Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for ethical hacking
ethical-hacking
x
206 search results found
Openoctober
⭐
27
Open-October contribution destination. The Contest has now ended.
Ctf Wr1t3ups
⭐
27
Repository to store summaries of CTF challenges
Xss Catcher
⭐
26
Simple API for storing all incoming XSS requests.
Octopus
⭐
25
Octopus - Network Scan/Infos & Web Scan
Mdpin
⭐
25
MDPin is a server and a website. It contains an UI to fake a Android login screen to steal their pin code. It works via a web browser, by going into fullscreen.
Crypto
⭐
25
This tool will encrypt-decrypt your files and directories. It has built-in password generator and featured with Colourful UI. It is based on AES (Advanced Encryption Standard) CBC mode Algorithm Symmetric Cryptography and made in Python language (Python3)
Tsuki Sploit
⭐
24
A USB-based script for Ethical hacking with multiple attacks
Wordlist Generator
⭐
24
Generate customised wordlist for penetration testing practice (e.g. brute force attack, dictionary attack, etc.)
Python For Ethical Hacking
⭐
23
This is a complete project series on implementing hacking tools available in Kali Linux into python.
Wifi Hacking
⭐
23
wifi dos attack tool
Hackipy
⭐
22
Hacking, pen-testing, and cyber-security related tools built with Python.
Brutekrag
⭐
21
Penetration tests on SSH servers using brute force or dictionary attacks. Written in Python.
Ssh Kalilinux
⭐
20
A free SSH KaliLinux server (Segfault) without limited time,You can use this for test any tool or using kali linux tools or anything else.
Kali Linux Dockerfile
⭐
20
A simple Dockerfile to build an image starting from the latest official one of Kali Linux and including some useful tools.
Offsec Misc
⭐
20
Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers
Offensive Tor Toolkit
⭐
20
Bind/Reverse Shells, SOCKS, etc over Tor in Golang
Porthub
⭐
19
A fast port scanner written in python with a focus on reliability and simplicity.
Secure Website
⭐
19
Secure website with a registration, sign in, session management, and CRUD controls.
Dns Exfiltrator
⭐
19
Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.
Top Ethical Hacking Resources
⭐
18
Stay up-to-date with the latest and greatest ethical hacking tools and resources.
Chad
⭐
17
Search Google Dorks like Chad. / Social media takeover tool.
Python For Ethical Hacking
⭐
17
Build tools for hacking ethically using python.
Itsmetraw
⭐
17
Smbrelay
⭐
16
Script en Bash que automatiza todos los pasos para retransmitir la solicitud de autenticación SMB con el objetivo de obtener una Shell.
Kalnemix
⭐
16
A powerful command-line tool for website reconnaissance and information gathering
Ultimate Hacker Roadmap
⭐
16
Don't know what to focus on to become a Penetration Tester..? This is the BEST roadmap for becoming a modern penetration tester. Everything you need to know to land a paying job, categorized in 5 skill levels.
Lockphish
⭐
16
Lockphish it's the first tool (07/04/2020) for phishing attacks on the lock screen, designed to grab Windows credentials, Android PIN and iPhone Passcode using a https link.
Machine Learning Siem Water Infrastructure
⭐
15
This work aims at using different machine learning techniques in detecting anomalies (including hardware failures, sabotage and cyber-attacks) in SCADA water infrastructure.
Phishing Mobile App
⭐
14
Phishing mobile application made in React Native for both Android and iOS devices.
Archer
⭐
13
A tool to check for response status codes with ease
Pentest
⭐
13
Pentesting Notes, Cheetsheets and Guide
Ghost_dir
⭐
13
Just like a ghost, Ghost_Dir is capable of detecting hidden subdirectories that other scanning tools may not be able to find. It acts silently, without leaving any traces, and is able to penetrate into obscure areas of the web page that usually go unnoticed.
Hashexploit
⭐
12
HashExpoit is Great Tool For Cracking Hash
Bugbounty
⭐
12
Start your journey with Bug Bounty.
