Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

Projects in Awesome Lists tagged with ethical-hacking

A curated list of projects in awesome lists tagged with ethical-hacking .

https://github.com/farhanashrafdev/90DaysOfCyberSecurity

This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks, covering topics such as Network+, Security+, Linux, Python, Traffic Analysis, Git, ELK, AWS, Azure, and Hacking. The repository also includes a `LEARN.md

communityexchange cybersecurity ethical-hacking hacktoberfest learn

Last synced: 09 Dec 2024

https://github.com/eonraider/blackhat-python3

Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.

blackhat-python blackhat-python-source-code cybersecurity ethical-hacking hacking-tools network-programming network-security python-hacking

Last synced: 19 Dec 2024

https://github.com/EONRaider/blackhat-python3

Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.

blackhat-python blackhat-python-source-code cybersecurity ethical-hacking hacking-tools network-programming network-security python-hacking

Last synced: 08 Nov 2024

https://github.com/isanchop/stuhack

Chrome extension for studocu premium free

chrome-extension ethical-hacking freemarker studocu

Last synced: 15 Dec 2024

https://github.com/xalgord/massive-web-application-penetration-testing-bug-bounty-notes

A comprehensive guide for web application penetration testing and bug bounty hunting, covering methodologies, tools, and resources for identifying and exploiting vulnerabilities.

bug-bounty bugbounty bugbountytips collection ethical-hacking hacking owasp owasp-top-10 resources xalgord

Last synced: 29 Nov 2024

https://github.com/xalgord/Massive-Web-Application-Penetration-Testing-Bug-Bounty-Notes

A comprehensive guide for web application penetration testing and bug bounty hunting, covering methodologies, tools, and resources for identifying and exploiting vulnerabilities.

bug-bounty bugbounty bugbountytips collection ethical-hacking hacking owasp owasp-top-10 resources xalgord

Last synced: 21 Nov 2024

https://github.com/m4cs/babysploit

:baby: BabySploit Beginner Pentesting Toolkit/Framework Written in Python :snake:

beginner beginner-friendly ethical-hacking kali penetration-testing penetration-testing-framework pentest-tool pentesting python3 toolkit tools

Last synced: 21 Dec 2024

https://github.com/M4cs/BabySploit

:baby: BabySploit Beginner Pentesting Toolkit/Framework Written in Python :snake:

beginner beginner-friendly ethical-hacking kali penetration-testing penetration-testing-framework pentest-tool pentesting python3 toolkit tools

Last synced: 28 Oct 2024

https://github.com/eonraider/violent-python3

Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.

cybersecurity ethical-hacking hacking-tools network-programming network-security python-hacking violent-python violent-python-source-code

Last synced: 18 Dec 2024

https://github.com/EONRaider/violent-python3

Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.

cybersecurity ethical-hacking hacking-tools network-programming network-security python-hacking violent-python violent-python-source-code

Last synced: 31 Oct 2024

https://github.com/r3dy/capsulecorp-pentest

Vagrant VirtualBox environment for conducting an internal network penetration test

ansible ethical-hacking hacking penetration-testing pentest pentesting vagrant

Last synced: 16 Dec 2024

https://github.com/R3dy/capsulecorp-pentest

Vagrant VirtualBox environment for conducting an internal network penetration test

ansible ethical-hacking hacking penetration-testing pentest pentesting vagrant

Last synced: 25 Oct 2024

https://github.com/eonraider/packet-sniffer

A Network Packet Sniffing tool developed in Python 3.

ethical-hacking network-programming packet-sniffer pentesting-tools tcp-ip

Last synced: 19 Dec 2024

https://github.com/EONRaider/Packet-Sniffer

A Network Packet Sniffing tool developed in Python 3.

ethical-hacking network-programming packet-sniffer pentesting-tools tcp-ip

Last synced: 09 Nov 2024

https://github.com/maid233/pybitcracker

PyBitCracker Python-Bitcoin-Cracker BTC-Private-Key Crypto-Wallet-Recovery Bitcoin-Password-Cracker Blockchain-Security BTC-Recovery-Tool Python-Crypto-Tool Wallet-Security Cryptocurrency-Tool BTC-Cracking

bitcoin-password-cracker bitcoin-tool blockchain-security blockchain-tool btc-cracking btc-key-recovery btc-private-key btc-recovery-tool crypto-recovery crypto-wallet-recovery cryptocurrency-tool cybersecurity digital-wallet-cracker ethical-hacking private-key-tool pybitcracker python-bitcoin-cracker python-crypto-tool python-wallet-tool wallet-security

Last synced: 15 Nov 2024

https://github.com/hueristiq/xurlfind3r

A command-line interface (CLI) based passive URLs discovery utility. It is designed to efficiently identify known URLs of given domains by tapping into a multitude of curated online passive sources.

bug-bounty bug-bounty-tools contentdiscovery ethical-hacking ethical-hacking-tools go golang osint osint-tools penetration-testing penetration-testing-tools reconnaissance red-teaming red-teaming-tools web-security

Last synced: 21 Dec 2024

https://github.com/emilyanncr/Windows-Post-Exploitation

Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!

command-line ethical-hacking exploiting-windows hacking hacking-tool post-exploitation

Last synced: 01 Nov 2024

https://github.com/drew-alleman/powershell-backdoor-generator

Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero and Hak5 USB Rubber Ducky, and changes its signature after every build to help avoid AV.

backdoor bad-usb ethical-hacking flipper-zero hacking hak5 hak5-ducky hak5-rubber-ducky obfuscation powershell powershell-backdoor powershell-hacking python python-hacking reverse-backdoor windows

Last synced: 16 Dec 2024

https://github.com/sdushantha/dora

Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found

apikeys bugbounty bugcrowd ethical-hacking exploits hackerone infosec python regex

Last synced: 16 Dec 2024

https://github.com/eonraider/arp-spoofer

A pure-Python ARP Cache Poisoning (a.k.a "ARP Spoofing") tool

arp-poisoning arp-spoofing ethical-hacking network-programming penetration-testing

Last synced: 18 Dec 2024

https://github.com/kleiton0x00/xsscope

XSScope is one of the most powerful and advanced GUI Framework for Modern Browser exploitation via XSS.

bug-hunting cybersecurity ethical-hacking xss

Last synced: 14 Nov 2024

https://github.com/BullsEye0/ghost_eye

Ghost Eye Informationgathering Footprinting Scanner and Recon Tool Release. Ghost Eye is an Information Gathering Tool I made in python 3. To run Ghost Eye, it only needs a domain or ip. Ghost Eye can work with any Linux distros if they support Python 3. Author: Jolanda de Koff

clickjacking-vulnerability cms-detector cookie-scraper cybersecurity dns-lookup etherape ethical-hacking gathering information-gathering informationgathering link-grabber location-finder nmap python3 whois-lookup

Last synced: 14 Nov 2024

https://github.com/madhavmehndiratta/dorkScanner

A typical search engine dork scanner scrapes search engines with dorks that you provide in order to find vulnerable URLs.

bing-dorking dork-scanner ethical-hacking google-dorking google-dorks hacking-tools kali-linux search-engines security vulnerability-scanner

Last synced: 21 Nov 2024

https://github.com/thatstraw/PwnLnX

An advanced multi-threaded, multi-client python reverse shell for hacking linux systems. There's still more work to do so feel free to help out with the development. Disclaimer: This reverse shell should only be used in the lawful, remote administration of authorized systems. Accessing a computer network without authorization or permission is illegal.

ethical ethical-hacking hacking levelivsec linux metasploit noobsec pwnlnx python3 reverse-shell shell-scripting shellscripting socket tqdm windows

Last synced: 10 Sep 2024

https://github.com/dfw1n/dfw1n-osint

Australian Open Source Intelligence Gathering Resources, Australias Largest Open Source Intelligence Repository for Cyber Professionals and Ethical Hackers

australia cryptography cybersecurity darkweb-data ethical-hacking forensics intelligence intelligence-search-service investigator opensource osint osint-framework osint-reconnaissance osint-resources penetration-testing-tools police redteaming social-media social-network

Last synced: 25 Nov 2024

https://github.com/aw-junaid/hacking-tools

This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.

algorithms artificial-intelligence bugbounty cryptography cyber-threat-intelligence cybersecurity-projects ethical-hacking hacking-tools malware nessus network-monitoring network-security nmap portscanner python pythonprojects threat-intelligence virus-scanning

Last synced: 18 Dec 2024

https://github.com/r0x4r/d4rkxss

A list of useful payloads and Bypass for Web Application Security and Bug Bounty/CTF

bugbounty bughunter bughunting ethical-hacking hacking javascript xss-exploitation xss-filter xss-vulnerability

Last synced: 20 Dec 2024

https://github.com/R0X4R/D4rkXSS

A list of useful payloads and Bypass for Web Application Security and Bug Bounty/CTF

bugbounty bughunter bughunting ethical-hacking hacking javascript xss-exploitation xss-filter xss-vulnerability

Last synced: 21 Nov 2024

https://github.com/ANK1036Official/Git_Pentesting_Toolkit

Exploit pack for pentesters and ethical hackers.

