Made for My Personal Learning.
☆33May 20, 2023Updated 2 years ago
Alternatives and similar repositories for ejPTv2-Preparation
Users that are interested in ejPTv2-Preparation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Sep 25, 2022Updated 3 years ago
- Notes created for preparation of EJPTv2☆279Jan 18, 2023Updated 3 years ago
- ☆16Feb 6, 2024Updated 2 years ago
- Pass you eJPT Study Guide, here you have all tools and content you need!☆148Jan 14, 2023Updated 3 years ago
- Notes I took while preparing for eJPT certification by INE Security (passed 19/20, fka eLearn Security)☆158Nov 1, 2025Updated 4 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- This repository contains a roadmap for preparing for the EJPTv2 exam.☆177Dec 27, 2024Updated last year
- Penetration Testing Student version 2 simple condensed NOTES for quick recap☆216Sep 9, 2022Updated 3 years ago
- eLearnSecurity Junior Penetration Tester Certificate (eJPT) PTS Notes☆151Jun 12, 2021Updated 4 years ago
- ☆20May 18, 2022Updated 3 years ago
- This repo explains in details about buffer overflow exploit development for windows executable.☆51Sep 21, 2023Updated 2 years ago
- INE eJPT Cheat Sheet / Course Notes. You'll find my comprehensive course notes, which also serve as cheat sheets for the eJPTv2 course. T…☆106Aug 24, 2025Updated 7 months ago
- Python Script for Hash Cracking | Coded By Sir.4m1R☆25Nov 22, 2018Updated 7 years ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 3 months ago
- My personal knowledge repository☆15Mar 20, 2026Updated last week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- CTF Cheatsheet☆35Jun 1, 2020Updated 5 years ago
- ☆16Jul 8, 2024Updated last year
- Offsec Practice Labs is a curated training arsenal for hands-on prep across eCPPTv3, OSCP, and CPTS.☆74Jan 9, 2026Updated 2 months ago
- Malware Development Framework☆11Apr 13, 2024Updated last year
- ☆87Sep 27, 2022Updated 3 years ago
- ☆15Mar 2, 2014Updated 12 years ago
- Compiled binaries of various security tools☆14May 19, 2021Updated 4 years ago
- ☆11May 30, 2021Updated 4 years ago
- Malware Development☆10Sep 30, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- ☆19Jan 14, 2026Updated 2 months ago
- Notes template for Offensive Security's EXP-301 course and OSED exam☆21Mar 4, 2022Updated 4 years ago
- Encryption which converts English characters to unicode characters that mimicking their appearance☆12Sep 17, 2017Updated 8 years ago
- A Development of AI to automate bug bounty☆33Mar 10, 2025Updated last year
- Rockyou.txt Wordlist, but with Strong Passwords only☆34Jan 30, 2023Updated 3 years ago
- A Model Context Protocol (MCP) server that integrates Volatility 3 memory forensics framework with Claude☆34Jul 7, 2025Updated 8 months ago
- ☆17Dec 18, 2025Updated 3 months ago
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Aug 2, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆14Dec 3, 2020Updated 5 years ago
- Simple QR code generator service written in Dart and hosted on Globe.dev☆11Dec 16, 2023Updated 2 years ago
- Collection of the cheat sheets useful for pentesting☆10May 11, 2018Updated 7 years ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- The objective of Smart File Hunter (SFH) is the efficient identification of files containing sensitive information like passwords or priv…☆14Sep 3, 2022Updated 3 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago
- A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability.☆11Nov 26, 2022Updated 3 years ago