Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for penetration testing ethical hacking
ethical-hacking
x
penetration-testing
x
66 search results found
H4cker
⭐
15,693
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artificial intelligence security, vulnerability research, exploit development, reverse engineering, and more.
Babysploit
⭐
996
👶 BabySploit Beginner Pentesting Toolkit/Framework Written in Python 🐍
Capsulecorp Pentest
⭐
754
Vagrant VirtualBox environment for conducting an internal network penetration test
Penetration Testing Cheat Sheet
⭐
540
Work in progress...
Crlfsuite
⭐
499
The most powerful CRLF injection (HTTP Response Splitting) scanner.
Xurlfind3r
⭐
485
A command-line interface (CLI) based passive URLs discovery utility. It is designed to efficiently identify known URLs of given domains by tapping into a multitude of curated online passive sources.
Bug Bounty Methodology
⭐
438
These are my checklists which I use during my hunting.
Rekono
⭐
385
Pentesting automation platform that combines hacking tools to complete assessments
Php Reverse Shell
⭐
363
PHP shells that work on Linux OS, macOS, and Windows OS.
Android Penetration Testing Cheat Sheet
⭐
304
Work in progress...
Invoker
⭐
292
Penetration testing utility and antivirus assessment tool.
Nebula
⭐
291
AI-Powered Ethical Hacking Assistant
Wifi Penetration Testing Cheat Sheet
⭐
277
Work in progress...
Powershell Reverse Tcp
⭐
263
PowerShell scripts for communicating with a remote host.
Hrshell
⭐
242
HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Ios Penetration Testing Cheat Sheet
⭐
241
Work in progress...
Forbidden
⭐
208
Bypass 4xx HTTP response status codes and more. Based on PycURL and Python Requests.
Handbook
⭐
196
A living document for penetration testing and offensive security.
Arp Spoofer
⭐
169
A pure-Python ARP Cache Poisoning (a.k.a "ARP Spoofing") tool
Cbrutekrag
⭐
158
Penetration tests on SSH servers using brute force or dictionary attacks. Written in C.
Redteam Physical Tools
⭐
129
Red Team Toolkit - A curated list of tools that are commonly used in the field for Physical Security, Red Teaming, and Tactical Covert Entry.
Argus
⭐
111
Argus Advanced Remote & Local Keylogger For macOS and Windows
Cybersecurity And Pentesting Exam Resources
⭐
96
Top 5 ethical hacking books to get started? Top 5 practical hacking books? Top 5 cybersecurity books to get started? Did I miss any great books?
Petep
⭐
95
PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is a useful tool for performing penetration tests of applications with various application protocols. ⚡
Xsubfind3r
⭐
92
A command-line interface (CLI) based passive subdomain discovery utility. It is designed to efficiently identify known subdomains of given domains by tapping into a multitude of curated online passive sources.
Lazypariah
⭐
90
A tool for generating reverse shell payloads on the fly.
Xcrawl3r
⭐
79
A command-line interface (CLI) based utility to recursively crawl webpages. It is designed to systematically browse webpages' URLs and follow links to discover linked webpages' URLs.
Ethical Hacking Notes
⭐
68
my notes
Brutus
⭐
61
extensible exploitation framework shipped on a modular and multi-tasking architecture
Sshame
⭐
57
brute force SSH public-key authentication
Redherd Framework
⭐
54
RedHerd is a collaborative and serverless framework for orchestrating a geographically distributed group of assets.
Cybersecurity Dark Web
⭐
53
A collection of awesome software, libraries, learning tutorials, documents, books & technical resources and cool stuff about dark web.
Sqli Postgres Rce Privesc Hacking Playground
⭐
52
Application with SQL Injection vulnerability and possible privilege escalation. Free vulnerable app for ethical hacking / penetration testing training.
Google Acquisitions
⭐
47
Most of the Google Acquisitions for Bug Bounty Hunter.
Dnsexplorer
⭐
46
Bash script that automates the enumeration of domain, subdomains & web servers in the active information gathering.
Webspoilt
⭐
38
This script will you help to find the information about the website and to help in penetrating testing
Sql Injection
⭐
38
SQL Injection / SQL инъекциа - Hacking and bypass
Elliot
⭐
37
A pentesting tool inspired by mr robot and derived by zphisher
Cybergym
⭐
37
Lucideus CyberGym is the internal CTF event we organise for our security professionals to grow and learn together. Now everyone can access the challenges that can be easily setup and start playing.
Pentesting Resources
⭐
37
Resources, repos and scripts for pentesters and bug bounty.
Awesome Security
⭐
36
A collection of awesome ethical hacking and security related content!
Java Reverse Tcp
⭐
34
JAR, Java, and JSP shells that work on Linux OS, macOS, and Windows OS.
Brutus
⭐
30
Botnet targeting Windows machines written entirely in Python & open source security project.
