faizann24 / Resources-for-learning-HackingView external linksLinks
All the resources I could find for learning Ethical Hacking and penetration testing.
☆330Oct 3, 2020Updated 5 years ago
Alternatives and similar repositories for Resources-for-learning-Hacking
Users that are interested in Resources-for-learning-Hacking are comparing it to the libraries listed below
Sorting:
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- A new technique to bypass microsoft's applocker.☆12May 27, 2015Updated 10 years ago
- An aggregate of tools used in the core of vmp_dbg plus other parsing utils to parse vmp bc.☆16Oct 18, 2016Updated 9 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- Dynamic binary analysis via platform emulation☆12Aug 10, 2018Updated 7 years ago
- Penetration Testing Methodology - short notes☆11May 30, 2015Updated 10 years ago
- This repository contains the source code of the web panel I have used in my book series of books: Cyber and Penetration Testing – Web Pen…☆48Jan 11, 2023Updated 3 years ago
- Stay up-to-date with the latest and greatest ethical hacking tools and resources.☆40Jan 21, 2022Updated 4 years ago
- Simple Shellcode development/injection on macOS☆11Nov 6, 2017Updated 8 years ago
- ☆12Feb 19, 2017Updated 8 years ago
- XMPP Man-in-the-Middle, quick & dirty☆41Feb 24, 2014Updated 11 years ago
- ☆10Mar 30, 2016Updated 9 years ago
- 😎 🔗 Awesome list about all kinds of resources for learning Ethical Hacking and Penetration Testing.☆3,314Dec 15, 2024Updated last year
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- more at http://www.zer0mem.sk/?p=271☆12Jun 11, 2013Updated 12 years ago
- Learning Penetration Testing of Android Applications☆80Aug 5, 2017Updated 8 years ago
- A List Of Labs For People (Students) Who Want Learn OR Practice IT Security / Hacking / Penetration Testing In Ethical Way.☆90Nov 25, 2020Updated 5 years ago
- My documentation and tools for learn ethical hacking.☆147Oct 22, 2025Updated 3 months ago
- Penetration Testing, Vulnerability Assessment and Red Team Learning☆135Jan 17, 2026Updated 3 weeks ago
- My public exploit collection.☆31Oct 23, 2018Updated 7 years ago
- ☆14Aug 15, 2018Updated 7 years ago
- Hidden monitoring and blocking Android apps☆10May 2, 2017Updated 8 years ago
- use crystalCPUID to identify vt-x & amd-v☆17Apr 8, 2015Updated 10 years ago
- A sample IoT bot origin from Mirai☆20Mar 29, 2017Updated 8 years ago
- A Public-domain C header file for x86 MSR (Model Specific Register) addresses, and a naive generator of it.☆14Dec 17, 2017Updated 8 years ago
- Some notes and impressive articles of Web Security☆76Aug 17, 2022Updated 3 years ago
- Decrypt AES256GCM-encrypted data in Apple Pay Payment Tokens.☆10Nov 30, 2018Updated 7 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Mar 2, 2020Updated 5 years ago
- XssPy - Web Application XSS Scanner☆842Jan 20, 2023Updated 3 years ago
- ☆16Nov 10, 2015Updated 10 years ago
- Some tools☆10Dec 5, 2017Updated 8 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- My solutions for random crackmes and other challenges☆12Dec 23, 2019Updated 6 years ago
- Web based application for managing your Sourcemod servers and users☆13Aug 8, 2014Updated 11 years ago
- Intel-Process communitation☆10Feb 27, 2017Updated 8 years ago
- x86 emulator with DOS [unofficial mirror]☆12Oct 13, 2025Updated 4 months ago
- Various scripts & tools☆12Apr 22, 2024Updated last year
- Writing a 32-bit Protected Mode OS in NASM☆13Jun 22, 2012Updated 13 years ago
- ☆10Apr 8, 2018Updated 7 years ago