forensi☆157Updated last year
- ☆136Updated 2 years ago
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆131Updated last year
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆83Updated last week
- All of my threat intel recommendations for aspiring Information Security Analyst. This section contains information about evidence at ana…☆46Updated 4 months ago
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆104Updated 11 months ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆82Updated 2 months ago
- Elenco di Distro LINUX - WINDOWS - MacOS☆71Updated last year
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆123Updated 3 years ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆138Updated 2 years ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆35Updated 5 years ago
- Python3 script to quickly get various information from a domain controller through his LDAP service.☆11Updated 3 years ago
- ☆133Updated last year
- ☆105Updated 4 years ago
- The Complete Mobile Ethical Hacking, by EC-Council☆35Updated 4 years ago
- This is a repository for network security tools and technologies.☆98Updated 2 years ago
- OSINT Tools for the Dark Web☆161Updated 4 months ago
- Tracking and documenting monthly insights about hacktivist coalitions.☆21Updated 3 weeks ago
- ☆58Updated 3 years ago
- OSINTinvestigation - Tecniche OSINT - Strumenti - DeepWeb - Archivio☆98Updated last year
- Hands-on cybersecurity projects to enhance skills in phishing investigation, malware analysis, network intrusion detection, and DDoS atta…☆203Updated last year
- Enhance your hacking toolkit with my Chrome Extension. Designed for ethical hacking and red team activities, it offers tailored features …☆39Updated 4 months ago
- The OSINT Field Manual☆124Updated 6 months ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆77Updated last year
- Minimalist notes for CEH-practical Cert.☆37Updated 3 years ago