ec-council-learning / Master-ChatGPT-for-Ethical-Hacking
ChatGPT for Ethical Hackers, by EC-Council
☆27Updated last week
Alternatives and similar repositories for Master-ChatGPT-for-Ethical-Hacking:
Users that are interested in Master-ChatGPT-for-Ethical-Hacking are comparing it to the libraries listed below
- The Complete Mobile Ethical Hacking, by EC-Council☆34Updated 4 years ago
- Enhance your hacking toolkit with my Chrome Extension. Designed for ethical hacking and red team activities, it offers tailored features …☆29Updated last week
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆121Updated 3 years ago
- High quality and text versions of cheat sheets from Cyber Detective Twitter☆22Updated 10 months ago
- ☆34Updated last year
- A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in dis…☆31Updated last week
- Automate installation of extra pentest tools on Kali Linux☆52Updated 3 years ago
- Get hands-on with OSINT tools such as Recon-ng, Maltego, Shodan and Sherlock☆12Updated 10 months ago
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆228Updated last year
- This repository contains a curated list of websites and repositories featuring pentest & red-team resources such as cheatsheets, write-up…☆58Updated 3 months ago
- For CEH☆53Updated 5 years ago
- ☆68Updated 2 months ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆21Updated 2 years ago
- capNcook - a dark web exploration tool☆64Updated 11 months ago
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆61Updated 2 years ago
- This repo shares blue team security notes and resources for detecting and preventing cyber attacks. Topics covered include email, file, l…☆42Updated 5 months ago
- OSINT Tools for the Dark Web☆148Updated this week
- Cheatsheet from the PJPT course of TCM security.☆21Updated last year
- Black Hat Python: Python for Pentesters, by EC-Council☆28Updated 9 months ago
- A step-by-step walkthrough of different machines "pwned" on the CTF-like platform, HackTheBox.☆45Updated 2 years ago
- Elevate your bookmarking game with my latest Bookmark Toolkit. Engineered for ethical bookmarking and enhanced web exploration, it delive…☆33Updated last week
- A curated list of tools useful within the field of cyber security, for both blue and red team operations.☆90Updated 3 months ago
- A list of OSINT Resources☆46Updated last year
- AdamsScan is an automated subdomain enumeration script that utilizes multiple popular tools and APIs like Sublist3r, Amass, Subfinder, cr…☆23Updated 3 weeks ago
- Aggregated wordlist pulled from commonly used tools for discovery, enumeration, fuzzing, and exploitation.☆11Updated 4 years ago
- SOAR Automation with Shuffle, Wazuh & TheHive | This project integrates Shuffle SOAR, Wazuh SIEM, and TheHive to automate security incide…☆88Updated last month
- Minimalist notes for CEH-practical Cert.☆31Updated 2 years ago
- Cyber-Security Bible! Theory and Tools, Kali Linux, Penetration Testing, Bug Bounty, CTFs, Malware Analysis, Cryptography, Secure Program…☆81Updated 5 months ago
- Automated solution for nmap'ing☆27Updated last year
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆43Updated 4 years ago