☆21Jan 29, 2020Updated 6 years ago
Alternatives and similar repositories for The-Complete-Practical-Certified-Ethical-Hacking-Course-in-Hindi
Users that are interested in The-Complete-Practical-Certified-Ethical-Hacking-Course-in-Hindi are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆14Feb 18, 2021Updated 5 years ago
- SSH brute-force script created for HackTheBox☆16Mar 26, 2020Updated 6 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Most powerfull Wifi Jammier.with fixes.☆12Oct 14, 2022Updated 3 years ago
- This is a collection of Bug Bounty Tips collected from security researchers / bug hunters on Twitter.☆13Feb 19, 2021Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- This project is about tool for detecting, quarantining, and alerting about suspicious phishing emails.☆19Aug 29, 2025Updated 8 months ago
- Build connected security experiences. Starting point to share code, libraries, notebooks, workbooks, and queries for connected experience…☆25Apr 14, 2024Updated 2 years ago
- WhoDAT is an InfoSec Analyzer for Nerds using VirusTotal, Google Safe Browsing, URLScan, Hybrid-Analysis, and OpenAI. Scan URLs, emails, …☆13Jan 4, 2026Updated 4 months ago
- Educational repository with source code examples☆12Jun 3, 2025Updated 11 months ago
- Burp suite - Python☆19Nov 2, 2018Updated 7 years ago
- Package provides a minimal and simple integration to attach OWASP security headers for building a secure Laravel application.☆18Mar 10, 2023Updated 3 years ago
- Created Network Intrusion Detection System using Pytorch☆15Oct 15, 2020Updated 5 years ago
- a simple keylogger that records hardware inputs like keyboard, mouse, microphone and webcam and sends it to your e-mail.☆18Oct 18, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- Vulnerable Windows Application for Pentesters from the house of DarkRelay Security Labs. The project is along the lines of DVWA, AWSGoat …☆15Dec 28, 2023Updated 2 years ago
- This is a collection of ZAProxy Automation Tools and scripts to automate security tests of WEB Applications and WEB Sites☆26May 14, 2023Updated 2 years ago
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆16Apr 8, 2025Updated last year
- Capture The Flag competition challenge write-ups☆23Apr 17, 2026Updated 3 weeks ago
- A PowerShell module to test a machine against the CIS Benchmarks☆27Jul 8, 2025Updated 10 months ago
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆12Aug 9, 2023Updated 2 years ago
- 🚗 A curated list of resources for learning about vehicle security and car hacking☆25Mar 4, 2017Updated 9 years ago
- The dexdump tool☆17Dec 27, 2013Updated 12 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- Code repository for WiFi Hacking: Wireless Penetration Testing for Beginners, published by Packt☆15Jan 30, 2023Updated 3 years ago
- hacking tools☆14Jan 29, 2023Updated 3 years ago
- learn about computer architecture☆42May 6, 2024Updated 2 years ago
- ☆11Aug 25, 2018Updated 7 years ago
- MasTKO is a security tool which detects DNS entries associated with AWS’s EC2 servers susceptible to takeover attack and attempts a takeo…☆11Jun 14, 2023Updated 2 years ago
- A small OS written from scratch for learning purpose☆21May 5, 2017Updated 9 years ago
- CEHv12 Notes☆16Jun 11, 2023Updated 2 years ago
- An extension of the sigma standard to include security metrics.☆16May 18, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Unveiling Cyber Threats: From assets to Vulnerability Insights☆17Oct 22, 2024Updated last year
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- ☆39Oct 3, 2023Updated 2 years ago
- Welcome this comprehensive course on Ethical Hacking! This course assumes you have NO prior knowledge in hacking and by the end of it you…☆438Oct 1, 2020Updated 5 years ago
- Automated Enumeration Script for Pentesting☆34Aug 14, 2020Updated 5 years ago
- Citadel: Enterprise Search☆15May 2, 2023Updated 3 years ago
- The aim of the project is to develop intentionally vulnerable source code in various languages.☆16Mar 3, 2026Updated 2 months ago