Cyber security

Certified Ethical Hacker Quiz – Sharpen Your Skills With The CEH v12 Interactive Application

Welcome to the Ethical Hacking Quiz Application, designed to help learners test their knowledge of the Certified Ethical Hacker v12 curriculum.

This CLI-based tool offers an interactive way to engage with ethical hacking concepts and prepare for CEH v12 certification exam.

Features

  • Dynamic Question Pool: Questions are fetched dynamically from a remote source, ensuring a varied and up-to-date quiz each time you run the application.
  • Interactive CLI: Utilizes color-coded feedback and clear console outputs for an engaging user experience.
  • Customizable Quiz Length: Supports customizing the number of questions per session.
  • Immediate Feedback: Provides instant feedback on answers, helping users learn and correct their mistakes in real time.

Prerequisites

Before you start using the Quiz App, make sure you have the following installed:

  • Python 3.6 or higher
  • requests library for Python
  • colorama library for Python

Installation

Clone the repository to your local machine:

git clone https://github.com/H3LLKY4T/CEH-mocktest.git
cd CEH-mocktest

Install The necessary Python Libraries:

pip install requests colorama

Usage

To run the quiz, simply execute the main script:

python3 ceh.py
Tamil S

Tamil has a great interest in the fields of Cyber Security, OSINT, and CTF projects. Currently, he is deeply involved in researching and publishing various security tools with Kali Linux Tutorials, which is quite fascinating.

Recent Posts

Bomber : Navigating Security Vulnerabilities In SBOMs

bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…

15 hours ago

EmbedPayloadInPng : A Guide To Embedding And Extracting Encrypted Payloads In PNG Files

Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…

15 hours ago

Exploit Street – Navigating The New Terrain Of Windows LPEs

Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…

3 days ago

ShadowDumper – Advanced Techniques For LSASS Memory Extraction

Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…

4 days ago

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

2 weeks ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

3 weeks ago