ec-council-learning / Digital-Forensics-for-Pentesters-Hands-on-Learning
Digital Forensics for Pentesters - Hands-on Learning, by EC-Council
☆17Updated 2 years ago
Related projects: ⓘ
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆58Updated 2 years ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆28Updated 4 years ago
- Automation script to download missing tools and configurate kali linux for various cybersecurity categories☆45Updated this week
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆16Updated 3 years ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engin…☆16Updated 2 years ago
- Elenco di Distro LINUX - WINDOWS - MacOS☆59Updated 3 months ago
- Cybersecurity Security Operations Center (SOC) Analyst NOW, by EC-Council☆11Updated last year
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆39Updated 3 years ago
- This repository contains the files that provide the upload functionality in the IIS Server☆26Updated 3 years ago
- Fuxsociety Mr Robot 2.1☆24Updated last year
- This software is for study to Computer Hacker Forensic Investigator certification☆24Updated 4 years ago
- Subdomain Bruteforce - Bounty Quick Code☆28Updated 2 weeks ago
- A curated list of tools useful within the field of cyber security, for both blue and red team operations.☆74Updated last month
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆72Updated 3 years ago
- Scripts useful in cracking the Vulnhub Lab named View2aKill: 1☆23Updated 4 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆72Updated 3 years ago
- ☆54Updated 2 years ago
- ☆41Updated 2 years ago
- OSINT mapping using Twitter, Ficklr, Shodan and Insecam☆22Updated last year
- Herramienta de ingeniería social (Creador de puerta trasera con Reverse Shell para Windows/Android) con Ngrok.☆60Updated last year
- DNSrecon tool with GUI for Kali Linux☆55Updated last year
- The Complete Mobile Ethical Hacking, by EC-Council☆26Updated 3 years ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆59Updated 6 months ago
- Notes only☆14Updated 2 years ago
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆20Updated 2 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- A tool designed to analyse email headers☆31Updated last year
- Scripts, POCs & more☆24Updated last month
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆113Updated 11 months ago
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆45Updated last year