Ssh Default Banners
⭐
27
Nmap NSE script to identify Debian, Ubuntu, FreeBSD version based on default SSH banner response. Intended for Penentration Testing, OSCP/PWK, HackTheBox (HTB), TryHackMe, RootMe
Ctf Wr1t3ups
⭐
27
Repository to store summaries of CTF challenges
Xss Catcher
⭐
26
Simple API for storing all incoming XSS requests.
Wordlist Generator
⭐
24
Generate customised wordlist for penetration testing practice (e.g. brute force attack, dictionary attack, etc.)
Tsuki Sploit
⭐
24
A USB-based script for Ethical hacking with multiple attacks
Hackipy
⭐
22
Hacking, pen-testing, and cyber-security related tools built with Python.
Brutekrag
⭐
21
Penetration tests on SSH servers using brute force or dictionary attacks. Written in Python.
Kali Linux Dockerfile
⭐
20
A simple Dockerfile to build an image starting from the latest official one of Kali Linux and including some useful tools.
Secure Website
⭐
19
Secure website with a registration, sign in, session management, and CRUD controls.
Dns Exfiltrator
⭐
19
Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.
Python For Ethical Hacking
⭐
17
Build tools for hacking ethically using python.
Chad
⭐
17
Search Google Dorks like Chad. / Social media takeover tool.
Pentest
⭐
13
Pentesting Notes, Cheetsheets and Guide
Archer
⭐
13
A tool to check for response status codes with ease
Pointer
⭐
11
Pointer is a Fast Simple Lightweight Tool for Endpoint Discovery.
The Not So Simple Php Command Shell
⭐
11
This tool is intended to be used for on target enumeration to gather and exfiltrate information and then to upload tools such as netcat or msvenom payload for further access to the target.
Pentesting
⭐
11
Cyber Security
Beginners Guide To Ethical Hacking
⭐
10
For beginners which zero knowledge on ethical hacking!
Multitool
⭐
10
Simple Penetration Testing Multitool For Beginners.
Catchtheflag Mern
⭐
10
CTF game made using M(MySQL)ERN stack. Application has admin menu for adding more levels. So game can remain updated with modern technologies
Jwt Bf
⭐
10
Brute force a JWT token. Script uses multithreading.
Selene
⭐
10
Séléné is a database dumper written in python3. Usefull during pentesting and CTFs.
Ctf
⭐
10
🎏 ⚑ We put the "ethical" in "ethical hacking." ⚑
Wordlist Extender
⭐
9
Extend wordlist by appending digits and special characters to each word.
Ethical Hacking
⭐
9
Codes for malware, viruses and key-logger and other tools
Infosec Tips
⭐
9
Infosec writeups, Bug bounty tips, Tweets & Many more that are picked from around the world || I personally use it || I try to mend it daily. So, stay tuned and learn something
Fuzzout
⭐
9
Every Hacker's Go to Fuzzing List. Introducing the Ultimate Fuzzing Directory: Your Go-To Resource for Penetration Testers and Bug Bounty Hunters! Unlock the power of comprehensive fuzzing with our meticulously curated Fuzzing Directory, a one-stop solution designed to streamline your penetration testing and bug bounty hunting endeavors.
Cehv10studyguideplusplus
⭐
9
📓 CEHv10 Study Guide++
Domain Extractor
⭐
8
Extract valid or partially valid domain names and IPs from malicious or invalid URLs.
Ffind
⭐
7
A tool to find files of interest on a compromised host during a penetration test
Syn File
⭐
7
Exfiltrate data from a compromised target using covert channels
X_insta
⭐
7
X_INSTA Powerful INSTAGRAM Password Brute Force Tool For Windows
File Shredder
⭐
7
PowerShell script for shredding files.
Dnsrecon Chunked
⭐
6
Brute force subdomains in multiple smaller iterations. Based on DNSRecon.
Ghci 2019
⭐
6
:neckbeard: This repository contains slides and notes from my workshop at the Grace Hopper Conference, India (2019).
Ethical Hacking And Penetration Testing
⭐
6
:neckbeard: This repository contains slides and notes from my workshop at the Grace Hopper Conference, India (2019).
Amounts
⭐
6
Generate a wordlist to fuzz amounts or any other numerical values.
Cross Site Scripting
⭐
5
🐞 Understand how cross-site scripting occurs, how to detect and exploit XSS vulnerabilities, giving you control of other visitor's browsers.
Ethical Hacking Study
⭐
5
Ethical Hacking - Useful Resources
Nagooglesearch
⭐
5
Not another Google searching tool.
Fsociety
⭐
5
fsociety is a penetration toolkit inspired from MR. ROBOT
Zero To Oscp
⭐
5
A quick guide to help total beginners find a path to becoming a penetration tester.
Ad
⭐
5
Microsoft Windows Active Directory
Related Searches
Python Penetration Testing (1,380)
Security Penetration Testing (767)
Shell Penetration Testing (451)
Scanner Penetration Testing (373)
Exploitation Penetration Testing (348)
Penetration Testing Pentest Tool (344)
Penetration Testing Security Tools (319)
Penetration Testing Hacking Tool (275)
Penetration Testing Information Security (261)
Vulnerabilities Penetration Testing (230)
1-66 of 66 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.