joaovarelas / CEHv11_MindMapsView external linksLinks
All credits to Matt Walker (Author of "CEH Certified Ethical Hacker All-in-One Exam Guide" ISBN 1264269943)
☆11Feb 5, 2022Updated 4 years ago
Alternatives and similar repositories for CEHv11_MindMaps
Users that are interested in CEHv11_MindMaps are comparing it to the libraries listed below
Sorting:
- CEH V11 Notes stay tuned and fork me. All the best for your exams 👍💯💥☆11Dec 1, 2021Updated 4 years ago
- Incident Notification Platform by @NC3-LU☆11Updated this week
- MCP Server for Cutter☆21Aug 2, 2025Updated 6 months ago
- Interactive Shells like PsExec, but in Go☆16Apr 30, 2025Updated 9 months ago
- Challenges and official solutions for SINF CTF 2020 (companion CTF of SINF, for students, which I organized by myself)☆13Nov 11, 2020Updated 5 years ago
- windows Local privilege escalation for xp sp3+ (x86/x64)☆12Oct 26, 2017Updated 8 years ago
- A python module for red teams to support the continuous recon of JavaScript files and HTML script blocks in an active web application.☆14Oct 18, 2023Updated 2 years ago
- An index of vendors in the MSP space who have published their Vulnerability Disclosure Program and Bug Bounty Programs.☆12Apr 19, 2022Updated 3 years ago
- It's the collection of all common Question and answers that can possibly come in your exam, if you just complete these question's you wil…☆12Mar 26, 2023Updated 2 years ago
- Writeups for ECSC 2019 National Phase☆10Jun 5, 2019Updated 6 years ago
- Zone-H Cybercrime Archive Telegram Monitoring Bot☆14Jun 10, 2025Updated 8 months ago
- ☆19Jul 23, 2025Updated 6 months ago
- Incident Response Collections☆11Jul 24, 2018Updated 7 years ago
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Oct 18, 2019Updated 6 years ago
- Heappo 🦛 is a PyKD based extensions for WinDBG which aids Heap Exploitation☆14Mar 25, 2020Updated 5 years ago
- Interactive Editor/Debugger for testing Proxy Auto-Config files.☆17Apr 12, 2024Updated last year
- An admission control policy that safeguards against accidental duplicate claiming of Hosts/Domains.☆14Jul 9, 2018Updated 7 years ago
- MalwareAnalysis☆12Dec 19, 2020Updated 5 years ago
- My note repo☆16Feb 25, 2016Updated 9 years ago
- ☆25Jul 17, 2024Updated last year
- edge --> powerpoint --> remote-file --> shell☆11May 17, 2019Updated 6 years ago
- Coursera☆17May 30, 2023Updated 2 years ago
- A MCP client that enables Mistral AI models to autonomously execute complex tasks across web and local environments through standardized …☆15Apr 1, 2025Updated 10 months ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- ☆16Mar 24, 2021Updated 4 years ago
- CVE-2018-15982_PoC☆14Nov 6, 2019Updated 6 years ago
- Load various payload (DLL from memory, Exe, etc...) in a way to evade static analysis of Antivirus. It can fetch data from various method…☆15Jun 18, 2025Updated 7 months ago
- Precaution CLI - command line static application security testing tool☆26Feb 2, 2026Updated 2 weeks ago
- ☆26Jan 10, 2019Updated 7 years ago
- UglyEXe - bypass some AVs☆17Feb 28, 2020Updated 5 years ago
- TOGAF9 Study Guide☆16Jul 26, 2018Updated 7 years ago
- List of metadata service endpoints for different cloud providers for your pentesting needs.☆15Mar 8, 2019Updated 6 years ago
- A Keylogger Made in Python. Tested on Windows, Linux. windows and linux executable payload generator. Screen shot and custom time delay. …☆16Sep 18, 2022Updated 3 years ago
- CEH V12 Training Kit (20 Modules)☆17Nov 15, 2024Updated last year
- Damn Vulnerable Rails app☆13Sep 20, 2012Updated 13 years ago
- JADX-GUI plugin to get information about the native JNI (.so) libraries in an APK☆31Dec 15, 2025Updated 2 months ago
- A collection of scapy scripts, mostly security stuff.☆23Jul 20, 2022Updated 3 years ago
- Short and simple vulnerable PHP web application that naïve scanners found to be perfectly safe☆14Dec 4, 2015Updated 10 years ago
- Programs I Made while learning python for pentesters.☆20Aug 26, 2022Updated 3 years ago