This repo. has my notes and some practice questions from the ICCA exam by INE.
☆16Aug 24, 2024Updated last year
Alternatives and similar repositories for ICCA-Notes
Users that are interested in ICCA-Notes are comparing it to the libraries listed below
Sorting:
- This repo has the comprehensive Cheatsheet that I made during my eJPT exam prep...☆30Jan 12, 2026Updated last month
- Hide your Ass by changing Public IP and userAgents in every 10 seconds - CYBERSECURITY☆10Feb 19, 2023Updated 3 years ago
- Take control of a remote machine using reverse shells in python(The hacking side of python)☆10May 23, 2023Updated 2 years ago
- Powerful Wireless Network Auditing Framework - 2023☆10Sep 10, 2023Updated 2 years ago
- Dungeons and Dragons 5e Guide☆14Jun 2, 2018Updated 7 years ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 8 months ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆13Jul 16, 2025Updated 7 months ago
- ☆23Aug 24, 2025Updated 6 months ago
- Spreading the word of: https://github.com/imrk51/CEH-v11-Study-Guide☆17Nov 3, 2022Updated 3 years ago
- Various scripts I create while doing CTFs. May or may not be helpful :)☆15Dec 14, 2024Updated last year
- Una colección de mini apps vulnerables desarrolladas en Python con Flask. Cada vulnerabilidad incluye tanto el código vulnerable como su …☆16May 14, 2025Updated 9 months ago
- WebSocket Penetration Testing Toolkit for Burp Suite☆27Feb 12, 2026Updated 2 weeks ago
- A community package-based python wrapper that simplifies carrying out scans, and pentests upon certain scope while performing security pe…☆11Dec 10, 2023Updated 2 years ago
- Advanced test for proxy & waf☆14Feb 10, 2026Updated 3 weeks ago
- Nibbleblog 4.0.3 - Arbitrary File Upload (CVE-2015-6967)☆15Feb 25, 2021Updated 5 years ago
- This project documents my hands-on journey in learning and conducting internal Active Directory (AD) penetration testing. The exercises s…☆16Apr 19, 2025Updated 10 months ago
- This repository is a Dockerized php application containing a LFI (Local File Inclusion) vulnerability which can lead to RCE (Remote Code …☆12Jun 16, 2022Updated 3 years ago
- Anomaly Detector Tool for ROS☆13Aug 20, 2018Updated 7 years ago
- URILoot is a browser extension designed for Bug Bounty Hunters and Pentesters. Makes fetching uris easy from various sources.☆49Feb 15, 2026Updated 2 weeks ago
- ☆16Dec 17, 2022Updated 3 years ago
- Remote C2-style MCP server for Frida instrumentation on rooted Android☆31Jan 31, 2026Updated last month
- A UWP player utility app for Dungeons & Dragons☆17Oct 1, 2018Updated 7 years ago
- ☆16Feb 6, 2024Updated 2 years ago
- This is an advanced ASMI bypass that is currently undetected by Windows Defender and all the Antivirus software's on virustotal.☆25Jun 10, 2025Updated 8 months ago
- Earn achievements using Github☆22Aug 23, 2022Updated 3 years ago
- open source vulnerability scanner and information gathering tool☆16Jan 28, 2025Updated last year
- A simple reverse and as well a webshell that recognices the OS (Windows/Linux).☆16Nov 11, 2020Updated 5 years ago
- A simple API to access Tanzania's location information☆15Dec 27, 2021Updated 4 years ago
- Detection of indirect syscall techniques using hardware breakpoints and vectored exception handling.☆51Oct 19, 2025Updated 4 months ago
- reverse engineering random malwares☆22Feb 1, 2025Updated last year
- An ordinary website can make and use by everyone. so What is The difference between a Geek and common people?☆18Sep 24, 2021Updated 4 years ago
- ☆51Nov 26, 2025Updated 3 months ago
- Personal notes from the eJPT course, for the eJPT exam.☆25Sep 13, 2023Updated 2 years ago
- ☆14Sep 25, 2022Updated 3 years ago
- Kali Custom Setup Script☆20Jan 4, 2023Updated 3 years ago
- Three complete IT / Cybersecurity resume for the following job roles: Systems Administration, SOC Analyst, & Penetration Tester.☆26Apr 2, 2025Updated 11 months ago
- tools, files, and scripts I use for PNPT and CRTO☆23Feb 21, 2022Updated 4 years ago
- Fork repository for CryptoCat's "Binary Exploitation 101 Course" AKA "Practical Buffer Overflow Exploitation"☆22Dec 9, 2022Updated 3 years ago
- Command line client for HackTheBox☆25Feb 26, 2024Updated 2 years ago