santosomar / art-of-hackingView external linksLinks
This repository includes supplemental information covered in the Pearson video course titled "The Art of Hacking and Exploitation".
☆23Jan 3, 2026Updated last month
Alternatives and similar repositories for art-of-hacking
Users that are interested in art-of-hacking are comparing it to the libraries listed below
Sorting:
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆14Jan 11, 2026Updated last month
- A curated list of Docker resources and projects☆16Nov 15, 2025Updated 3 months ago
- A curated list of Awesome Threat Intelligence resources☆34Jan 12, 2018Updated 8 years ago
- Who and what to follow in the world of cyber security☆151Sep 23, 2020Updated 5 years ago
- Code repository for the paper "Geometric Scattering for Graph Data Analysis"☆13Aug 26, 2019Updated 6 years ago
- Artifical-intelligence☆10Dec 27, 2022Updated 3 years ago
- A collection of open source and commercial tools that aid in red team operations.☆13Jun 14, 2018Updated 7 years ago
- ☆13Sep 2, 2019Updated 6 years ago
- Ansible Playbooks to automate Service Now Tasks☆11Apr 25, 2022Updated 3 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago
- PhoneGap NFC peer to peer demo☆22Jan 6, 2017Updated 9 years ago
- Foreman plugin for integration with External IPAM providers☆12Dec 9, 2020Updated 5 years ago
- Optimize your Pwnagotchi experience with my easy-to-use script for on-the-go color inversion. Designed for Waveshare V3 and Pisugar 2/3, …☆11Jan 26, 2024Updated 2 years ago
- Docker image with ps4-exploit-host application☆10Mar 11, 2024Updated last year
- MS17-010☆12Oct 25, 2017Updated 8 years ago
- Fly.io API wrapper for simplifying REST calls.☆10Aug 23, 2017Updated 8 years ago
- foreman-proxy realm plugin for Active Directory☆11Feb 18, 2025Updated 11 months ago
- VoiceRecorder is a simple voice/audio recorder☆13Nov 4, 2025Updated 3 months ago
- A pentesting Firefox spy extension - PoC☆10Jun 16, 2016Updated 9 years ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- E-mails, subdomains and names Harvester - OSINT☆11Jan 17, 2020Updated 6 years ago
- Airflow POC demo : 1) env set up 2) airflow DAG 3) Spark/ML pipeline | #DE☆11Dec 19, 2022Updated 3 years ago
- Collection of modules for the Frieren micro-framework, enhancing functionality for routers and Single Board Computers (SBCs). Explore a r…☆12Jan 2, 2025Updated last year
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- This is a tool that can help you analyze WiFi networks. It can keep track of the network traffic and provide you with detailed informatio…☆12Apr 2, 2023Updated 2 years ago
- Scan git repos for secrets using regex and entropy 🔑☆10Jun 18, 2020Updated 5 years ago
- Basic Binary Exploitation / Buffer Overflows☆11Jun 11, 2017Updated 8 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- Python utility to export a user's starred repositories list into a CSV file☆17May 3, 2018Updated 7 years ago
- 🔊 📈 MSGEQ7 based AudioSpectrum Visualizer for ESP32 and TFT☆11Mar 10, 2020Updated 5 years ago
- ☆11Jun 14, 2023Updated 2 years ago
- -notes and scripts for online course OffIOT☆12Jan 19, 2026Updated 3 weeks ago
- a Python client to query the FIRST EPSS API☆11Sep 13, 2023Updated 2 years ago
- AES-128 Encryption☆10Jul 17, 2014Updated 11 years ago
- A modular framework and program for synchronous pwning with ssh, powered by Python 3, for educational and controlled penetration testing…☆10Sep 4, 2016Updated 9 years ago
- ☆12Jun 4, 2025Updated 8 months ago
- Distributed nmap.☆13May 25, 2023Updated 2 years ago
- Starbound and Casio writeup and exploit for CTCTF 2015☆10Feb 5, 2015Updated 11 years ago