☆34Oct 25, 2023Updated 2 years ago
Alternatives and similar repositories for Practical-Ethical-Hacking-Notes
Users that are interested in Practical-Ethical-Hacking-Notes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).☆16Sep 1, 2025Updated 6 months ago
- TikTok Phishing Attack Simulation Tool designed for ethical hacking, security awareness, and educational purposes.☆26Aug 2, 2025Updated 7 months ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- Monitor your study sessions, log your study hours, set goals, and watch your productivity progress.☆10May 19, 2024Updated last year
- ☆16Dec 28, 2024Updated last year
- Ethical hacking notes pdf☆51Sep 28, 2024Updated last year
- CMSC389R course at UMD☆11Oct 2, 2019Updated 6 years ago
- ☆10Oct 1, 2019Updated 6 years ago
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆16Aug 10, 2024Updated last year
- Near compile-time string obfuscation for Golang☆13Oct 3, 2023Updated 2 years ago
- Remote Task Scheduler Enumeration☆13Jul 9, 2024Updated last year
- Techniques / Tips and tricks for finding sensitive data exposures in Github for Penetration Testers / Bug Bounty Hunters☆17Aug 1, 2020Updated 5 years ago
- This is a collection of wordlists depending upon use cases☆10Jul 27, 2023Updated 2 years ago
- A collection of config files for linux focusing on hackthebox theme☆53Oct 10, 2025Updated 5 months ago
- Inject RDPThief into memory with PowerShell.☆65Jan 21, 2025Updated last year
- This is my portfolio showcasing the vulnerabilities I have discovered during my one-year journey as a bug hunter.☆16Dec 10, 2025Updated 3 months ago
- Analyze your tryhackme progress!☆12May 27, 2024Updated last year
- Minimalistic Keyboard Driven Browser 🌐🎀☆14May 21, 2025Updated 10 months ago
- Tool for scanning domains for .git directories.☆17Oct 2, 2023Updated 2 years ago
- some config files☆14Feb 23, 2026Updated last month
- output burp body only and auto pretiffy☆20May 1, 2025Updated 10 months ago
- ☆17Sep 15, 2023Updated 2 years ago
- Linux Wiper & Cryptor Via Base Utils☆10Sep 14, 2024Updated last year
- ☆13Sep 25, 2022Updated 3 years ago
- Bypassing File Upload Restriction using Magic Bytes☆22Jul 4, 2022Updated 3 years ago
- ⚾ Phoney Badger's pokemon colorscripts wrapped with Go into a standalone, cross-platform binary☆23Feb 26, 2026Updated 3 weeks ago
- A structured portfolio of weekly CEH v13 assessments, vulnerability labs, and ethical hacking documentation to demonstrate practical cybe…☆21Jun 25, 2025Updated 8 months ago
- Mishky's AD Range & The Escalation Path from Hell, version 1.1☆19Feb 5, 2026Updated last month
- After extensive research and understanding of how Pegasus Spyware is operating inside of iOS and AndroidOS systems I have created tools t…☆17Oct 25, 2021Updated 4 years ago
- A minimalist microblogging platform 🐦🔇☆10Mar 14, 2026Updated last week
- BSides, OWASP, DEFCON, RSAC, SANS Talk Material, References and Extra Bits☆14Jul 19, 2025Updated 8 months ago
- Transition form local file inclusion attacks to remote code exection☆68Aug 26, 2020Updated 5 years ago
- My notes containing the Certified Red Team Professional Course☆71Sep 7, 2024Updated last year
- autoreport generates bug report templates for security researchers☆20Aug 4, 2023Updated 2 years ago
- ☆13Nov 29, 2024Updated last year
- simple network signature/rule intrusion detection system written in Python.☆15Jun 10, 2024Updated last year
- Malware & PoC☆14Dec 29, 2025Updated 2 months ago
- AnonCrypt ciphers and diciphers your messages or strings which makes you send texts to people without them understanding it. Anoncrypt us…☆27Jun 26, 2024Updated last year
- This is my personal Enumeration Handbook that I used for the OSCP 2023☆22Aug 21, 2023Updated 2 years ago