Dec 28th @ in5 - Introduction to Ethical Hacking and Cyber Security. At this session, we went over the basics of cybersecurity and showed how you can protect yourself from some common attacks. Using Kali Linux as a platform, we isolated exploits and recreate some of the more common major attacks (eg; ‘Man-In-The-Middle’) using a variety of pen…
☆46Dec 29, 2019Updated 6 years ago
Alternatives and similar repositories for Intro-to-Ethical-Hacking
Users that are interested in Intro-to-Ethical-Hacking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Personal blog about cyber security and challenges☆20Mar 25, 2026Updated last month
- Linux Based 802.15.4/Zigbee Sniffer☆19Apr 7, 2014Updated 12 years ago
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆20Mar 12, 2025Updated last year
- CloudHound is a cloudflare bypass tool which is using several methods such as DNS history Checkup, Cross-Site port Attack and etc to dete …☆20Apr 19, 2023Updated 3 years ago
- Wi-Fi Machine-in-the-Middle: Automation of MitM Attack on Wi-Fi Networks☆60May 6, 2018Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- OSRFramework, the Open Sources Research Framework is a AGPLv3+ project by i3visio focused on providing API and tools to perform more accu…☆23Jun 12, 2021Updated 4 years ago
- A big list of IT Security / Cybersecurity Podcasts☆15May 31, 2023Updated 2 years ago
- You can use this tool To do pranks but don't use this tool to harm anyone. Using this tool carelessly will cause a lot of trouble like if…☆16Aug 8, 2021Updated 4 years ago
- Exploring Pegasus Spyware: A Deep Dive☆11Nov 25, 2023Updated 2 years ago
- This repository contains projects and activities that have been completed within the CyberSecurity Bootcamp.☆16May 24, 2022Updated 3 years ago
- A list of web application security☆15Dec 26, 2019Updated 6 years ago
- How to wire, flash and use an ESP8266 with the Flipper Zero☆15Jan 4, 2024Updated 2 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆26Jun 28, 2020Updated 5 years ago
- ☆10Feb 27, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A montage of ethical hacking based resources, please ensure you do not upload anything that violates copyright law☆12Nov 29, 2020Updated 5 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆18Sep 12, 2017Updated 8 years ago
- Sarahah XSS Explotiation Tool☆17Aug 19, 2017Updated 8 years ago
- Privacy Tools by CKTN☆25Aug 14, 2022Updated 3 years ago
- Code and notes regarding Malware Development☆11Oct 30, 2022Updated 3 years ago
- Eine Anleitung für den ESP32 Marauder auf Basis des CYD Display mit GPS,Akku & Externer Wlan Antenne.☆15Dec 4, 2025Updated 5 months ago
- The CyberSecurity Framework (CSF for short) is a local Python3 scripting package which aims directly on Cyber Security auditing, where yo…☆41Oct 28, 2017Updated 8 years ago
- Metasploit Exploiting Tool For Linux☆21Sep 27, 2021Updated 4 years ago
- SSH brute-force script created for HackTheBox☆16Mar 26, 2020Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆17Apr 12, 2024Updated 2 years ago
- This is a guide for Penetration Testers how to use Penetration Testing tools and their advanced used. Need everyone's help to make it bat…☆50Feb 19, 2021Updated 5 years ago
- An Open Source All InOne Telegram Bot☆11Jul 5, 2019Updated 6 years ago
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- Maltego compilation of various assets, local transforms and helpful scripts☆155Aug 15, 2018Updated 7 years ago
- A list to discover work of red team tooling and methodology for penetration testing and security assessment☆76Mar 8, 2019Updated 7 years ago
- Self study files based on "What every computer science major should know" from matt.might.net☆18Dec 10, 2016Updated 9 years ago
- Transform a Xiaomi Zigbee gadget into a Zigbee sniffer.☆40Nov 23, 2025Updated 5 months ago
- A collection of awesome penetration testing resources, tools and other shiny things☆13May 18, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Mossaique: It's your design mosaic. Curated design resources for designers and developers.☆27Updated this week
- NTLM Hash Generator☆10Apr 2, 2021Updated 5 years ago
- A copy of articles published at Peerlyst☆43Oct 30, 2016Updated 9 years ago
- Open Standard Vulnerability & Compliance Scanner☆46Oct 15, 2015Updated 10 years ago
- Simple chatbot using Node.JS & Express Framework☆14Jan 16, 2018Updated 8 years ago
- Smart pentesting toolkit for modern WPA/WPA2 networks ⚔️📡☆28Jun 19, 2020Updated 5 years ago
- This is Flipper Zero's 4IN1 board (esp32&cc1101&L80-r&nrf24)☆25Oct 8, 2025Updated 7 months ago