01076629 BASIC PENETRATION TESTING AND ETHICAL HACKING
-
Updated
May 12, 2023
01076629 BASIC PENETRATION TESTING AND ETHICAL HACKING
Example Python script that demonstrates a simple example of a Cross-Site Scripting (XSS) exploit for educational purposes only. This script is intended to be used responsibly, for learning and understanding the security implications of XSS attacks, and should not be used for any illegal or unethical activities.
A list of web application security
Based on my experience, completing all of the official iLAB modules can lead to passing the exam. I've compiled a list of iLAB exercises that can enhance your technical skills. These exercises are not just for the purpose of the exam but also to improve your penetration testing techniques.
Learn hot to execute a Mobile Application Penetration Testing
Cybersecurity, Penetration testing and ethical hacking tools - to be used for educational purposes ONLY. DISCLAIMER: Performing hacking attempts on computers that you do not own (without permission) is illegal!
shittyRECON is a Python-based bug bounty reconnaissance automation tool that helps you automate various aspects of your recon process
Nothing Special About It
Hello, this is repository which has solutions for Natas Labs.
Script to install individual or groups of BlackArch tools
Various cybersecurity/hacker examples, snippets and code
Security Tool for look and download files in S3 Buckets
A Go Framework for HTTP Password Brute Forcing
Here is where i will release my small projects related to Pentesting/CTFs
Script that make easy to set up required tools for android application penetration testing.
In this video, I covered what SQL is, some basic commands of MySQL, how to perform SQL injection to log in as a user, and how to use UINON attack (a branch of SQL injection) to access sensitive data 🎃! At the end of the video, I also went over how to prevent SQL injection to protect your database! Just like always, this video is for educational …
Test Samba Servers which may have been configured improperly for anonymous access to vulnerable shares.
When you have a hammer, everything looks like a nail
Performed a Tab Nabbing attack and privilege escalation to hijack a web server using Kali Linux.
Add a description, image, and links to the penetration-testing topic page so that developers can more easily learn about it.
To associate your repository with the penetration-testing topic, visit your repo's landing page and select "manage topics."