ksanchezcld / CISSP-CEH
Materiales de estudio Certificaciones CISSP y CEH
☆34Updated 9 years ago
Alternatives and similar repositories for CISSP-CEH:
Users that are interested in CISSP-CEH are comparing it to the libraries listed below
- Homemade scripts to-do various vulnerable challenges☆75Updated 4 years ago
- Tools that are related to pentest and network security☆98Updated 3 years ago
- Massive arsenal of hacker tools...☆76Updated 7 years ago
- XSSYA (Cross Site Scripting Scanner & Vulnerability Confirmation)☆95Updated 2 years ago
- WebXploiter - An OWASP Top 10 Security scanner !☆77Updated 8 years ago
- A web interface to automate Scanning, Generating metasploit payload, Network Testing,Exploring CMS,Information Gathering and much more☆167Updated 9 years ago
- SuperNES - Super Nmap Easy Scanner☆10Updated 6 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 6 years ago
- This is a big smash up of a lot of various tools I have made in the past along with some new ones. It includes a array of tools for helpi…☆84Updated 10 years ago
- Programs used in the Exploitation Tutorial. Check out thehackerway.com☆19Updated 10 years ago
- Orb is a massive footprinting tool.☆45Updated 5 years ago
- Cat-Nip Automated Basic Pentest Tool - Designed For Kali Linux☆123Updated 5 years ago
- Various penetration testing tools written in Python. Based mostly on ideas and implementations presented in 'Violent Python: A Cookbook f…☆68Updated 8 years ago
- Program to perform vulnerability analysis and automatically generate a report☆56Updated 2 years ago
- Automate NMAP Scans and Generate Custom Nessus Policies Automatically☆134Updated 11 years ago
- A simple shell script which utilizes nmap, nikto, dirb, enum4linux and other open source goodies to automate enumeration process.☆20Updated 3 years ago
- Black Hat Python Labs☆96Updated 5 years ago
- Execute a brute force attack with Steghide to file with hide information and password established☆119Updated 4 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆95Updated 4 years ago
- Passive Vulnerability Auditor☆130Updated 8 years ago
- Database of websites for penetration testing☆174Updated 5 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆82Updated 6 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆98Updated 6 years ago
- A unified console to perform the "kill chain" stages of attacks.☆200Updated last year
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆76Updated 8 years ago
- Social Engineering Tool Oriented to facebook☆56Updated 7 years ago
- ☆192Updated 6 years ago