This portfolio is suitable for the person who are interested in ethtical hacking. This project is created using HTML, CSS and JS. Easy to customize according to the preferences.
☆44Jul 31, 2024Updated last year
Alternatives and similar repositories for Ethical-Hacker-Portfolio-template
Users that are interested in Ethical-Hacker-Portfolio-template are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Elevate your cybersecurity profile with this streamlined portfolio template. Showcase exploits, projects, and skills succinctly. Perfect …☆18Dec 27, 2023Updated 2 years ago
- My first portfolio website project . Developed with html css and a little js was used☆11Mar 2, 2022Updated 4 years ago
- This repository contains resources to help learn programming in Go (Golang).☆33Updated this week
- This is a Personal Portfolio website that i created using HTML CSS and Js and it's fully responsive. The tutorial video will be availabal…☆10Jan 12, 2022Updated 4 years ago
- An ordinary website can make and use by everyone. so What is The difference between a Geek and common people?☆18Sep 24, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A tool to view the total transactions, received, sent, and current balance of Bitcoin wallets 👁☆21Aug 19, 2025Updated 8 months ago
- All Exploit List Made By Me☆17Apr 7, 2025Updated last year
- A domain recon tool to help detect DNS based vulnerabilities, such as zone transfers and subdomain takeovers.☆11Mar 25, 2022Updated 4 years ago
- ☆11Sep 15, 2024Updated last year
- Bash script that perform all the setup for BSPWM installation, including polybar, picom, pywal,nvchad, with multiple color schemes and a …☆39Jan 19, 2026Updated 3 months ago
- This repository contains Loadable Kernel Modules (LKM) and LD_PRELOAD-based modules designed for penetration testing, red teaming, and se…☆13Feb 15, 2025Updated last year
- This tools used for Automating finding of subdomain, and checking for alive subdomain, and gathering js files from all the subdomain and …☆22Jun 28, 2024Updated last year
- Recon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnais…☆16May 28, 2022Updated 3 years ago
- Wisper helps to maintain access to windows machine and have some other cool features like UAC Disable,Firewall Disable,Dumping Credential…☆15Apr 3, 2021Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Purple Team Strategies, Published by Packt☆16Apr 22, 2026Updated 2 weeks ago
- 'Property Sale'! 🏡 is a real estate website which Built on MERN stack with real-time chat functionality using Socket.io. A platform wher…☆16Aug 11, 2025Updated 8 months ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆17Aug 20, 2023Updated 2 years ago
- ☆12Jun 10, 2022Updated 3 years ago
- A comprehensive tool for categorizing TryHackMe rooms, including details such as difficulty, room type, subscription status, and much mor…☆27Dec 3, 2025Updated 5 months ago
- ☆45Mar 5, 2025Updated last year
- SQL Injection attack is the most common website hacking technique. Most websites use Structured Query Language (SQL) to interact with dat…☆12Jul 16, 2022Updated 3 years ago
- An lightweight and easy to use toolbox for hackers☆14Nov 17, 2022Updated 3 years ago
- ☆11Jan 2, 2022Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Proof-of-Concept for Authorization Bypass in Next.js Middleware☆19Mar 23, 2025Updated last year
- badUSB ek0ms style with integrated c2☆54Oct 23, 2025Updated 6 months ago
- Exploit systems using older WinRAR without knowing their username (unlike other projects)☆35Aug 17, 2025Updated 8 months ago
- Google dorks for SQL injection, Local File Inclusion, open CCTV cams and sensitive information.☆11Jul 6, 2018Updated 7 years ago
- ☆13Jan 2, 2022Updated 4 years ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆17May 19, 2024Updated last year
- HackerOne Notifier is an automated bot that monitors new programs launched on HackerOne and sends Telegram Bot notifications whenever a n…☆22Nov 4, 2025Updated 6 months ago
- EasY_HaCk☆12Apr 20, 2018Updated 8 years ago
- Credit, Debit and Prepaid cards for testing.☆15Apr 26, 2017Updated 9 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1☆20Mar 19, 2024Updated 2 years ago
- Skill de Pentesting para Android☆131Updated this week
- ☆11Jun 8, 2025Updated 11 months ago
- 🍭 Web Application Vulnerability Scanner 🍭☆16May 21, 2022Updated 3 years ago
- Easy & Advanced Websites Admin Panel URL Finder Python Script.☆14Oct 24, 2020Updated 5 years ago
- An Android application that detects phishing in incoming texts and alerts the user through notification in real time. The user may also e…☆19Feb 17, 2024Updated 2 years ago
- My gfPatterns☆15Aug 31, 2021Updated 4 years ago