ec-council-learning / Digital-Forensics-for-Pentesters-Hands-on-LearningLinks
Digital Forensics for Pentesters - Hands-on Learning, by EC-Council
☆20Updated 3 years ago
Alternatives and similar repositories for Digital-Forensics-for-Pentesters-Hands-on-Learning
Users that are interested in Digital-Forensics-for-Pentesters-Hands-on-Learning are comparing it to the libraries listed below
Sorting:
- Cybersecurity Security Operations Center (SOC) Analyst NOW, by EC-Council☆32Updated 2 years ago
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆64Updated 3 years ago
- ☆138Updated 2 years ago
- Strumenti di Acquisizione e Analisi di copie Forensi☆165Updated 2 weeks ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆35Updated 5 years ago
- Notes only☆19Updated 3 years ago
- This repo shares blue team security notes and resources for detecting and preventing cyber attacks. Topics covered include email, file, l…☆47Updated 5 months ago
- Elenco di Distro LINUX - WINDOWS - MacOS☆71Updated last year
- Ethical Hacking Toolkit is a collection of tools, cheat sheets, and resources for Ethical hackers, Penetration Tester, and Security Resea…☆120Updated 3 years ago
- Scripts useful in cracking the Vulnhub Lab named View2aKill: 1☆26Updated 5 years ago
- A curated list of tools useful within the field of cyber security, for both blue and red team operations.☆97Updated 8 months ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆89Updated 3 months ago
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆123Updated 3 years ago
- The best tools and resources for forensic analysis.☆165Updated 2 years ago
- a curated, categorised collection of useful projects 👨👩👧☆119Updated last month
- Learning resources, blogs, news, SQL, PowerShell, SQL, Linux, Revers Engineering, Malware☆31Updated 3 weeks ago
- ☆105Updated 4 years ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆141Updated 2 years ago
- This is a repository for network security tools and technologies.☆98Updated 2 years ago
- All of my threat intel recommendations for aspiring Information Security Analyst. This section contains information about evidence at ana…☆46Updated 5 months ago
- ☆21Updated 3 years ago
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆85Updated last month
- OSINT Tools for the Dark Web☆214Updated 5 months ago
- This repository contains the files that provide the upload functionality in the IIS Server☆33Updated 4 years ago
- The Complete Mobile Ethical Hacking, by EC-Council☆35Updated 4 years ago
- Minimalist notes for CEH-practical Cert.☆38Updated 3 years ago
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆132Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆84Updated 11 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆48Updated 4 years ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆79Updated last year