This repository includes supplemental information covered in the Pearson video course titled "The Art of Hacking and Exploitation".
☆25Jan 3, 2026Updated 4 months ago
Alternatives and similar repositories for art-of-hacking
Users that are interested in art-of-hacking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A curated list of Docker resources and projects☆16Nov 15, 2025Updated 6 months ago
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆14Feb 15, 2026Updated 3 months ago
- A curated list of Awesome Threat Intelligence resources☆34Jan 12, 2018Updated 8 years ago
- Who and what to follow in the world of cyber security☆152Sep 23, 2020Updated 5 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- Automated Mass Exploiter☆11Apr 14, 2019Updated 7 years ago
- -notes and scripts for online course OffIOT☆12Jan 19, 2026Updated 4 months ago
- Python utility to export a user's starred repositories list into a CSV file☆17May 3, 2018Updated 8 years ago
- Country information for a given IP address.☆11Mar 22, 2015Updated 11 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- A pentesting Firefox spy extension - PoC☆10Jun 16, 2016Updated 9 years ago
- MS17-010☆12Oct 25, 2017Updated 8 years ago
- A collection of open source and commercial tools that aid in red team operations.☆13Jun 14, 2018Updated 7 years ago
- Basic Binary Exploitation / Buffer Overflows☆11Jun 11, 2017Updated 8 years ago
- Self contained htaccess shells and attacks☆16May 18, 2018Updated 8 years ago
- Catch IMAP/POP passwords and see incoming and outgoing messages☆16Sep 15, 2013Updated 12 years ago
- Docker image with ps4-exploit-host application☆10Mar 11, 2024Updated 2 years ago
- ☆11Jun 11, 2025Updated 11 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- pentestscripts☆16Sep 16, 2019Updated 6 years ago
- Scan git repos for secrets using regex and entropy 🔑☆10Jun 18, 2020Updated 5 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆14Feb 9, 2015Updated 11 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆13Jan 17, 2018Updated 8 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆13Mar 2, 2019Updated 7 years ago
- Fly.io API wrapper for simplifying REST calls.☆10Aug 23, 2017Updated 8 years ago
- Some scripts useful for red team activities☆13Jan 18, 2020Updated 6 years ago
- Tool for automation of GUI-based testing.☆16Jan 7, 2015Updated 11 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆14May 29, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- webkit; but pwned☆10Jan 28, 2019Updated 7 years ago
- Capture The Flag Information☆12Dec 7, 2018Updated 7 years ago
- Red Team Tool Kit☆16Mar 10, 2019Updated 7 years ago
- Documentation for OnlyKey☆19Jan 15, 2025Updated last year
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆13Aug 9, 2016Updated 9 years ago
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆14Aug 7, 2019Updated 6 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆12Mar 14, 2018Updated 8 years ago