Notes on ECPPT
☆25Dec 22, 2018Updated 7 years ago
Alternatives and similar repositories for ecppt-notes
Users that are interested in ecppt-notes are comparing it to the libraries listed below
Sorting:
- eCPPTv2 Notes☆13Jun 13, 2021Updated 4 years ago
- Mindmap/CheatSheet for eLearnSecurity-PTPv5☆10Jun 18, 2020Updated 5 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eCPPTv2 from eLearnSecurity☆64Nov 10, 2019Updated 6 years ago
- ☆43Oct 28, 2021Updated 4 years ago
- Reconnaissance and Enumeration automation script☆53Mar 16, 2021Updated 4 years ago
- A support web page for my eJPT / eCPPT Certification Process☆16Jan 18, 2018Updated 8 years ago
- Personal CheatSheet used for the exam made with Obsidian, download the repo and use the resources within Obsidian for a better experience…☆45Feb 20, 2023Updated 3 years ago
- Security feed, done in the stupid simple way☆27Jan 8, 2025Updated last year
- ☆61Dec 9, 2022Updated 3 years ago
- Offsec Practice Labs is a curated training arsenal for hands-on prep across eCPPTv3, OSCP, and CPTS.☆70Jan 9, 2026Updated last month
- This is a Cheatsheet for eJPT.☆16Jan 26, 2021Updated 5 years ago
- ☆85Feb 23, 2020Updated 6 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- ☆13Jan 17, 2025Updated last year
- Penetration Testing Checklist☆37May 14, 2020Updated 5 years ago
- ☆11Jun 8, 2022Updated 3 years ago
- Python script to get Samba Server Version☆11May 8, 2018Updated 7 years ago
- tl;tr; jhaddix bhmv5☆10Jul 2, 2020Updated 5 years ago
- An embedded key/value database for Go.☆11Feb 18, 2022Updated 4 years ago
- this is a simple shell that has the ability to bypass defenses☆13May 24, 2024Updated last year
- Tutorial 040 : Reverse Engineer Grid Runner By Jeff Minter for the C64☆11Jun 2, 2021Updated 4 years ago
- Encryption using 2 Factor Authentication through an external drive with Python☆12Jun 7, 2020Updated 5 years ago
- ☆11Dec 17, 2018Updated 7 years ago
- A fast python tool for creating permutations of alphanumerics☆11Mar 22, 2020Updated 5 years ago
- Network Infrastructure Penetration Testing Tool☆10Jan 7, 2015Updated 11 years ago
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 8 months ago
- Raspberry Pi night vision goggle code. python code that creates a side by side stero view (steroscopic) from a single camera☆13May 8, 2021Updated 4 years ago
- A port scanner written in PowerShell☆13Apr 14, 2021Updated 4 years ago
- ☆10Mar 29, 2024Updated last year
- Powershell-based Windows Security Auditing Toolbox☆10Aug 28, 2017Updated 8 years ago
- PoC for CVE-2025-48384☆20Jul 9, 2025Updated 7 months ago
- helper encrypt data☆10Jun 2, 2021Updated 4 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Dec 29, 2021Updated 4 years ago
- USB Rubber Ducky implemented on FeatherS2 boards (e.g. Lolin S2 Pico)☆12Nov 21, 2022Updated 3 years ago
- A Commodore 64 demo with scrolltext and bitmap for internal talk on tretton37.☆12Mar 20, 2018Updated 7 years ago
- Python tool for detecting subdomain takeover vulnerabilities by resolving CNAME records and checking for known error messages. It support…☆15Feb 2, 2025Updated last year
- TechTalk: Procesamiento masivo de datos con Go y sync.Pool☆12Jan 28, 2022Updated 4 years ago
- Some knowledge learnt during the eJPT studying.☆93May 27, 2020Updated 5 years ago