mekhaleraj / PT_booksLinks
☆82Updated 6 years ago
Alternatives and similar repositories for PT_books
Users that are interested in PT_books are comparing it to the libraries listed below
Sorting:
- This repo offers notes and resources on ethical hacking, covering information gathering, scanning, web hacking, exploitation, and Windows…☆212Updated 9 months ago
- Phone: A Mobile Phone Forensic Framework ( Android )☆208Updated 10 months ago
- This repo shares blue team security notes and resources for detecting and preventing cyber attacks. Topics covered include email, file, l…☆52Updated 9 months ago
- CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity ta…☆34Updated 4 months ago
- ☆146Updated 7 months ago
- One Liner OSINT is a collection of powerful one-liner commands for Open-Source Intelligence (OSINT) gathering.☆55Updated 10 months ago
- A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in dis…☆97Updated this week
- A tool for automatically change the Tor IP address over time.☆124Updated 9 months ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆100Updated 2 years ago
- PS one-liner cmdlets for Windows security☆26Updated 4 years ago
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆168Updated 10 months ago
- EthicalHacking, Python, Nmap, Metasploit☆260Updated 5 years ago
- A step-by-step walkthrough of different machines "pwned" on the CTF-like platform, HackTheBox.☆69Updated 3 years ago
- High quality and text versions of cheat sheets from Cyber Detective Twitter☆35Updated last year
- ☆46Updated 2 months ago
- Lists various tools used in hardware hacking.☆30Updated 10 months ago
- ☆43Updated 4 years ago
- Enter Morpheus, your advanced IOC detection tool. Powered by expert YARA rules and integrated with VirusTotal, it scans and identifies In…☆54Updated 11 months ago
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆160Updated 2 months ago
- E-books related to hacking helps you to know more about hacking☆344Updated 5 years ago
- ☆110Updated 2 years ago
- ☆39Updated 6 years ago
- ☆65Updated 7 months ago
- TryHackMe Roadmap☆51Updated last year
- 🥷 SecArchive - Cybersecurity Resource Collection A curated archive of high-quality resources for learning cybersecurity, bug bounty, et…☆313Updated this week
- tool used to change your IP every second your want☆430Updated last year
- Enhance your hacking toolkit with my Chrome Extension. Designed for ethical hacking and red team activities, it offers tailored features …☆53Updated 9 months ago
- The Black Hat Bash book repository☆340Updated 6 months ago
- NMAP-AI: AI-Powered Network Scanning & Automation Platform 🤖 Revolutionizing network scanning with AI-powered automation, intelli…☆77Updated 5 months ago
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆587Updated last week