Welcome to the WhiteHat repository!
This project is a collection of resources, guides, and research in cybersecurity and artificial intelligence. The materials are organized into different sections to help students, professionals, and enthusiasts expand their knowledge and practical skills in various areas of cybersecurity.
- AI Projects
Experiments and practical projects applying artificial intelligence and machine learning to cybersecurity problems, such as:- Adversarial machine learning (e.g., data poisoning, evasion attacks)
- Automated malware detection
- Security analytics using deep learning
- Research
Open source projects, articles, and presentations from my cybersecurity research. - Information Gathering
- Fingerprinting techniques and tools
- Automated tools for reconnaissance
- My Courses
- Networks and lab
- Club Hack1ng
- Workshops, tutorials, and learning experiences
- Social engineering and web security
- Programming with Python
Explore each folder for hands-on scripts, educational content, and research insights. All materials are intended for ethical and educational use.
Explore techniques for gathering information about a target, including manual and automated tools. Learn about documentation tools, network reconnaissance, and how to interpret data from HTTP requests and cookies. Example tools include:
- Netcat
- Telnet
- Nmap
- WhatWeb
- Httpprint
- BlindElephant
A space for sharing educational activities and experiences from the Hack1ng Club at Universidad Icesi. Topics include:
- Social Engineering tools and concepts
- Web security practices
- Python programming for cybersecurity
- Workshop materials and practical exercises
This repository is intended for educational purposes only. All information and tools provided here are intended for responsible and ethical use.
- Seitz, Justin. Black Hat Python: Python Programming for Hackers and Pentesters. No Starch Press, 2014.
- Ramos, Antonio., Barberto, C. Marugan, D., & Gonzáles I. hacking con ingeniería social técnicas para hackear humanos
- Hadnagy, C. (2014). Unmasking the social engineer: The human element of security. John Wiley & Sons.
- Ramos, Antonio., Barberto, M. Rubén., G. Ángel., & Gonzáles I. Hacking y seguridad de páginas web
- Lutz, M. (2013). Learning Python: Powerful Object-Oriented Programming. " O'Reilly Media, Inc.".
- O'Connor, T. J. (2012). Violent Python: a cookbook for hackers, forensic analysts, penetration testers and security engineers. Newnes.
Feel free to explore the subdirectories for more detailed guides and resources!
___ ___ __ ____ ___ ___ __ __
| | / | | | | | | | / | | | | |
| |/ / | | | | | | / / | | | |
| / | | | | | | \ \_/ /
| |\ \ | '--' | | |\ \ \ /
| _| `.__\ |________| | _| `.__\ |___|
[0][1][0] .ed"""" """$$$$be.
[0][0][1] -" ^""**$$$e.
[1][1][1] ." '$$$c
/ "4$$b
d 3 $$$$
$ * .$$$$$$
.$ ^c $$$$$e$$$$$$$$.
d$L 4. 4$$$$$$$$$$$$$$b
$$$$b ^ceeeee. 4$$ECL.F*$$$$$$$
e$""=. $$$$P d$$$$F $ $$$$$$$$$- $$$$$$
z$$b. ^c 3$$$F "$$$$b $"$$$$$$$ $$$$*" .=""$c
4$$$$L $$P" "$$b .$ $$$$$...e$$ .= e$$$.
^*$$$$$c %.. *c .. $$ 3$$$$$$$$$$eF zP d$$$$$
"**$$$ec " %ce"" $$$ $$$$$$$$$$* .r" =$$$$P""
"*$b. "c *$e. *** d$$$$$"L$$ .d" e$$***"
^*$$c ^$c $$$ 4J$$$$$% $$$ .e*".eeP"
"$$$$$$"'$=e....$*$$**$cz$$" "..d$*"
"*$$$ *=%4.$ L L$ P3$$$F $$$P"
"$ "%*ebJLzb$e$$$$$b $P"
%.. 4$$$$$$$$$$ "
$$$e z$$$$$$$$$$%
"*$c "$$$$$$$P"
."""*$$$$$$$$bc
.-" .$***$$$"""*e.
.-" .e$" "*$c ^*b.
.=*"""" .e$*" "*bc "*$e..
.$" .z*" ^*$e. "*****e.
$$ee$c .d" "*$. 3.
^*$E")$..$" * .ee==d%
$.d$$$* * J$$$e*
""""" "$$$"
888 888
888 888
888 888
88888b. 8888b. .d8888b888 888 .d88b. 888d888
888 "88b "88bd88P" 888 .88Pd8P Y8b888P"
888 888.d888888888 888888K 88888888888
888 888888 888Y88b. 888 "88bY8b. 888
888 888"Y888888 "Y8888P888 888 "Y8888 888