ec-council-learning / Kali-for-Penetration-TestersView external linksLinks
Kali for Penetration Testers, by EC-Council
☆13Jan 10, 2023Updated 3 years ago
Alternatives and similar repositories for Kali-for-Penetration-Testers
Users that are interested in Kali-for-Penetration-Testers are comparing it to the libraries listed below
Sorting:
- ☆11Mar 31, 2023Updated 2 years ago
- اول اداة ددوس اتاك عربيه 🇱🇾☆23Jun 18, 2024Updated last year
- ☆10Jan 26, 2023Updated 3 years ago
- ☆13Sep 28, 2024Updated last year
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated last year
- ☆13Oct 14, 2022Updated 3 years ago
- Tweezer tool for tweezing tool to collect juicy information from files☆17Jan 10, 2025Updated last year
- Reverse Engineering Frida for Beginners, by EC-Council☆14Sep 21, 2023Updated 2 years ago
- ☆16Dec 28, 2024Updated last year
- ☆18Mar 20, 2025Updated 10 months ago
- ☆18Feb 10, 2025Updated last year
- A simple unix shell☆17Dec 30, 2024Updated last year
- ☆18Feb 3, 2026Updated 2 weeks ago
- ☆18Apr 16, 2025Updated 10 months ago
- ☆17Dec 26, 2024Updated last year
- ☆18Updated this week
- ☆18Mar 13, 2025Updated 11 months ago
- ☆17Feb 16, 2025Updated last year
- ☆23Aug 25, 2024Updated last year
- This script is designed to exploit a heap buffer overflow vulnerability in a socks5 proxy server.☆22Mar 13, 2024Updated last year
- Este repositorio contiene el material del curso de Udemy Big Data y Spark: ingeniería de datos con Python y pyspark. En este curso, apren…☆41Dec 16, 2025Updated 2 months ago
- LulzDDOS TOOL- powerful DDoS toolkit for penetration tests☆34Aug 2, 2023Updated 2 years ago
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆30Mar 31, 2023Updated 2 years ago
- Machine Learning with Python☆29Mar 3, 2023Updated 2 years ago
- BECOME A HACKER IN A SINGLE CLICK! ..BEST OMEGLE LOCATION REVEALER EVER 🔴🔴🔴🔴✔ Now available for every country.☆28Apr 22, 2023Updated 2 years ago
- ChatGPT for Ethical Hackers, by EC-Council☆48Mar 18, 2025Updated 10 months ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆35Nov 24, 2024Updated last year
- The Complete Mobile Ethical Hacking, by EC-Council☆37Dec 23, 2020Updated 5 years ago
- A free cybersecurity study plan to build a cybersecurity career.☆41Mar 6, 2025Updated 11 months ago
- Black Hat Python: Python for Pentesters, by EC-Council☆33Jun 20, 2024Updated last year
- ☆31Jul 6, 2024Updated last year
- Format SSSD Raw Kerberos Payloads into CCACHE files for use on Windows systems☆42May 26, 2021Updated 4 years ago
- Instainsane is an Shell Script to perform multi-threaded brute force attack against Instagram, this script can bypass login limiting and …☆70Mar 30, 2025Updated 10 months ago
- ☆40Sep 5, 2013Updated 12 years ago
- My notes for the CEH v12 practical exam☆45Dec 30, 2023Updated 2 years ago
- Cybersecurity Black Friday Deals repository! 🛡️🎁☆44Nov 23, 2023Updated 2 years ago
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆55Dec 30, 2024Updated last year
- This script can be used to find html forms in the list of endpoints/urls.☆50Mar 24, 2024Updated last year
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆55Dec 23, 2024Updated last year