Ceh
⭐
12
CEH (Maktabkhooneh)
Whitehat
⭐
12
Python Packages For Ethical Hacking
Oscp Study Notes
⭐
11
Study Notes for the OSCP Content You will find notes from various resources like OSCP from Ahmed Limbo, Practical Ethical Hacking(PEH) course from TCM security, and more
Pointer
⭐
11
Pointer is a Fast Simple Lightweight Tool for Endpoint Discovery.
Pentesting
⭐
11
Cyber Security
Tofu
⭐
11
Windows offline filesystem hacking tool for Linux
The Not So Simple Php Command Shell
⭐
11
This tool is intended to be used for on target enumeration to gather and exfiltrate information and then to upload tools such as netcat or msvenom payload for further access to the target.
Ctf
⭐
10
🎏 ⚑ We put the "ethical" in "ethical hacking." ⚑
Sqli Detector In Python
⭐
10
python based sqli detector tool
Selene
⭐
10
Séléné is a database dumper written in python3. Usefull during pentesting and CTFs.
Multitool
⭐
10
Simple Penetration Testing Multitool For Beginners.
Rat
⭐
10
A Tool To Get Another Computer’s Information And Send It Via A Webhook To Your Discord Server
Beginners Guide To Ethical Hacking
⭐
10
For beginners which zero knowledge on ethical hacking!
Metagoofeel
⭐
10
Web crawler and downloader based on GNU Wget.
Catchtheflag Mern
⭐
10
CTF game made using M(MySQL)ERN stack. Application has admin menu for adding more levels. So game can remain updated with modern technologies
Jwt Bf
⭐
10
Brute force a JWT token. Script uses multithreading.
Fuzzout
⭐
9
Every Hacker's Go to Fuzzing List. Introducing the Ultimate Fuzzing Directory: Your Go-To Resource for Penetration Testers and Bug Bounty Hunters! Unlock the power of comprehensive fuzzing with our meticulously curated Fuzzing Directory, a one-stop solution designed to streamline your penetration testing and bug bounty hunting endeavors.
Wordlist Extender
⭐
9
Extend wordlist by appending digits and special characters to each word.
Headmail
⭐
9
A tool designed to analyse email headers
Ethical Hacking
⭐
9
Notes and Resources for beginners in Ethical-Hacking and Cyber Security Field.
Ethical Hacking
⭐
9
Codes for malware, viruses and key-logger and other tools
P0znmitm
⭐
9
Advanced MITM Tool
Cehv10studyguideplusplus
⭐
9
📓 CEHv10 Study Guide++
Chrome Inject
⭐
9
Chrome Injection for Hawkish-Eyes | Can Log new Tokens, new roblox cookies work with extension
Infosec Tips
⭐
9
Infosec writeups, Bug bounty tips, Tweets & Many more that are picked from around the world || I personally use it || I try to mend it daily. So, stay tuned and learn something
Invoke Mathfuscation
⭐
8
A quick command line utility that generates uses simple addition to obfuscate individual characters, then executes it
Steal All Files
⭐
8
Python script to automatically steal all the files and information from a computer using an USB device. Created just for educational purposes.
Ethicalhacker Edc
⭐
8
a collection of payloads and scripts from my "Building an Ethical Hacker EDC" YouTube Series
Reinforced Wavsep
⭐
8
A reinforced version of the Wavsep evaluation platform.
Domain Extractor
⭐
8
Extract valid or partially valid domain names and IPs from malicious or invalid URLs.
Scribdhack
⭐
7
Chrome extension for www.scribd.com to get free premium features
Dictionary Attack Cyberoam
⭐
7
Dictionary Attack on NIT Kurukshetra User-Portal (Cyberoam). A nodejs script to guess cyberoam password for any given username.
File Shredder
⭐
7
PowerShell script for shredding files.
Cov Comsec.github.io
⭐
7
The official site for Coventry's Ethical Hacking Computer Security Society (ComSec), find our latest presentations, videos & announcements!
