santosomar / art-of-hacking
This repository includes supplemental information covered in the Pearson video course titled "The Art of Hacking and Exploitation".
☆17Updated 6 years ago
Alternatives and similar repositories for art-of-hacking:
Users that are interested in art-of-hacking are comparing it to the libraries listed below
- A curated list of awesome Python frameworks, libraries, software and resources☆11Updated 2 months ago
- A curated list of Awesome Threat Intelligence resources☆30Updated 7 years ago
- Cisco Press CCNA Cyber Ops Books and Video Courses supplemental information and additional study materials.☆24Updated 5 years ago
- An installation script to help with the setup of a Kali VM for The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim☆17Updated 9 years ago
- pwk notes and scripts☆15Updated 9 years ago
- Reconnaissance scripts for penetration testing☆57Updated 9 years ago
- Find a useable IP address to use☆29Updated 10 years ago
- Easy Window domain access☆51Updated 10 years ago
- A list of collected articles and resources from the website Peerlyst☆17Updated 8 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- ☆61Updated 6 years ago
- Weape-Wireless-EAP-Extractor☆27Updated 11 years ago
- OSCP Scripts☆14Updated 9 years ago
- A collection of nmap scripts I've written☆23Updated 8 years ago
- Python Tool for Host Enumeration☆50Updated 7 years ago
- ☆52Updated 4 years ago
- Experimental PowerShell tools for Penetration Testing / Red Teaming☆22Updated 7 years ago
- This is my path to OSCP☆11Updated 6 years ago
- Wireless Forensics Framework In Python☆20Updated 8 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 8 years ago
- Automated enumeration☆30Updated 3 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Updated 6 years ago
- Pentester Automation Tool☆45Updated 4 years ago
- The initial conversation slides and menu of scenarios☆38Updated 3 years ago
- Vulnerable web site. Used to test sentinel features.☆11Updated 8 years ago
- Random collection of exploit code, tools, scripts, etc.☆26Updated 9 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆11Updated 6 years ago
- Subdomain brute force focused on speed and data serialization☆75Updated 2 years ago
- Digital Forensics and Incident Response Wiki☆40Updated 10 years ago
- Tools used for Penetration testing / Red Teaming☆64Updated 6 years ago