santosomar / art-of-hackingLinks
This repository includes supplemental information covered in the Pearson video course titled "The Art of Hacking and Exploitation".
☆21Updated 3 weeks ago
Alternatives and similar repositories for art-of-hacking
Users that are interested in art-of-hacking are comparing it to the libraries listed below
Sorting:
- A curated list of Awesome Threat Intelligence resources☆34Updated 8 years ago
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆14Updated 2 weeks ago
- Cisco Press CCNA Cyber Ops Books and Video Courses supplemental information and additional study materials.☆31Updated 6 years ago
- A curated list of Docker resources and projects☆16Updated 2 months ago
- A swiss army knife for pentesting Windows/Active Directory environments☆50Updated 9 years ago
- ByePass automates a large number of password cracking tasks using optimized dictionaries and mangling rules☆78Updated 5 months ago
- Official Black Hat Arsenal Security Tools Repository☆160Updated 3 years ago
- scripts for pentesting☆86Updated 7 years ago
- SimpleEmail is a email recon tool that is fast and easy framework to build on☆47Updated 10 years ago
- Additional modules for recon-ng☆105Updated 8 years ago
- A repo for collecting and organizing security tools of various types. As new ones come out, they get added to the list.☆102Updated 3 years ago
- Opinionated organisation-centric OSINT footprinting inspired from recon-ng and Maltego☆175Updated 8 years ago
- Reconnaissance scripts for penetration testing☆59Updated 10 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆35Updated 9 years ago
- Penetration Testing/Security Cheatsheets☆64Updated 10 years ago
- Look up an email domain (@example.com), using Python, across all known domains.☆46Updated 2 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆48Updated 3 years ago
- Various penetration testing tools written in Python. Based mostly on ideas and implementations presented in 'Violent Python: A Cookbook f…☆70Updated 9 years ago
- Pentest dropbox setup scripts for Kali Linux☆90Updated 9 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆245Updated 5 years ago
- ☆49Updated 6 years ago
- Red Team Field Manual☆72Updated 9 years ago
- Offensive tools as Dockerfiles. Lightweight & Ready to go☆206Updated 7 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- A collection of CTF solution types, i.e. not solutions to specific CTF challenges, but the general categories that those solutions fall u…☆57Updated 3 years ago
- Various Cheat Sheets related to development and security☆144Updated 5 years ago
- Pentesting Cheatsheets and Guides☆124Updated 8 years ago
- An installation script to help with the setup of a Kali VM for The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim☆17Updated 10 years ago
- A quick and dirty PCAP parser that helps you identify who your applications are sending sensitive data to without encryption.☆119Updated last year
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆65Updated 6 years ago