Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for ethical hacking
ethical-hacking
x
206 search results found
H4cker
⭐
15,693
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artificial intelligence security, vulnerability research, exploit development, reverse engineering, and more.
Pythoncode Tutorials
⭐
1,923
The Python Code Tutorials
Blackhat Python3
⭐
1,763
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Hacking Resources
⭐
1,614
Hacking resources and cheat sheets. References, tools, scripts, tutorials, and other resources that help offensive and defensive security professionals.
90daysofcybersecurity
⭐
1,434
This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks, covering topics such as Network+, Security+, Linux, Python, Traffic Analysis, Git, ELK, AWS, Azure, and Hacking. The repository also includes a `LEARN.md
Ethical Hacking Tools
⭐
1,159
Complete Listing and Usage of Tools used for Ethical Hacking
Galaxy Bugbounty Checklist
⭐
1,133
Tips and Tutorials for Bug Bounty and also Penetration Tests.
Babysploit
⭐
996
👶 BabySploit Beginner Pentesting Toolkit/Framework Written in Python 🐍
Massive Web Application Penetration Testing Bug Bounty Notes
⭐
877
Violent Python3
⭐
867
Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Malware Exhibit
⭐
857
🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware threats😈, analysis and mitigation🧐.
Stuhack
⭐
834
Chrome extension for studocu premium free
Capsulecorp Pentest
⭐
754
Vagrant VirtualBox environment for conducting an internal network penetration test
Packet Sniffer
⭐
548
A Network Packet Sniffing tool developed in Python 3.
Penetration Testing Cheat Sheet
⭐
540
Work in progress...
Xurlfind3r
⭐
534
A command-line interface (CLI) based passive URLs discovery utility. It is designed to efficiently identify known URLs of given domains by tapping into a multitude of curated online passive sources.
Crlfsuite
⭐
499
The most powerful CRLF injection (HTTP Response Splitting) scanner.
Bug Bounty Methodology
⭐
438
These are my checklists which I use during my hunting.
Osint San
⭐
385
OSINT-SAN Framework дает возможность быстро находить информацию и деанонимизировать пользователей сети интернет.
Rekono
⭐
385
Pentesting automation platform that combines hacking tools to complete assessments
Php Reverse Shell
⭐
363
PHP shells that work on Linux OS, macOS, and Windows OS.
Windows Post Exploitation
⭐
324
Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
Guia Ackercode
⭐
307
Guia Acker Code de Programação e Hacking
Android Penetration Testing Cheat Sheet
⭐
304
Work in progress...
Invoker
⭐
292
Penetration testing utility and antivirus assessment tool.
Nebula
⭐
291
AI-Powered Ethical Hacking Assistant
Wifi Penetration Testing Cheat Sheet
⭐
277
Work in progress...
Pycrypt
⭐
266
Python Based Crypter That Can Bypass Any Kinds Of Antivirus Products
Powershell Reverse Tcp
⭐
263
PowerShell scripts for communicating with a remote host.
Hrshell
⭐
249
HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Ios Penetration Testing Cheat Sheet
⭐
241
Work in progress...
Jpgtomalware
⭐
220
It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganograp
Pwnlnx
⭐
215
An advanced multi-threaded, multi-client python reverse shell for hacking linux systems. There's still more work to do so feel free to help out with the development. Disclaimer: This reverse shell should only be used in the lawful, remote administration of authorized systems. Accessing a computer network without authorization or permission is illegal.
Forbidden
⭐
208
Bypass 4xx HTTP response status codes and more. Based on PycURL and Python Requests.
Dora
⭐
206
Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found
Handbook
⭐
196
A living document for penetration testing and offensive security.
Pwnlnx
⭐
196
An advanced multi-threaded, multi-client python reverse shell for hacking linux systems. There's still more work to do so feel free to help out with the development. Disclaimer: This reverse shell should only be used in the lawful, remote administration of authorized systems. Accessing a computer network without authorization or permission is illegal.
