Kali for Penetration Testers, by EC-Council
☆13Jan 10, 2023Updated 3 years ago
Alternatives and similar repositories for Kali-for-Penetration-Testers
Users that are interested in Kali-for-Penetration-Testers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Mar 31, 2023Updated 2 years ago
- ☆19Feb 10, 2025Updated last year
- ☆20Feb 3, 2026Updated last month
- A simple unix shell☆18Dec 30, 2024Updated last year
- ☆19Mar 20, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- اول اداة ددوس اتاك عربيه 🇱🇾☆26Jun 18, 2024Updated last year
- This script is designed to exploit a heap buffer overflow vulnerability in a socks5 proxy server.☆22Mar 13, 2024Updated 2 years ago
- ☆18Dec 26, 2024Updated last year
- ☆20Apr 16, 2025Updated 11 months ago
- ☆14Oct 14, 2022Updated 3 years ago
- ☆19Mar 13, 2025Updated last year
- Reverse Engineering Frida for Beginners, by EC-Council☆14Sep 21, 2023Updated 2 years ago
- ☆20Feb 13, 2026Updated last month
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆18Feb 16, 2025Updated last year
- ☆13Sep 28, 2024Updated last year
- ☆16Dec 28, 2024Updated last year
- ☆10Jan 26, 2023Updated 3 years ago
- ChatGPT for Ethical Hackers, by EC-Council☆49Mar 18, 2025Updated last year
- Machine Learning with Python☆30Mar 3, 2023Updated 3 years ago
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆30Mar 31, 2023Updated 2 years ago
- Tweezer tool for tweezing tool to collect juicy information from files☆17Jan 10, 2025Updated last year
- Este repositorio contiene el material del curso de Udemy Big Data y Spark: ingeniería de datos con Python y pyspark. En este curso, apren…☆44Dec 16, 2025Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- The Complete Mobile Ethical Hacking, by EC-Council☆38Dec 23, 2020Updated 5 years ago
- BECOME A HACKER IN A SINGLE CLICK! ..BEST OMEGLE LOCATION REVEALER EVER 🔴🔴🔴🔴✔ Now available for every country.☆28Apr 22, 2023Updated 2 years ago
- A windows Wifi Brute forcing utility which is an extremely old method but still works without the requirement of external dependencies.☆79Jul 13, 2024Updated last year
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆36Nov 24, 2024Updated last year
- A free cybersecurity study plan to build a cybersecurity career.☆44Mar 6, 2025Updated last year
- Cybersecurity Black Friday Deals repository! 🛡️🎁☆44Nov 23, 2023Updated 2 years ago
- My notes for the CEH v12 practical exam☆46Dec 30, 2023Updated 2 years ago
- A collection of config files for linux focusing on hackthebox theme☆53Mar 22, 2026Updated last week
- Inject RDPThief into memory with PowerShell.☆65Jan 21, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆24Aug 25, 2024Updated last year
- Format SSSD Raw Kerberos Payloads into CCACHE files for use on Windows systems☆42May 26, 2021Updated 4 years ago
- LulzDDOS TOOL- powerful DDoS toolkit for penetration tests☆35Aug 2, 2023Updated 2 years ago
- ☆40Sep 5, 2013Updated 12 years ago
- The Ultimate Kali Linux Book, 3E_published by Packt☆70Apr 29, 2024Updated last year
- Black Hat Python: Python for Pentesters, by EC-Council☆34Jun 20, 2024Updated last year
- ☆31Jul 6, 2024Updated last year