ksanchezcld / CISSP-CEHLinks
Materiales de estudio Certificaciones CISSP y CEH
☆34Updated 9 years ago
Alternatives and similar repositories for CISSP-CEH
Users that are interested in CISSP-CEH are comparing it to the libraries listed below
Sorting:
- A web interface to automate Scanning, Generating metasploit payload, Network Testing,Exploring CMS,Information Gathering and much more☆168Updated 10 years ago
- ElevenPaths EternalBlue Metasploit module - works better than Rapid 7☆58Updated 8 years ago
- Black Hat Python Labs☆101Updated 6 years ago
- NoobSecToolkit is a Python Based Tool kit that brings together powerful security and anonymity tools and scripts with predefined security…☆112Updated last year
- Tool made to automate tasks of pentesting.☆168Updated 5 years ago
- A simple shell script which utilizes nmap, nikto, dirb, enum4linux and other open source goodies to automate enumeration process.☆20Updated 3 years ago
- Exploits by 1N3 @CrowdShield @xer0dayz @XeroSecurity☆204Updated 3 years ago
- black hat python☆131Updated 4 years ago
- EternalView is an all in one basic information gathering and vulnerability assessment tool☆139Updated 5 years ago
- Homemade scripts to-do various vulnerable challenges☆77Updated 4 years ago
- Tools that are related to pentest and network security☆97Updated 4 years ago
- A PHP Based Tool That Helps You To Manage All Your Backdoored Websites Efficiently.☆125Updated 2 years ago
- Command line go0gle dorking tool☆140Updated 12 years ago
- The Hacker's ToolBox☆188Updated 8 years ago
- A simple bash based metasploit automation tool!☆125Updated 2 years ago
- XSSYA (Cross Site Scripting Scanner & Vulnerability Confirmation)☆96Updated 2 years ago
- Advanced Hash Manipulation☆177Updated 5 years ago
- Automate NMAP Scans and Generate Custom Nessus Policies Automatically☆137Updated 12 years ago
- FireShodanMap is a Realtime map that integrates Firebase, Google Maps and Shodan. A search is carried out using Shodan searching vulnerab…☆126Updated 7 years ago
- Programs used in the Exploitation Tutorial. Check out thehackerway.com☆20Updated 11 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆23Updated 7 years ago
- IP Cam Shell is a command line script for testing and exploiting a wide range of IP cameras as demonstrated by Craig Heffner in "Exploiti…☆142Updated 8 years ago
- An automatic SQL Injection tool which takes advantage of ~DorkNet~ Googler, Ddgr, WhatWaf and sqlmap.☆273Updated 4 years ago
- ☆195Updated 6 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆190Updated 6 years ago
- search for hosts info with shodan☆232Updated 4 years ago
- Python Library to use the implementation of the REST protocol of Tenable’s Nessus scanner. You can use Nessus from your scripts easily!☆14Updated 10 years ago
- Phishing on Twitter☆255Updated 7 years ago
- 🔓 A dynamic dictionary merger for successful dictionary based attacks.☆226Updated 3 years ago
- Chat with hacker assistant☆194Updated 7 years ago