Dfw1n Osint
⭐
174
Australian Open Source Intelligence Gathering Resources, Australias Largest Open Source Intelligence Repository for Cyber Professionals and Ethical Hackers
Ghost_eye
⭐
171
Ghost Eye Informationgathering Footprinting Scanner and Recon Tool Release. Ghost Eye is an Information Gathering Tool I made in python 3. To run Ghost Eye, it only needs a domain or ip. Ghost Eye can work with any Linux distros if they support Python 3. Author: Jolanda de Koff
Arp Spoofer
⭐
169
A pure-Python ARP Cache Poisoning (a.k.a "ARP Spoofing") tool
Cbrutekrag
⭐
158
Penetration tests on SSH servers using brute force or dictionary attacks. Written in C.
Xsscope
⭐
157
XSScope is one of the most powerful and advanced GUI Framework for Modern Browser exploitation via XSS.
Powershell Backdoor Generator
⭐
148
Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero and Hak5 USB Rubber Ducky, and changes its signature after every build for evasion.
Sordeal Stealer
⭐
146
[NEW] Discord token grabber, Grab Passwords/cookies/history/credit cards for all browsers/Antivirus/wifi Passwords/Anti Debug/Kill Discord/AntiUpdate/Add Startup/Fake Error/steal all Cord Tokens/Steal Wallet/address replacer,GUI builder,Discord Injection/steal passwords/credit card/paypal/antidelete/new login/logout/nitro autobuy
Redteam Physical Tools
⭐
129
Red Team Toolkit - A curated list of tools that are commonly used in the field for Physical Security, Red Teaming, and Tactical Covert Entry.
Dorkscanner
⭐
125
A typical search engine dork scanner scrapes search engines with dorks that you provide in order to find vulnerable URLs.
Steganographer
⭐
123
Steganograpy in Python | Hide files or data in Image Files
Recursos Hacking Etico
⭐
119
Recursos de hacking ético
Self Way
⭐
117
Built to learn ethical hacking on your own
Pentesting Framework
⭐
112
Pentesting Framework is a bundle of penetration testing tools, Includes - security, pentesting, hacking and many more.
Argus
⭐
111
Argus Advanced Remote & Local Keylogger For macOS and Windows
Xinsta_brute
⭐
102
Instagram Bruteforce Tool Super Fast Crack Auto/Manual Attack 10M Password List
Php Ransomware
⭐
97
PHP ransomware that encrypts your files, as well as file and directory names.
Cybersecurity And Pentesting Exam Resources
⭐
96
Top 5 ethical hacking books to get started? Top 5 practical hacking books? Top 5 cybersecurity books to get started? Did I miss any great books?
Petep
⭐
95
PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is a useful tool for performing penetration tests of applications with various application protocols. ⚡
Xsubfind3r
⭐
92
A command-line interface (CLI) based passive subdomain discovery utility. It is designed to efficiently identify known subdomains of given domains by tapping into a multitude of curated online passive sources.
Lazypariah
⭐
90
A tool for generating reverse shell payloads on the fly.
Vulnsearch
⭐
88
A deep look at some recon methodologies and web-application vulnerabilities of my interest where I will merge all my notes gathered from books, videos, articles and own experience with bug bounty hunting / web and network hacking
Hawkish Eyes
⭐
88
Ethical Hacking Tool | Powerfull Tokens Grabber / Stealer Discord, Steal: Browsers Passwords & Cookies, Window Info, Files Sniper, Wallet, Minecraft Account, Bypass Firewall & Antivirus, Discord Injection JS, Chromium Injection JS (Brave, Chrome, OperaGX, Opera, Vivaldi, Edge, yandex).
Xcrawl3r
⭐
79
A command-line interface (CLI) based utility to recursively crawl webpages. It is designed to systematically browse webpages' URLs and follow links to discover linked webpages' URLs.
Alhacking
⭐
78
Albanian Hacking Tool!! Tools to help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user discovery, Anonymous-sms, Webcam Hack • Powerful DDOS attack tool!! Operating System Requirements works on any of the following operating systems: • Android • Linux • Unix
Simple Async Port Scanner
⭐
77
A simple asynchronous TCP/IP Connect Port Scanner in Python 3
Unsafe_bank
⭐
77
Vulnerable Banking Suite
Ethical Hacking Notes
⭐
68
my notes
Archive
⭐
65
Hacking Methodology, Cheatsheats, Conceptual-Breakdowns
Keylogger
⭐
62
Windows OS keylogger with a hook mechanism (i.e. with a keyboard hook procedure).
