makikvues / ethical-hackingLinks
Ethical hacking, CTF, tools & etc
☆22Updated 4 years ago
Alternatives and similar repositories for ethical-hacking
Users that are interested in ethical-hacking are comparing it to the libraries listed below
Sorting:
- CLI & library to search for default credentials among thousands of Products / Vendors☆68Updated 4 years ago
- ☆74Updated last year
- A python3 script searching for secret on swaggerhub☆66Updated 3 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆44Updated 4 years ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆27Updated 7 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 3 years ago
- A WLAN red team framework.☆155Updated last year
- ScanMan is the amalgamation of Masscan, Metasploit Framework (MSF) and Nmap Scripting Engine (NSE).☆52Updated 6 months ago
- HackTricks Automatic Commands (HAC) is an enumeration platform powered by book.HackTricks.xyz☆21Updated 4 years ago
- fsp - Firestore Database Vulnerability Scanner Using APKs☆63Updated 4 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆121Updated last year
- Upload files done during my research.☆166Updated 7 months ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 10 months ago
- The largest collection of wordlists in yaml for bug bounty tools☆37Updated last year
- ☆57Updated 3 years ago
- Mobile Application Vulnerability Scanner☆25Updated 8 months ago
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆38Updated 3 weeks ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆29Updated 3 years ago
- Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pent…☆96Updated 4 years ago
- Pentest stuff☆49Updated last year
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆131Updated 3 months ago
- ☆27Updated 5 years ago
- ☆54Updated last year
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆63Updated 3 years ago
- Repository of CVE found by OCD people☆82Updated 5 months ago
- Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.☆24Updated 5 years ago
- Kraker is a distributed password brute-force system that focused on easy use.☆82Updated 5 months ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- Most common AWS S3 bucket names.☆27Updated 5 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago