More Advanced and Powerful Scripts made for pen-testing. Here there are Vulnerability Scanners, ARP-Poisoners, Botnets, Phishing Scripts, DDoS scripts, Keylogging Scripts and Worms. These were made for educational purposes only and should not be used in a real attack. I have created vulnerable servers for you to be able to hack or attack on.
☆66Feb 15, 2023Updated 3 years ago
Alternatives and similar repositories for Ethical-Hacking-Scripts
Users that are interested in Ethical-Hacking-Scripts are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python 3 demo of Command and Control (C&C) bot☆12May 3, 2020Updated 5 years ago
- Hybrid Botnet over TOR targeting Linux machines☆11Aug 1, 2021Updated 4 years ago
- Repository for security-related Python scripts.☆209Dec 27, 2022Updated 3 years ago
- All docker botnets acrued since early 2018 .... as of 2025 there is a stall in actors...tbd if updates beyond JAN 2025 will continue.☆20Jan 11, 2025Updated last year
- Powerfull DDOS Panel with advanced bypass methods.☆38Mar 29, 2021Updated 4 years ago
- These are all the python tools and scripts I have crafted so far. I will be updating the repo as I code more or if any update needs to be…☆14Jan 8, 2024Updated 2 years ago
- MIRAI botnet in python3☆20Jun 18, 2019Updated 6 years ago
- One of the most powerful DDoS Tool on the planet, Highly Interactive and User friendly to use. Based on Golang/Python HULK DoS. Now with …☆145Nov 4, 2022Updated 3 years ago
- ☆13Jul 29, 2024Updated last year
- I know! Word in the DDoS community this Mortem botnet isn't as scary as it seems. You feel more powerful as you scroll around the methods…☆52Mar 17, 2023Updated 3 years ago
- python projects for ethical hacking and the students to learn python for cyper security (<_>)☆83Nov 12, 2023Updated 2 years ago
- The Open Tor Botnet (ZIB)☆33Aug 14, 2015Updated 10 years ago
- BotNet Scanner For Educational Purposes.☆19Mar 7, 2020Updated 6 years ago
- enemy SSH Telnet IoT botnet☆61Apr 28, 2022Updated 3 years ago
- This is most dangerous botnet. No Spread needed. botnet infecting cctv,dvr etc.☆34Oct 6, 2016Updated 9 years ago
- Source code for the Mirai botnet - Not going anywhere anytime soon☆55Oct 22, 2016Updated 9 years ago
- ☆10Jun 15, 2024Updated last year
- Multi-threaded port scanner written in C++☆14Dec 17, 2019Updated 6 years ago
- Argument injection vulnerability in PHP☆13Jun 15, 2024Updated last year
- A tcp botnet written in golang☆104May 14, 2019Updated 6 years ago
- Cve and Exploit Finder on the target☆28May 8, 2022Updated 3 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆26Dec 14, 2016Updated 9 years ago
- Setup mirai botnet. Only for educational purpose!☆112Jul 3, 2024Updated last year
- This is a templated to be used for QRL Jacking Sessions (Tested on Chrome,brave & firefox )☆13Feb 26, 2022Updated 4 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆49Nov 10, 2025Updated 4 months ago
- NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. I have created this repository to make the access for study as easy…☆24Mar 27, 2017Updated 8 years ago
- Project Hackdroid : 250+ Pentesting Apps For Android☆18Nov 25, 2021Updated 4 years ago
- Red Teaming Tactics and Techniques☆13Feb 10, 2022Updated 4 years ago
- HTTP-BROWSER layer 7 attack method bypassing Cloudflare JS Challenges and HTTP-DDOS ruleset.☆11Jan 30, 2024Updated 2 years ago
- Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploit☆18Jun 3, 2024Updated last year
- ☆13Sep 15, 2024Updated last year
- The best telnet bruter for the moment, please use it for educational purpose☆26Apr 28, 2025Updated 10 months ago
- A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)☆56Mar 1, 2024Updated 2 years ago
- KratosKnife is a Advanced BOTNET Written in python 3 for Windows OS. Comes With Lot of Advanced Features such as Persistence & VM Detecti…☆358Jul 15, 2023Updated 2 years ago
- Notes From Doing The 3CX Basic Certification☆14May 6, 2022Updated 3 years ago
- Metasploit Logos that use Z for the new zArch additions☆10Feb 9, 2016Updated 10 years ago
- My payloads for attacks utilizing a rubber ducky, teensy, and digistump☆26Dec 19, 2020Updated 5 years ago
- Python script to generate a malicious MP4 file exploiting the 'stsc' vulnerability (CVE-2015-1538-1 - Google Stagefright ‘stsc’ MP4 Atom …☆21Dec 8, 2015Updated 10 years ago
- This is the cookie management repo for implementing IAB/GDPR compliant cookie management functions☆10Feb 28, 2026Updated 3 weeks ago