ethical-hacking pentesting tools

Last synced: 21 Nov 2024

https://github.com/ank1036official/git_pentesting_toolkit

Exploit pack for pentesters and ethical hackers.

ethical-hacking pentesting tools

Last synced: 11 Nov 2024

https://github.com/ivan-sincek/php-ransomware

PHP ransomware that encrypts your files, as well as file and directory names.

defensive-security ethical-hacking malware offensive-security openssl php ransomware reverse-engineering security

Last synced: 01 Nov 2024

https://github.com/hueristiq/xsubfind3r

A command-line utility designed to discover subdomains for a given domain in a simple, efficient way. It works by gathering information from a variety of passive sources, meaning it doesn't interact directly with the target but instead gathers data that is already publicly available.

asset-discovery bug-bounty bug-bounty-tools docker docker-image ethical-hacking ethical-hacking-tools go golang osint osint-tools penetration-testing penetration-testing-tools reconnaissance red-team-tools red-teaming subdomain-discovery subdomain-enumeration

Last synced: 16 Dec 2024

https://github.com/abdulkadir-gungor/HtmlSmuggling

HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web page. The malicious script decodes and deploys the payload on the targeted device when the victim opens/clicks the HTML attachment/link. The HTML smuggling technique leverages legitimate HTML5 and JavaScript features to hide malicious payloads and evade security detections. The HTML smuggling method is highly evasive. It could bypass standard perimeter security controls like web proxies and email gateways, which only check for suspicious attachments like EXE, DLL, ZIP, RAR, DOCX or PDF

abdulkadir abdulkadir-gungor cyber-security cybersecurity ethical-hacking ethical-hacking-tools evasive-loader evasive-loader-technique evasive-maneuvers gungor html html-smuggling htmlsmuggling javascript malware-research

Last synced: 01 Nov 2024

https://github.com/hueristiq/xcrawl3r

A command-line interface (CLI) based utility to recursively crawl webpages. It is designed to systematically browse webpages' URLs and follow links to discover linked webpages' URLs.

bug-bounty bug-bounty-tools contentdiscovery crawler ethical-hacking ethical-hacking-tools go golang penetration-testing penetration-testing-tools reconnaissance red-teaming red-teaming-tools web-security

Last synced: 17 Dec 2024

https://github.com/dub-flow/secure-code-review-challenges

This repo contains the code for my secure code review challenges

appsec bug-hunting ethical-hacking

Last synced: 18 Dec 2024

https://github.com/dub-flow/subsnipe

SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.

bugbounty ethical-hacking penetration-testing

Last synced: 18 Dec 2024

https://github.com/redherd-project/redherd-framework

RedHerd is a collaborative and serverless framework for orchestrating a geographically distributed group of assets.

adversarial-simulation cyberspace-operations ethical-hacking orchestration penetration-testing red-teaming

Last synced: 28 Oct 2024

https://github.com/themarkib/google-acquisitions

Most of the Google Acquisitions for Bug Bounty Hunter.

bugbounty ethical-hacking googlevrp penetration-testing

Last synced: 13 Dec 2024

https://github.com/atorrescogollo/offensive-tor-toolkit

Bind/Reverse Shells, SOCKS, etc over Tor in Golang

bind-shell ethical-hacking hidden-services reverse-shell socks5 tor

Last synced: 02 Nov 2024

https://github.com/berylliumsec/neutron

AI Powered Terminal Based Ethical Hacking Assistant

ai ethical-hacking ethical-hacking-tools kali-tools nmap penetration-testing pentesting-tools

Last synced: 26 Sep 2024

https://github.com/hawkish-team/hawkish-injection

Just a simple Ethical Hacking Tool | Contain: Tokens Grabber Discord, Browsers Passwords & Cookies Stealer, Discord Injection JS, Chrome Injection JS, Roblox Session Stealer, Window Info Stealer, Data Files Sniper, Wallet Stealer, Minecraft Account Stealer, Bypass Firewall & Antivirus.

discord discord-injection discord-token discord-token-grabber discord-token-logger ethical-hacking

Last synced: 10 Nov 2024

https://github.com/jaykali/pentest-handbook

This is a guide for Penetration Testers how to use Penetration Testing tools and their advanced used. Need everyone's help to make it batter. Please send Pool Request to keep this updated for the community.

command-line-tool ethical-hacking hacking hacking-tool hacking-tools hacktoberfest hacktoberfest-accepted linuxcommand notes penetration-testing pentest-tool pentesting

Last synced: 16 Nov 2024