makikvues / ethical-hackingLinks
Ethical hacking, CTF, tools & etc
☆22Updated 4 years ago
Alternatives and similar repositories for ethical-hacking
Users that are interested in ethical-hacking are comparing it to the libraries listed below
Sorting:
- CLI & library to search for default credentials among thousands of Products / Vendors☆67Updated 4 years ago
- Rodan Exploitation Framework☆100Updated 3 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆43Updated 4 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 2 years ago
- Pentest stuff☆49Updated last year
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆64Updated 5 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 4 years ago
- A WLAN red team framework.☆157Updated 10 months ago
- MITMsmtp is an Evil SMTP Server for pentesting SMTP clients to catch login credentials and mails sent over plain or SSL encrypted connect…☆44Updated last year
- A collection of commands, scripts, tips, tricks, and other information compiled during my journey to obtaining the OSCP certification.☆23Updated 4 years ago
- OSWE Preparation☆37Updated 6 years ago
- Generate image payloads in JS to bypass filters☆40Updated 4 years ago
- ScanMan is the amalgamation of Masscan, Metasploit Framework (MSF) and Nmap Scripting Engine (NSE).☆53Updated 2 months ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 6 months ago
- OSCP guide and Red Team assessment Guide☆35Updated 5 years ago
- Upload files done during my research.☆164Updated 3 months ago
- fsp - Firestore Database Vulnerability Scanner Using APKs☆64Updated 4 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆130Updated 4 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Updated last year
- Automatically run and save ffuf scans for multiple IPs☆79Updated last year
- Custom pentesting tools☆25Updated 4 years ago
- Collection Of Reverse Shell that can easily generate using Python3☆60Updated last year
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆109Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆27Updated 7 years ago
- ☆38Updated last year
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated last year
- ☆74Updated last year
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆110Updated last year
- ☆104Updated 5 years ago