The Complete Mobile Ethical Hacking, by EC-Council
☆39Dec 23, 2020Updated 5 years ago
Alternatives and similar repositories for The-Complete-Mobile-Ethical-Hacking
Users that are interested in The-Complete-Mobile-Ethical-Hacking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ChatGPT for Ethical Hackers, by EC-Council☆50Mar 18, 2025Updated last year
- BlackHat C++ : C++ For Pentesters, by EC-Council☆75Jun 27, 2023Updated 2 years ago
- Digital Forensics for Pentesters - Hands-on Learning, by EC-Council☆22Dec 15, 2025Updated 4 months ago
- TikTok Phishing Attack Simulation Tool designed for ethical hacking, security awareness, and educational purposes.☆27Aug 2, 2025Updated 8 months ago
- A Chrome extension that automatically scans web pages and internal links for user-defined keywords, storing results and sending notificat…☆25Sep 28, 2025Updated 6 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆12Aug 22, 2017Updated 8 years ago
- Analysis and Creation of Wordlists with Complex Passwords for Password Cracking☆10Feb 23, 2026Updated last month
- CMSC389R course at UMD☆11Oct 2, 2019Updated 6 years ago
- Cheap Fake Driver License , #Editable_Temporary_Drivers_License_Template , Fake_Driver_License_Picture_Template , Make Fake Driver Licens…☆15Feb 2, 2020Updated 6 years ago
- ☆11May 17, 2025Updated 10 months ago
- This project is aimed at freely providing technical guides on various hacking topics: Active Directory services, web services, servers, i…☆15Sep 18, 2020Updated 5 years ago
- An android app that sends phone location details via sms and to the web. A hack for MFA mobile workshop☆14Jul 24, 2009Updated 16 years ago
- Kali for Penetration Testers, by EC-Council☆13Jan 10, 2023Updated 3 years ago
- Interactive and responsive personal portfolio website showcasing Amine’s projects, skills, blog, and contact information.☆38Nov 17, 2025Updated 4 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- This script is designed to exploit a heap buffer overflow vulnerability in a socks5 proxy server.☆22Mar 13, 2024Updated 2 years ago
- Reverse Engineering Frida for Beginners, by EC-Council☆14Sep 21, 2023Updated 2 years ago
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 3 years ago
- Photo forensics tool that detects alteration of JPEG images☆10May 13, 2021Updated 4 years ago
- OSCP prep checklist - study plan, exam structure, tools, and methodology☆57Feb 4, 2026Updated 2 months ago
- Kickstart your Ethical Hacking Journey with Fsociety by GDSC-SMIT Star the Repository and Open your First PR☆37Oct 25, 2023Updated 2 years ago
- C2Matrix Automation☆15Sep 10, 2023Updated 2 years ago
- 🔥Ready, Aim, Fire.🔥☆18Jun 3, 2022Updated 3 years ago
- Speeding up identifying which binaries with a SUID flag may lead to root access☆15Aug 26, 2024Updated last year
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆13Sep 25, 2022Updated 3 years ago
- A GUI program that injects dylib or deb into ipa☆31Feb 20, 2025Updated last year
- ☆15Dec 27, 2022Updated 3 years ago
- A Python/Scapy based ARP Cache Poisoning tool.☆11Apr 3, 2016Updated 10 years ago
- pocsuite3 poc&exp☆24Apr 9, 2025Updated last year
- Educational repository with source code examples☆12Jun 3, 2025Updated 10 months ago
- AI hacking snippets for prompt injection, jailbreaking LLMs, and bypassing AI filters. Ideal for ethical hackers and security researchers…☆51Apr 7, 2026Updated last week
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago
- High quality and text versions of cheat sheets from Cyber Detective Twitter☆39May 1, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A reconnaissance tool for ethical hackers written in RUST☆21Apr 8, 2024Updated 2 years ago
- Who needs authentication? This cache purge vulnerability finder doesn't!☆10Apr 20, 2023Updated 2 years ago
- ☆38Sep 28, 2023Updated 2 years ago
- ✔️ An illustrative system designed for educational purposes to test a phishing project on the Instagram homepage.☆16Jan 15, 2024Updated 2 years ago
- LuatOS Air101-LCD example for LuatOS ESP32C3 board☆27Sep 15, 2022Updated 3 years ago
- Alfred is a advanced OSINT information gathering tool☆12Nov 14, 2025Updated 5 months ago
- This is a collection of everything I have and am learning about OSINT. Feel free to send pull requests adding more stuff! I want to learn…☆12Jan 2, 2024Updated 2 years ago