ethical-hacking-tools
There are 370 repositories under ethical-hacking-tools topic.
0n1cOn3/FluxER
FluxER - The bash script which installs and runs the Fluxion tool inside Termux. The wireless security auditing tool used to perform attacks such as WPA/WPA2 cracking and MITM attacks.
hueristiq/xurlfind3r
A command-line utility designed to discover URLs for a given domain in a simple, efficient way. It works by gathering information from a variety of passive sources, meaning it doesn't interact directly with the target but instead gathers data that is already publicly available.
yogsec/Hacking-Tools
A curated list of penetration testing and ethical hacking tools, organized by category. This compilation includes tools from Kali Linux and other notable sources.
faiyazahmad07/xss_vibes
A modern tool written in Python that automates your xss findings.
abdulkadir-gungor/JPGtoMalware
It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganography methods. However, since the payload in the JPG file is encrypted, it cannot be easily decrypted. It also uses the "garbage code insertion/dead-code insertion" method to prevent the payload from being caught by the antivirus at runtime.
hackirby/skuld
Next-Gen Stealer written in Go. Stealing from Discord, Chromium-Based & Firefox-Based Browsers, Crypto Wallets and more, from every user on every disk. (PoC. For educational purposes only)
0xrajneesh/Ethical-Hacking-Projects-for-beginners
Hands-on ethical hacking projects for beginners, covering network scanning, web app testing, password cracking, honeypots, Wi-Fi auditing, phishing, and SQL injection.
codesiddhant/Jasmin-Ransomware
Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Shad0w-ops/H.I.V.E
H.I.V.E is an automated OSINT (Open Source Intelligence) multi-tool that enables efficient data gathering from various sources through the utilization of a single, unified platform.
yogsec/API-Pentesting-Tools
API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).
Warxim/petep
PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is a useful tool for performing penetration tests of applications with various application protocols. ⚡
Warxim/deluder
Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock and Linux Sockets out of the box. ⚡
HalilDeniz/NetProbe
NetProbe: Network Probe
R3DHULK/HULK
hulk is a ddos attacking tool
s-r-e-e-r-a-j/WebSift
WebSift is an OSINT ethical hacking tool designed to scrape and extract emails, phone numbers, and social media links or other URLs from websites. It is developed for Termux and Linux-based systems
ALDON94/argus
Argus Advanced Remote & Local Keylogger For macOS and Windows
abdulkadir-gungor/HtmlSmuggling
HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web page. The malicious script decodes and deploys the payload on the targeted device when the victim opens/clicks the HTML attachment/link. The HTML smuggling technique leverages legitimate HTML5 and JavaScript features to hide malicious payloads and evade security detections. The HTML smuggling method is highly evasive. It could bypass standard perimeter security controls like web proxies and email gateways, which only check for suspicious attachments like EXE, DLL, ZIP, RAR, DOCX or PDF
imegeek/pentesting-framework
Pentesting Framework is a bundle of penetration testing tools, Includes - security, pentesting, hacking and many more.
x4nth055/ethical-hacking-tools-python
Python programs & tools built in the Ethical Hacking with Python EBook
HalilDeniz/TrafficWatch
TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files
hueristiq/xsubfind3r
A command-line utility designed to discover subdomains for a given domain in a simple, efficient way. It works by gathering information from a variety of passive sources, meaning it doesn't interact directly with the target but instead gathers data that is already publicly available.
Deadshot0x7/Webspoilt
This script will you help to find the information about the website and to help in penetrating testing
dev-angelist/Ethical-Hacking-Tools
List, utilize and cheatsheet of Ethical Hacking tools
hueristiq/xcrawl3r
A command-line utility designed to recursively spider webpages for URLs. It works by actively traversing websites - following links embedded in webpages, parsing resources like sitemaps and robots.txt files, and even processing local files - to uncover every URL.
R3DHULK/fsociety
fsociety is a penetration toolkit inspired from MR. ROBOT
yogsec/Physical-Pentesting-Tools
Physical penetration testing is a critical aspect of security assessment that involves simulating real-world attacks to evaluate the effectiveness of physical security controls.
karthik558/setup_hack_env
This is a versatile collection of scripts designed for OSINT, ethical hacking, and web application security testing. With a focus on automation and efficiency, these tools are ideal for streamlining your daily tasks. The scripts include TP-LINK-722N wifi drivers and are sourced from the Ethical-Hacking-Tools GitHub repository.
izenynn/c-reverse-shell
A reverse shell for Windows and Linux written in C.
krishnakatyal/Elliot
A pentesting tool inspired by mr robot and derived by zphisher
CSI-SFIT/Beginners-Guide-to-Ethical-Hacking
For beginners which zero knowledge on ethical hacking!
hackerxphantom/HXP_METASPLOIT
Metasploit Framework Install In Termux Only One Click [All Error Fixed]
king04aman/CyberSecurity-Tools
This repository is aimed to contain all basic tools and resources for cybersecurity. In this repository you will get all material which you must know in cybersecurity field.
akashblackhat/dark_web.py
Dark Web Informationgathering Footprinting Scanner and Recon Tool Release. Dark Web is an Information Gathering Tool I made in python 3. To run Dark Web, it only needs a domain or ip. Dark Web can work with any Linux distros if they support Python 3. Author: AKASHBLACKHAT(help for ethical hackers)
HalilDeniz/KaliPackergeManager
Kali Packerge Manager
basicW/badjpg
Payload for jpg file
berylliumsec/neutron
AI Powered Terminal Based Ethical Hacking Assistant