☆34Oct 25, 2023Updated 2 years ago
Alternatives and similar repositories for Practical-Ethical-Hacking-Notes
Users that are interested in Practical-Ethical-Hacking-Notes are comparing it to the libraries listed below
Sorting:
- Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).☆16Sep 1, 2025Updated 6 months ago
- TikTok Phishing Attack Simulation Tool designed for ethical hacking, security awareness, and educational purposes.☆22Aug 2, 2025Updated 7 months ago
- Technical Challenge (Controls Deployment)☆24Nov 28, 2025Updated 3 months ago
- ☆10May 17, 2025Updated 9 months ago
- This is the repo for Taskfile demo☆12Aug 10, 2024Updated last year
- ☆10Oct 1, 2019Updated 6 years ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- Enigma Machine in C☆13Nov 1, 2024Updated last year
- Analyze your tryhackme progress!☆12May 27, 2024Updated last year
- Monitor your study sessions, log your study hours, set goals, and watch your productivity progress.☆10May 19, 2024Updated last year
- ☆13Nov 29, 2024Updated last year
- Ethical hacking notes pdf☆49Sep 28, 2024Updated last year
- BSides, OWASP, DEFCON, RSAC, SANS Talk Material, References and Extra Bits☆14Jul 19, 2025Updated 7 months ago
- A minimalist microblogging platform 🐦🔇☆10Feb 22, 2026Updated last week
- Linux Wiper & Cryptor Via Base Utils☆10Sep 14, 2024Updated last year
- Remote Task Scheduler Enumeration☆13Jul 9, 2024Updated last year
- Slides, codes, and materials related to my courses☆15Dec 19, 2025Updated 2 months ago
- Kickstart your Ethical Hacking Journey with Fsociety by GDSC-SMIT Star the Repository and Open your First PR☆36Oct 25, 2023Updated 2 years ago
- Ethical Hacking Roadmap 🌐🔒☆11Dec 19, 2023Updated 2 years ago
- Flawa generates Markdown docs from code files, so you don’t have to explain everything.☆15Nov 18, 2024Updated last year
- The nightmare giving MySQL migrator☆10Aug 19, 2016Updated 9 years ago
- The Vulnerability Assessment project aims to identify and address security vulnerabilities in a Windows 10 virtual machine (VM). Using N…☆18Mar 4, 2024Updated last year
- ☆14Mar 13, 2025Updated 11 months ago
- This Network Intrusion Detection System (IDS) is network-based, and it will receive suspicious packet capture files from a network monito…☆14Apr 21, 2023Updated 2 years ago
- ☆14Feb 25, 2025Updated last year
- ☆12Nov 11, 2023Updated 2 years ago
- A collection of config files for linux focusing on hackthebox theme☆53Oct 10, 2025Updated 4 months ago
- Universal prompt for Power users 💪🌈☆20May 14, 2025Updated 9 months ago
- Hacking and Learning consistently for 100 days straight af.☆18Apr 12, 2022Updated 3 years ago
- Web Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)☆12Sep 5, 2024Updated last year
- Exfiltrate data using ping and PowerShell, no admin access required☆15Mar 26, 2024Updated last year
- After extensive research and understanding of how Pegasus Spyware is operating inside of iOS and AndroidOS systems I have created tools t…☆15Oct 25, 2021Updated 4 years ago
- Malware & PoC☆14Dec 29, 2025Updated 2 months ago
- e2e Scanning research module☆22Jun 30, 2025Updated 8 months ago
- some config files☆14Feb 23, 2026Updated last week
- A table containing CTF challenge links and their corresponding walkthroughs from different platforms.☆11Oct 23, 2022Updated 3 years ago
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆18Jul 29, 2024Updated last year
- Google Dorks and keywords for bug hunters.☆15Aug 16, 2021Updated 4 years ago
- AI hacking snippets for prompt injection, jailbreaking LLMs, and bypassing AI filters. Ideal for ethical hackers and security researchers…☆37Nov 10, 2025Updated 3 months ago