ethical-hacking
There are 864 repositories under ethical-hacking topic.
The-Art-of-Hacking/h4cker
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artificial intelligence security, vulnerability research, exploit development, reverse engineering, and more.
farhanashrafdev/90DaysOfCyberSecurity
This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks, covering topics such as Network+, Security+, Linux, Python, Traffic Analysis, Git, ELK, AWS, Azure, and Hacking. The repository also includes a `LEARN.md
x4nth055/pythoncode-tutorials
The Python Code Tutorials
EONRaider/blackhat-python3
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
hhhrrrttt222111/Ethical-Hacking-Tools
Complete Listing and Usage of Tools used for Ethical Hacking
0xmaximus/Galaxy-Bugbounty-Checklist
Tips and Tutorials for Bug Bounty and also Penetration Tests.
isanchop/stuhack
Chrome extension for studocu premium free
M4cs/BabySploit
:baby: BabySploit Beginner Pentesting Toolkit/Framework Written in Python :snake:
EONRaider/violent-python3
Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
alvin-tosh/Malware-Exhibit
🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware threats😈, analysis and mitigation🧐.
jaykali/lockphish
Lockphish it's the first tool (07/04/2020) for phishing attacks on the lock screen, designed to grab Windows credentials, Android PIN and iPhone Passcode using a https link.
R3dy/capsulecorp-pentest
Vagrant VirtualBox environment for conducting an internal network penetration test
EONRaider/Packet-Sniffer
A Network Packet Sniffing tool developed in Python 3.
ivan-sincek/penetration-testing-cheat-sheet
Work in progress...
hueristiq/xurlfind3r
A command-line interface (CLI) based passive URLs discovery utility. It is designed to efficiently identify known URLs of given domains by tapping into a multitude of curated online passive sources.
emilyanncr/Windows-Post-Exploitation
Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
Raghavd3v/CRLFsuite
The most powerful CRLF injection (HTTP Response Splitting) scanner.
tuhin1729/Bug-Bounty-Methodology
These are my checklists which I use during my hunting.
Bafomet666/OSINT-SAN
OSINT-SAN Framework дает возможность быстро находить информацию и деанонимизировать пользователей сети интернет.
ivan-sincek/php-reverse-shell
PHP shells that work on Linux OS, macOS, and Windows OS.
ivan-sincek/wifi-penetration-testing-cheat-sheet
Work in progress...
berylliumsec/nebula
AI-Powered Ethical Hacking Assistant
abdulkadir-gungor/JPGtoMalware
It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganography methods. However, since the payload in the JPG file is encrypted, it cannot be easily decrypted. It also uses the "garbage code insertion/dead-code insertion" method to prevent the payload from being caught by the antivirus at runtime.
ivan-sincek/android-penetration-testing-cheat-sheet
Work in progress...
alestanalves/guia-ackercode
Guia Acker Code de Programação e Hacking
Drew-Alleman/powershell-backdoor-generator
Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero and Hak5 USB Rubber Ducky, and changes its signature after every build to help avoid AV.
ivan-sincek/invoker
Penetration testing utility and antivirus assessment tool.
Kennyslaboratory/Ultimate-Hacker-Roadmap
Don't know what to focus on to become a Penetration Tester..? This is the BEST roadmap for becoming a modern penetration tester. Everything you need to know to land a paying job, categorized in 5 skill levels.
sdushantha/dora
Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found
ivan-sincek/powershell-reverse-tcp
PowerShell scripts for communicating with a remote host.
ivan-sincek/ios-penetration-testing-cheat-sheet
Work in progress...
kleiton0x00/XSScope
XSScope is one of the most powerful and advanced GUI Framework for Modern Browser exploitation via XSS.
BullsEye0/ghost_eye
Ghost Eye Informationgathering Footprinting Scanner and Recon Tool Release. Ghost Eye is an Information Gathering Tool I made in python 3. To run Ghost Eye, it only needs a domain or ip. Ghost Eye can work with any Linux distros if they support Python 3. Author: Jolanda de Koff
EONRaider/Arp-Spoofer
A pure-Python ARP Cache Poisoning (a.k.a "ARP Spoofing") tool
hackerxphantom/HXP-Ducky
Most Powerfull 😈Crash any android device with virus from any link using termux or kali linux