ec-council-learning / Digital-Forensics-for-Pentesters-Hands-on-LearningLinks
Digital Forensics for Pentesters - Hands-on Learning, by EC-Council
☆18Updated 3 years ago
Alternatives and similar repositories for Digital-Forensics-for-Pentesters-Hands-on-Learning
Users that are interested in Digital-Forensics-for-Pentesters-Hands-on-Learning are comparing it to the libraries listed below
Sorting:
- Cybersecurity Security Operations Center (SOC) Analyst NOW, by EC-Council☆32Updated 2 years ago
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆64Updated 2 years ago
- A curated list of tools useful within the field of cyber security, for both blue and red team operations.☆96Updated 6 months ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆35Updated 5 years ago
- Strumenti di Acquisizione e Analisi di copie Forensi☆155Updated last year
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆128Updated last year
- ☆135Updated 2 years ago
- OSINT mapping using Twitter, Ficklr, Shodan and Insecam☆22Updated 2 years ago
- This repo shares blue team security notes and resources for detecting and preventing cyber attacks. Topics covered include email, file, l…☆45Updated 3 months ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆82Updated last month
- Notes only☆19Updated 3 years ago
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆81Updated 3 weeks ago
- a curated, categorised collection of useful projects 👨👩👧☆113Updated 2 weeks ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆137Updated last year
- This is a repository for network security tools and technologies.☆97Updated 2 years ago
- Elenco di Distro LINUX - WINDOWS - MacOS☆70Updated last year
- BlueTeam, RedTeam, Bug bounty, CTI, OSINT, Threat Hunting, Network and Web Recon, Discovery, Enumeration, Vulnerability Mapping, Exploita…☆54Updated 3 months ago
- Cast your OSINT net further a field and see what else you can discover on the Internet.☆88Updated last week
- OSINTinvestigation - Tecniche OSINT - Strumenti - DeepWeb - Archivio☆98Updated last year
- Search this list of OSINT Practitioners and learn about OSINT, it includes numerous, blogs and tutorials.☆94Updated last week
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆83Updated 4 years ago
- Python3 script to quickly get various information from a domain controller through his LDAP service.☆11Updated 3 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆15Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆82Updated 9 months ago
- Enhance your hacking toolkit with my Chrome Extension. Designed for ethical hacking and red team activities, it offers tailored features …☆39Updated 3 months ago
- ☆58Updated 3 years ago
- Exploits USB HID to steal passwords saved in Google Chrome☆67Updated 7 years ago
- Automation script to download missing tools and configurate kali linux for various cybersecurity categories☆53Updated 4 months ago
- ☆42Updated 3 years ago
- ☆55Updated last year