ethical-hacking

There are 2046 repositories under ethical-hacking topic.

  • h4cker

    The-Art-of-Hacking/h4cker

    This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artificial intelligence security, vulnerability research, exploit development, reverse engineering, and more.

    Language:Jupyter Notebook24k1k1384.6k
  • farhanashrafdev/90DaysOfCyberSecurity

    This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks, covering topics such as Network+, Security+, Linux, Python, Traffic Analysis, Git, ELK, AWS, Azure, and Hacking. The repository also includes a `LEARN.md

  • husnainfareed/awesome-ethical-hacking-resources

    😎 🔗 Awesome list about all kinds of resources for learning Ethical Hacking and Penetration Testing.

  • x4nth055/pythoncode-tutorials

    The Python Code Tutorials

    Language:Jupyter Notebook2.9k99592k
  • EONRaider/blackhat-python3

    Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.

    Language:Python2.3k7012442
  • hhhrrrttt222111/Ethical-Hacking-Tools

    Complete Listing and Usage of Tools used for Ethical Hacking

  • xalgord/Massive-Web-Application-Penetration-Testing-Bug-Bounty-Notes

    A comprehensive guide for web application penetration testing and bug bounty hunting, covering methodologies, tools, and resources for identifying and exploiting vulnerabilities.

  • 0xmaximus/Galaxy-Bugbounty-Checklist

    Tips and Tutorials for Bug Bounty and also Penetration Tests.

  • isanchop/stuhack

    Chrome extension for studocu premium free

    Language:JavaScript1.5k2593218
  • Hamed233/Cybersecurity-Mastery-Roadmap

    A comprehensive, step-by-step guide to mastering cybersecurity from beginner to expert level with curated resources, tools, and career guidance

  • 4lbH4cker/ALHacking

    Albanian Hacking Tool!! Tools to help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user discovery, Anonymous-sms, Webcam Hack • Powerful DDOS attack tool!! Operating System Requirements works on any of the following operating systems: • Android • Linux • Unix

    Language:Shell1.2k4720278
  • topscoder/nuclei-wordfence-cve

    60k+ WordPress Nuclei templates, updated daily from Wordfence intel—filter by severity/tags/CVE and scan in one line. 🚀🔒

    Language:Python1.1k1926146
  • alvin-tosh/Malware-Exhibit

    🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware threats😈, analysis and mitigation🧐.

    Language:Assembly1.1k2817195
  • M4cs/BabySploit

    :baby: BabySploit Beginner Pentesting Toolkit/Framework Written in Python :snake:

    Language:HTML1k3521150
  • EONRaider/violent-python3

    Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.

    Language:Python1k385173
  • jaykali/lockphish

    Lockphish it's the first tool (07/04/2020) for phishing attacks on the lock screen, designed to grab Windows credentials, Android PIN and iPhone Passcode using a https link.

    Language:HTML9602327131
  • capsulecorp-pentest

    R3dy/capsulecorp-pentest

    Vagrant VirtualBox environment for conducting an internal network penetration test

    Language:Ruby9382780174
  • stivenhacker/GhostStrike

    Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations.

    Language:C++80216096
  • berylliumsec/nebula

    AI-powered penetration testing assistant for automating recon, note-taking, and vulnerability analysis.

    Language:Python7951510109
  • tuhin1729/Bug-Bounty-Methodology

    These are my checklists which I use during my hunting.

    Language:HTML795200102
  • ivan-sincek/penetration-testing-cheat-sheet

    Work in progress...

    Language:PHP770230152
  • EONRaider/Packet-Sniffer

    A Network Packet Sniffing tool developed in Python 3.

    Language:Python769216104
  • aw-junaid/Hacking-Tools

    This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.

    Language:C668321184
  • hueristiq/xurlfind3r

    A command-line utility designed to discover URLs for a given domain in a simple, efficient way. It works by gathering information from a variety of passive sources, meaning it doesn't interact directly with the target but instead gathers data that is already publicly available.

    Language:Go64472173
  • Raghavd3v/CRLFsuite

    The most powerful CRLF injection (HTTP Response Splitting) scanner.

    Language:Python5889681
  • OSINT-SAN

    Bafomet666/OSINT-SAN

    OSINT-SAN Framework дает возможность быстро находить информацию и деанонимизировать пользователей сети интернет.

    Language:CSS5743325101
  • pentest

    ZishanAdThandar/pentest

    Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.

    Language:PHP56012086
  • emilyanncr/Windows-Post-Exploitation

    Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!

  • ivan-sincek/php-reverse-shell

    PHP shells that work on Linux OS, macOS, and Windows OS.

    Language:PHP51512153
  • hackerxphantom/HXP-Ducky

    Most Powerfull 😈Crash any android device with virus from any link using termux or kali linux

    Language:Shell4477875
  • ivan-sincek/android-penetration-testing-cheat-sheet

    Work in progress...

    Language:JavaScript4466069
  • abdulkadir-gungor/JPGtoMalware

    It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganography methods. However, since the payload in the JPG file is encrypted, it cannot be easily decrypted. It also uses the "garbage code insertion/dead-code insertion" method to prevent the payload from being caught by the antivirus at runtime.

    Language:Python4128185
  • hackerxphantom/xinsta_brute

    Instagram Bruteforce Tool Super Fast Crack Auto/Manual Attack 10M Password List

    Language:Shell39581744
  • The-Art-of-Hacking/websploit

    This is a learning created by Omar Santos (@santosomar) for different Cybersecurity training sessions. It includes many intentionally vulnerable applications running in Docker containers and thousands of cybersecurity resources.

    Language:Python394327130
  • Drew-Alleman/powershell-backdoor-generator

    Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero and Hak5 USB Rubber Ducky, and changes its signature after every build to help avoid AV.

    Language:Python3936664