đź“• Both personal and public notes for EC-Council's CEHv10 312-50, because it's thousands of pages/slides of boredom, and a braindump to many
-
Updated
Oct 1, 2020
đź“• Both personal and public notes for EC-Council's CEHv10 312-50, because it's thousands of pages/slides of boredom, and a braindump to many
An advanced multi-threaded, multi-client python reverse shell for hacking linux systems. There's still more work to do so feel free to help out with the development. Disclaimer: This reverse shell should only be used in the lawful, remote administration of authorized systems. Accessing a computer network without authorization or permission is il…
fsociety is a penetration toolkit inspired from MR. ROBOT
Study Notes for the OSCP Content You will find notes from various resources like OSCP from Nakerah Network, Practical Ethical Hacking(PEH) course from TCM security, and more
Exam Prep for the Ec-council Certified Ethical Hacker 312-50
Build tools for hacking ethically using python.
Python-based spyware for Windows that logs the foreground window activites, keyboard inputs. Furthermore it is able to take screenshots and and run shell commands in the background.
wifi dos attack tool
JIRA"YA is a vulnerability analyzer for JIRA instances. It runs active scans to identify vulnerabilities by interacting with the host and conducting tests.
Hacking, pen-testing, and cyber-security related tools built with Python.
Ruby For Ethical Hackers
Gestionale per i Gruppi di Economia Solidale
SQL Detector Tool In Go Language
Webapp which run the https://elliotforwater.com/ website
python based sqli detector tool
Remote Task Scheduler Enumeration
The Metasploit-Termux-Installer script automates the setup of Metasploit Framework on Termux, enabling penetration testing on Android. It updates packages, installs dependencies, fetches Metasploit, and configures the environment for seamless use, allowing you to run Metasploit tools like `msfconsole` directly from your terminal.
NetBruter is a network scanning and brute-forcing tool designed to identify open ports on IP addresses, perform geo-location lookups, and attempt to discover valid login credentials. Built with threading for speed, it scans thousands of IPs in seconds, automatically retrieving IP and port information for further brute-force attempts.
Add a description, image, and links to the ethical topic page so that developers can more easily learn about it.
To associate your repository with the ethical topic, visit your repo's landing page and select "manage topics."