X_insta
⭐
7
X_INSTA Powerful INSTAGRAM Password Brute Force Tool For Windows
Pentesting Guide
⭐
7
Penetration Testing Guide
Instant File Downloads
⭐
7
this is an INSTANT File Downloads with JavaScript which allows you to download a file into the users computer without them clicking or anything. FOR EDUCATIONAL PURPOSES ONLY!
Netprobe
⭐
7
NetProbe: Network Probe
Automated Reconator
⭐
7
Ffind
⭐
7
A tool to find files of interest on a compromised host during a penetration test
Syn File
⭐
7
Exfiltrate data from a compromised target using covert channels
Ethical Hacking And Penetration Testing
⭐
6
:neckbeard: This repository contains slides and notes from my workshop at the Grace Hopper Conference, India (2019).
Hxp Ducky
⭐
6
Most Powerfull 😈Crash any android device with virus from any link using termux or kali linux
Locksmith
⭐
6
Locksmith is a tool which allow simple way to test several API keys for a bug bounty program
Ghci 2019
⭐
6
:neckbeard: This repository contains slides and notes from my workshop at the Grace Hopper Conference, India (2019).
Anongt
⭐
6
Redirect All Traffic Through Tor Network For Kali Linux
Revoltshing
⭐
6
FRAMEWORK REVOLTSHING v.2 . HTTP SERVER FOR PHISHING
Dnsrecon Chunked
⭐
6
Brute force subdomains in multiple smaller iterations. Based on DNSRecon.
Amounts
⭐
6
Generate a wordlist to fuzz amounts or any other numerical values.
Hacking Smart Contracts
⭐
6
Ethical hacking practices used to explore vulnerabilities in smart contracts, in order to enhance security measures against potential threats.
I Killer
⭐
6
( Ethical hacking) and ( Cyber Security )
Venus_grabber
⭐
6
one of the best grabber of 2023 written in python
Loki
⭐
6
Ransomware is unique among cybercrime because in order for the attack to be successful, it requires the victim to become a willing accomplice even after the fact.
Wild West
⭐
6
Find hidden websites and directories faster!
Ddos Tool
⭐
5
This is a tools for ddos attack {distributed denial of service} you can test networks,servers,any others device with it.
Intro To Ethical Hacking
⭐
5
Dec 28th @ in5 - Introduction to Ethical Hacking and Cyber Security. At this session, we went over the basics of cybersecurity and showed how you can protect yourself from some common attacks. Using Kali Linux as a platform, we isolated exploits and recreate some of the more common major attacks (eg; ‘Man-In-The-Middle’) using a variety of penetration testing tools such as the Browser Exploitation Framework, also showed how to inoculate your systems against each malicious action.
Ethical Hacking
⭐
5
Token Drainer
⭐
5
✔️ After purchase you will receive: 🛡 Drainer source code ⛵️ Additional modules: Blur, Seaport, X2Y2 ➖ Collection of landing page templates ➖ Step by step installation instructions ✉️ Access to developer chat 🦊 Future free updates ✉️ Free technical support 🕊 Traffic Launch Tips
Spidertrap Rs
⭐
5
A simple trap for web crawlers
Nagooglesearch
⭐
5
Not another Google searching tool.
Termux4all
⭐
5
termux4all is not a project or something. This is some packages that can be used for the development and security purposes on android phone using the termux app itself. The main purpose of this project is to install & setup all the important tools or packages in termux without researching a lot.
Dupknock
⭐
5
Python tool to help you knockout duplicate entries from multiple files and generate the final output
Hackers4fun Writeups
⭐
5
Writeups for H4ck3rs4Fun Challenges posted on Twitter
Ethical Hacking Study
⭐
5
Ethical Hacking - Useful Resources
Ad
⭐
5
Microsoft Windows Active Directory
Zero To Oscp
⭐
5
A quick guide to help total beginners find a path to becoming a penetration tester.
101-200 of 206 search results
< Previous
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.