ethical-hacking-tools
There are 324 repositories under ethical-hacking-tools topic.
Smug246/Luna-Grabber
The best discord token grabber made in python
0n1cOn3/FluxER
FluxER - The bash script which installs and runs the Fluxion tool inside Termux. The wireless security auditing tool used to perform attacks such as WPA/WPA2 cracking and MITM attacks.
hueristiq/xurlfind3r
A command-line utility designed to discover URLs for a given domain in a simple, efficient way. It works by gathering information from a variety of passive sources, meaning it doesn't interact directly with the target but instead gathers data that is already publicly available.
berylliumsec/nebula
AI-Powered Ethical Hacking Assistant
faiyazahmad07/xss_vibes
A modern tool written in Python that automates your xss findings.
abdulkadir-gungor/JPGtoMalware
It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganography methods. However, since the payload in the JPG file is encrypted, it cannot be easily decrypted. It also uses the "garbage code insertion/dead-code insertion" method to prevent the payload from being caught by the antivirus at runtime.
Shad0w-ops/H.I.V.E
H.I.V.E is an automated OSINT (Open Source Intelligence) multi-tool that enables efficient data gathering from various sources through the utilization of a single, unified platform.
codesiddhant/Jasmin-Ransomware
Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
hackirby/skuld
Next-Gen Stealer written in Go. Stealing from Discord, Chromium-Based & Firefox-Based Browsers, Crypto Wallets and more, from every user on every disk. (PoC. For educational purposes only)
Warxim/petep
PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is a useful tool for performing penetration tests of applications with various application protocols. ⚡
Warxim/deluder
Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock and Linux Sockets out of the box. ⚡
0xrajneesh/Ethical-Hacking-Projects-for-beginners
Hands-on ethical hacking projects for beginners, covering network scanning, web app testing, password cracking, honeypots, Wi-Fi auditing, phishing, and SQL injection.
HalilDeniz/NetProbe
NetProbe: Network Probe
ALDON94/argus
Argus Advanced Remote & Local Keylogger For macOS and Windows
imegeek/pentesting-framework
Pentesting Framework is a bundle of penetration testing tools, Includes - security, pentesting, hacking and many more.
abdulkadir-gungor/HtmlSmuggling
HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web page. The malicious script decodes and deploys the payload on the targeted device when the victim opens/clicks the HTML attachment/link. The HTML smuggling technique leverages legitimate HTML5 and JavaScript features to hide malicious payloads and evade security detections. The HTML smuggling method is highly evasive. It could bypass standard perimeter security controls like web proxies and email gateways, which only check for suspicious attachments like EXE, DLL, ZIP, RAR, DOCX or PDF
HalilDeniz/TrafficWatch
TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files
hueristiq/xsubfind3r
A command-line utility designed to discover subdomains for a given domain in a simple, efficient way. It works by gathering information from a variety of passive sources, meaning it doesn't interact directly with the target but instead gathers data that is already publicly available.
R3DHULK/HULK
hulk is a ddos attacking tool
Deadshot0x7/Webspoilt
This script will you help to find the information about the website and to help in penetrating testing
x4nth055/ethical-hacking-tools-python
Python programs & tools built in the Ethical Hacking with Python EBook
hueristiq/xcrawl3r
A command-line interface (CLI) based utility to recursively crawl webpages. It is designed to systematically browse webpages' URLs and follow links to discover linked webpages' URLs.
akashblackhat/dark_web.py
Dark Web Informationgathering Footprinting Scanner and Recon Tool Release. Dark Web is an Information Gathering Tool I made in python 3. To run Dark Web, it only needs a domain or ip. Dark Web can work with any Linux distros if they support Python 3. Author: AKASHBLACKHAT(help for ethical hackers)
izenynn/c-reverse-shell
A reverse shell for Windows and Linux written in C.
basicW/badjpg
Payload for jpg file
karthik558/setup_hack_env
This is a versatile collection of scripts designed for OSINT, ethical hacking, and web application security testing. With a focus on automation and efficiency, these tools are ideal for streamlining your daily tasks. The scripts include TP-LINK-722N wifi drivers and are sourced from the Ethical-Hacking-Tools GitHub repository.
CSI-SFIT/Beginners-Guide-to-Ethical-Hacking
For beginners which zero knowledge on ethical hacking!
krishnakatyal/Elliot
A pentesting tool inspired by mr robot and derived by zphisher
R3DHULK/fsociety
fsociety is a penetration toolkit inspired from MR. ROBOT
hackerxphantom/HXP_METASPLOIT
Metasploit Framework Install In Termux Only One Click [All Error Fixed]
berylliumsec/neutron
AI Powered Terminal Based Ethical Hacking Assistant
HalilDeniz/KaliPackergeManager
Kali Packerge Manager
king04aman/CyberSecurity-Tools
This repository is aimed to contain all basic tools and resources for cybersecurity. In this repository you will get all material which you must know in cybersecurity field.
trickest/safe-harbour
security.txt collection of most popular world-wide domains
HITH-Hackerinthehouse/PassMute
PassMute - A multi featured Password Transmutation/Mutator Tool
lisus18ikrak/be-a-hacker
it content free resources including courses that help you to learn ethical hacking for beginners to advanced