☆22Jan 29, 2020Updated 6 years ago
Alternatives and similar repositories for The-Complete-Practical-Certified-Ethical-Hacking-Course-in-Hindi
Users that are interested in The-Complete-Practical-Certified-Ethical-Hacking-Course-in-Hindi are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Sep 10, 2025Updated 7 months ago
- A curated list of blogs, videos, tutorials, code, tools, scripts, and anything useful to help you learn Azure Policy - by @JesseLoudon☆13Jan 20, 2022Updated 4 years ago
- Burp extension to automatically drop requests that match a certain regex.☆10Mar 10, 2023Updated 3 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- This is a collection of Bug Bounty Tips collected from security researchers / bug hunters on Twitter.☆13Feb 19, 2021Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- This project is about tool for detecting, quarantining, and alerting about suspicious phishing emails.☆17Aug 29, 2025Updated 7 months ago
- Build connected security experiences. Starting point to share code, libraries, notebooks, workbooks, and queries for connected experience…☆25Apr 14, 2024Updated 2 years ago
- WhoDAT is an InfoSec Analyzer for Nerds using VirusTotal, Google Safe Browsing, URLScan, Hybrid-Analysis, and OpenAI. Scan URLs, emails, …☆13Jan 4, 2026Updated 3 months ago
- Educational repository with source code examples☆12Jun 3, 2025Updated 10 months ago
- Package provides a minimal and simple integration to attach OWASP security headers for building a secure Laravel application.☆18Mar 10, 2023Updated 3 years ago
- Some cheat sheets created for my own use☆18Dec 8, 2025Updated 4 months ago
- Created Network Intrusion Detection System using Pytorch☆15Oct 15, 2020Updated 5 years ago
- ☆11Aug 25, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- Vulnerable Windows Application for Pentesters from the house of DarkRelay Security Labs. The project is along the lines of DVWA, AWSGoat …☆14Dec 28, 2023Updated 2 years ago
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆16Apr 8, 2025Updated last year
- A PowerShell module to test a machine against the CIS Benchmarks☆26Jul 8, 2025Updated 9 months ago
- ☆16Jan 5, 2018Updated 8 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- Martin's HTTP package☆14Dec 1, 2025Updated 4 months ago
- hacking tools☆14Jan 29, 2023Updated 3 years ago
- MasTKO is a security tool which detects DNS entries associated with AWS’s EC2 servers susceptible to takeover attack and attempts a takeo…☆11Jun 14, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ML based intrusion detection system☆21Jun 18, 2021Updated 4 years ago
- Bruteforce tool for break 4 digit pin locks on smartphones from Huawei (This tool has now been confirmed to work on Samsung smartphones t…☆27Jul 1, 2018Updated 7 years ago
- CEHv12 Notes☆16Jun 11, 2023Updated 2 years ago
- An extension of the sigma standard to include security metrics.☆16May 18, 2023Updated 2 years ago
- $ curl -sL sub.sh | bash☆17Aug 7, 2023Updated 2 years ago
- Interact with SQL databases in Go☆14Mar 3, 2026Updated last month
- ☆11Aug 18, 2023Updated 2 years ago
- ☆12Dec 14, 2021Updated 4 years ago
- Unveiling Cyber Threats: From assets to Vulnerability Insights☆17Oct 22, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- Python, C++ and Go☆22Sep 23, 2022Updated 3 years ago
- Welcome this comprehensive course on Ethical Hacking! This course assumes you have NO prior knowledge in hacking and by the end of it you…☆432Oct 1, 2020Updated 5 years ago
- Automated Enumeration Script for Pentesting☆34Aug 14, 2020Updated 5 years ago
- librsvg for the Windows build of ImageMagick☆22Nov 16, 2025Updated 5 months ago
- Citadel: Enterprise Search☆15May 2, 2023Updated 2 years ago
- Intro to Moose class☆19Jun 16, 2019Updated 6 years ago