penetration testing hands on introduction to hacking
☆50Dec 21, 2020Updated 5 years ago
Alternatives and similar repositories for GeorgiaWeidmanBook-Pentesting
Users that are interested in GeorgiaWeidmanBook-Pentesting are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Notes on "Penetration Testing: A Hands-On Guide To Hacking"☆54May 11, 2019Updated 6 years ago
- Repository for Ludus french templates☆23Mar 1, 2026Updated 3 weeks ago
- Collection of tips, tools and tutorials around infosec☆29May 18, 2017Updated 8 years ago
- Buffer Overflows☆28Jan 30, 2021Updated 5 years ago
- This tool aims at parsing Microsoft Protection logs to provide relevant data to forensic analysts during incident responses.☆21Sep 30, 2022Updated 3 years ago
- ☆16Jun 16, 2021Updated 4 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- This repository contains a mindmap for different techniques for using Censys Search☆15Sep 17, 2025Updated 6 months ago
- Curated list of content to learn and practice some of the skills and knowledge required for Information Security☆11May 2, 2025Updated 10 months ago
- MiniBossGPT☆14May 24, 2023Updated 2 years ago
- patch of OpenWrt source to build firmware for the Xiaomi Mi Router 4A Gigabit V2 (RB02/R4AV2)☆13Apr 29, 2023Updated 2 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Jun 27, 2023Updated 2 years ago
- A collection of Script for Red Team & Incidence Response☆11Jun 30, 2022Updated 3 years ago
- CVE's we discovered along the way☆17Oct 18, 2021Updated 4 years ago
- Uses DuckyScript™ to grab NTLM Hashes from Windows machine through discord webhook☆14Oct 31, 2024Updated last year
- Quick analysis focusing on most important of a Malware or a Threat☆38Sep 4, 2023Updated 2 years ago
- Simple js based storefront demo☆19Dec 11, 2022Updated 3 years ago
- not an exploit or a poc☆16Apr 15, 2022Updated 3 years ago
- An Intro to Penetration Testing Workshop☆15May 31, 2018Updated 7 years ago
- Vagrant setup for building a machine for CTF/exploit development☆21Apr 21, 2019Updated 6 years ago
- Automated Linux From Scratch (ALFS)☆14Jan 10, 2021Updated 5 years ago
- Personal dotfiles☆10Mar 16, 2022Updated 4 years ago
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆50May 16, 2022Updated 3 years ago
- Static Decryptor for IcedID Malware☆18Oct 1, 2022Updated 3 years ago
- ☆14Dec 2, 2020Updated 5 years ago
- Public release for b01lers CTF 2022. Thanks for playing!☆13Apr 29, 2022Updated 3 years ago
- An installation script to help with the setup of a Kali VM for The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim☆17Jul 21, 2015Updated 10 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29May 5, 2018Updated 7 years ago
- Minimal Docker image with Nmap Network Security Scanner pre-installed.☆12Dec 5, 2025Updated 3 months ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Nov 13, 2022Updated 3 years ago
- Light Remote Desktop Application☆10Oct 1, 2020Updated 5 years ago
- This is a repository containing code to generate a PowerShell payload to access PCs remotely. For more information check this out 👇👇👇☆16Mar 17, 2022Updated 4 years ago
- ☆18Oct 14, 2020Updated 5 years ago
- 蓝凌OA漏洞利用工具/前台无条件RCE/文件写入☆28Jun 29, 2021Updated 4 years ago
- ☆12Jun 24, 2022Updated 3 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆62Jul 18, 2024Updated last year
- PoP_os - Race Inspired Cosmetic Enhancement☆16Feb 25, 2026Updated last month
- A collection of my shellcode samples.☆22Nov 10, 2025Updated 4 months ago
- Import Nmap scans to Cherrytree☆36Jul 4, 2022Updated 3 years ago