Spreading the word of: https://github.com/imrk51/CEH-v11-Study-Guide
☆17Nov 3, 2022Updated 3 years ago
Alternatives and similar repositories for CEHv11-Study
Users that are interested in CEHv11-Study are comparing it to the libraries listed below
Sorting:
- This repo. has my notes and some practice questions from the ICCA exam by INE.☆16Aug 24, 2024Updated last year
- This config file will automatically convert a temporary Windows Sandbox environment into a Flare VM for malware analysis.☆11Jan 3, 2025Updated last year
- A powerful tool to search questions asked in UPSC Civil Service Examination.☆13Oct 18, 2022Updated 3 years ago
- macos-collector - Automated Collection of macOS Forensic Artifacts for DFIR☆29Jan 29, 2026Updated last month
- Find a curated collection of active publishers, publications, and agencies that pay fair rates for high-quality technical content☆10May 10, 2023Updated 2 years ago
- Collection of scripts and tools related to the eCTHPv2 exam by INE.☆19Jun 12, 2022Updated 3 years ago
- Set of examples problems to learn python☆15Apr 28, 2015Updated 10 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- Resources from the Security Presentation☆13Oct 29, 2024Updated last year
- ☆17Feb 25, 2024Updated 2 years ago
- fork of the mMass library mspy☆16Oct 22, 2015Updated 10 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- ☆12Dec 31, 2022Updated 3 years ago
- 📑 A collection of cheatsheets for pentesting tools☆17Feb 24, 2021Updated 5 years ago
- Laser for entertain your cat with an esp8266 connected to WIFI and usable through a Blynk app.☆14Oct 30, 2018Updated 7 years ago
- Implementation of rfc7664 dragonfly key exchange using ECC☆20Oct 12, 2018Updated 7 years ago
- This project builds an End-to-End Azure Data Engineering Pipeline, performing ETL and Analytics Reporting on the AdventureWorks2017LT Dat…☆20Feb 19, 2025Updated last year
- Examples and code for the book "Feedback Control for Computer Systems"☆16Nov 18, 2020Updated 5 years ago
- This repository is a comprehensive collection of resources, documentation, apps, and add-ons related to Splunk, a powerful data analytics…☆24Feb 16, 2026Updated 2 weeks ago
- ☆18Dec 23, 2024Updated last year
- CVE-2018-9276 PRTG < 18.2.39 Reverse Shell (Python3 support)☆20Dec 22, 2022Updated 3 years ago
- High-level Threat Intelligence playbooks☆20Mar 6, 2021Updated 4 years ago
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Oct 9, 2024Updated last year
- Legacy Sigma Tools (sigmac etc.)☆16May 7, 2023Updated 2 years ago
- 2021-2024 Eleventy build☆18Jan 26, 2026Updated last month
- Máquina virtual educativa que simula los sistemas usados por una empresa eléctrica: control de consumo, monitoreo industrial y cibersegur…☆45Oct 26, 2025Updated 4 months ago
- ☆21Dec 17, 2023Updated 2 years ago
- Sharing Threat Hunting runbooks☆25Jul 5, 2019Updated 6 years ago
- DEPRECATED -> GO TO https://github.com/microsoft/Microsoft-threat-protection-Hunting-Queries☆21Apr 22, 2020Updated 5 years ago
- Hunt for Keywords , Mutex, Windows Event,Registry Keys,Process,Schedule tasks in Windows Machine☆22Dec 8, 2024Updated last year
- ☆27Jul 2, 2024Updated last year
- This repository is your one stop solution for observability for DevOps Engineers☆32Aug 25, 2024Updated last year
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)☆34Updated this week
- The Brandefense cyber threat intelligence team is always researching new threats and writing research reports. Our latest Threat Reports …☆23Oct 1, 2025Updated 5 months ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆31Jan 30, 2026Updated last month
- My Python Examples☆28Oct 1, 2019Updated 6 years ago
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆28Apr 21, 2025Updated 10 months ago
- ☆28Nov 25, 2025Updated 3 months ago
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆35Apr 14, 2024Updated last year