All Projects → Brute-f0rce → CEH

Brute-f0rce / CEH

Licence: other
Exam Prep for the Ec-council Certified Ethical Hacker 312-50

Projects that are alternatives of or similar to CEH

moneta
Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs
Stars: ✭ 384 (+440.85%)
Mutual labels:  malware, injection
Spyware
Python-based spyware for Windows that logs the foreground window activites, keyboard inputs. Furthermore it is able to take screenshots and and run shell commands in the background.
Stars: ✭ 31 (-56.34%)
Mutual labels:  malware, ethical
Batch-Antivirus
Batch Antivirus, a powerful antivirus suite written in batch with real-time protection and heuristical scanning.
Stars: ✭ 26 (-63.38%)
Mutual labels:  malware, scanning
Ntlmrecon
Enumerate information from NTLM authentication enabled web endpoints 🔎
Stars: ✭ 252 (+254.93%)
Mutual labels:  enumeration, reconnaissance
Php Antimalware Scanner
AMWScan (PHP Antimalware Scanner) is a free tool to scan php files and analyze your project to find any malicious code inside it.
Stars: ✭ 181 (+154.93%)
Mutual labels:  malware, scanning
Android-Task-Injection
Task Hijacking in Android (somebody call it also StrandHogg vulnerability)
Stars: ✭ 52 (-26.76%)
Mutual labels:  injection, hijacking
MsfMania
Python AV Evasion Tools
Stars: ✭ 388 (+446.48%)
Mutual labels:  malware, injection
Reconnoitre
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+2469.01%)
Mutual labels:  enumeration, scanning
Anteater
Anteater - CI/CD Gate Check Framework
Stars: ✭ 174 (+145.07%)
Mutual labels:  malware, scanning
Multiscanner
Modular file scanning/analysis framework
Stars: ✭ 494 (+595.77%)
Mutual labels:  malware, scanning
Intrec Pack
Intelligence and Reconnaissance Package/Bundle installer.
Stars: ✭ 177 (+149.3%)
Mutual labels:  enumeration, reconnaissance
Kernel-dll-injector
Kernel-Mode Driver that loads a dll into every new created process that loads kernel32.dll module
Stars: ✭ 256 (+260.56%)
Mutual labels:  malware, injection
Raccoon
A high performance offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 2,312 (+3156.34%)
Mutual labels:  enumeration, reconnaissance
ProcessInjector.NET
Learning Process Injection and Hollowing techniques
Stars: ✭ 23 (-67.61%)
Mutual labels:  injection, hijacking
Asnlookup
Leverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.
Stars: ✭ 163 (+129.58%)
Mutual labels:  enumeration, reconnaissance
hacking-resources
Hacking resources and cheat sheets. References, tools, scripts, tutorials, and other resources that help offensive and defensive security professionals.
Stars: ✭ 1,386 (+1852.11%)
Mutual labels:  malware, hacker
Scilla
🏴‍☠️ Information Gathering tool 🏴‍☠️ DNS / Subdomains / Ports / Directories enumeration
Stars: ✭ 116 (+63.38%)
Mutual labels:  enumeration, reconnaissance
Intelspy
Perform automated network reconnaissance scans
Stars: ✭ 134 (+88.73%)
Mutual labels:  enumeration, reconnaissance
Richkware
Framework for building Windows malware, written in C++
Stars: ✭ 315 (+343.66%)
Mutual labels:  malware, hacker
Lime Crypter
Simple obfuscation tool
Stars: ✭ 217 (+205.63%)
Mutual labels:  malware, injection

Home

Ethical Hacking Guide For:

  • Prep for Ec-council Certified Ethical Hacker (CEH) Examination
  • Reference

CHANGE LOG

1.0.0 - 2018-04-09

Added

  • Added All Sections of Guide.
  • Added Content to
    • Introduction to Ethical Hacking
    • Footprinting and Reconnaissance
    • Scanning Networks

1.0.1 - 2018-05-29

Added

  • Added Content to
    • Footprinting and Reconnaisance
    • Scanning Networks
    • Enumeration
    • System Hacking
    • Malware Threats
    • Sniffing
    • Social Engineering
    • Denial of Service
    • Session Hijacking
    • Hacking Web Servers
    • Hacking Web Applications
    • SQl Injection
    • Hacking Wireless Networks
    • Hacking Mobile Platforms
    • Evading IDS, Firewalls, and Honeypots
    • Cloud Computing
    • Resources
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].