D4rkxss
⭐
61
A list of useful payloads and Bypass for Web Application Security and Bug Bounty/CTF
Brutus
⭐
61
extensible exploitation framework shipped on a modular and multi-tasking architecture
Sshame
⭐
57
brute force SSH public-key authentication
Redherd Framework
⭐
54
RedHerd is a collaborative and serverless framework for orchestrating a geographically distributed group of assets.
Cybersecurity Dark Web
⭐
53
A collection of awesome software, libraries, learning tutorials, documents, books & technical resources and cool stuff about dark web.
Sqli Postgres Rce Privesc Hacking Playground
⭐
52
Application with SQL Injection vulnerability and possible privilege escalation. Free vulnerable app for ethical hacking / penetration testing training.
Evil Twin
⭐
52
Learn how to set up a fake authentication web page on a fake WiFi network.
Algorithm Ethics
⭐
50
A collection of resources and tools designed to provide guidelines for ethical modeling.
Hawkish Injection
⭐
49
Just a simple Ethical Hacking Tool | Contain: Tokens Grabber Discord, Browsers Passwords & Cookies Stealer, Discord Injection JS, Chrome Injection JS, Roblox Session Stealer, Window Info Stealer, Data Files Sniper, Wallet Stealer, Minecraft Account Stealer, Bypass Firewall & Antivirus.
Ddos Bomber
⭐
49
priyans0830m
Cybersec Books
⭐
47
Cyber Security Books
Google Acquisitions
⭐
47
Most of the Google Acquisitions for Bug Bounty Hunter.
Dnsexplorer
⭐
46
Bash script that automates the enumeration of domain, subdomains & web servers in the active information gathering.
Safe Harbour
⭐
46
security.txt collection of most popular world-wide domains
Fbhackver2.7
⭐
45
FACEBOOK HACKING TOOL
S3bucketlist
⭐
41
Chrome extension that lists Amazon S3 Buckets while browsing
Try Harder
⭐
41
"Try Harder" is a cybersecurity retro game designed to simulate 100 real-world scenarios that will help you prepare for the Offensive Security Certified Professional (OSCP) exam, all while offering an immersive experience and retro aesthetic. Enter Real commands correctly, move to the next host, and get a point. Can you get 100?
Vichiti
⭐
39
An OSINT focused tool made with Nodejs!
Sql Injection
⭐
38
SQL Injection / SQL инъекциа - Hacking and bypass
Webspoilt
⭐
38
This script will you help to find the information about the website and to help in penetrating testing
Hulk
⭐
38
hulk is a ddos attacking tool
Pentesting Resources
⭐
37
Resources, repos and scripts for pentesters and bug bounty.
Cybergym
⭐
37
Lucideus CyberGym is the internal CTF event we organise for our security professionals to grow and learn together. Now everyone can access the challenges that can be easily setup and start playing.
Elliot
⭐
37
A pentesting tool inspired by mr robot and derived by zphisher
Awesome Security
⭐
36
A collection of awesome ethical hacking and security related content!
Di.we.h
⭐
35
Repositório com conteúdo sobre web hacking em português
Java Reverse Tcp
⭐
34
JAR, Java, and JSP shells that work on Linux OS, macOS, and Windows OS.
Ethical Hacking Tools Python
⭐
34
Python programs & tools built in the Ethical Hacking with Python EBook
Ehtk
⭐
34
Ethical Hacking Toolkit is a collection of tools, cheat sheets, and resources for Ethical hackers, Penetration Tester, and Security Researchers etc. It contains almost all tools mentioned in CEH, OSCP, eCPPT and PNPT
Hack Utils
⭐
32
Script to facilitate different functions and checks
Dark Web Rust
⭐
32
A hands-on book for abusing systems using Rust (WIP) - Open Research
Brutus
⭐
30
Botnet targeting Windows machines written entirely in Python & open source security project.
Brutesniffing_fisher
⭐
29
hacking tool
Openoctober
⭐
27
Open-October contribution destination. The Contest has now ended.
1-100 of 206 search results
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.