makikvues / ethical-hackingLinks
Ethical hacking, CTF, tools & etc
☆22Updated 4 years ago
Alternatives and similar repositories for ethical-hacking
Users that are interested in ethical-hacking are comparing it to the libraries listed below
Sorting:
- A WLAN red team framework.☆155Updated last year
 - CLI & library to search for default credentials among thousands of Products / Vendors☆68Updated 4 years ago
 - ScanMan is the amalgamation of Masscan, Metasploit Framework (MSF) and Nmap Scripting Engine (NSE).☆52Updated 5 months ago
 - A collection of commands, scripts, tips, tricks, and other information compiled during my journey to obtaining the OSCP certification.☆25Updated 4 years ago
 - ☆74Updated last year
 - Scan Google Maps Api Keys and see which services you can use. Original codebase from ozguralp/gmapsapiscanner☆24Updated 3 years ago
 - This project is aimed at freely providing technical guides on various hacking tools.☆119Updated last year
 - A python3 script searching for secret on swaggerhub☆66Updated 3 years ago
 - OSWE Preparation☆37Updated 6 years ago
 - [180+ scripts] There are a few genuine gems in there. And a lot of spaghetti code. Most of these scripts were for solving CTF's. If you …☆63Updated 2 years ago
 - Upload files done during my research.☆166Updated 6 months ago
 - Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆63Updated 3 years ago
 - Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 3 years ago
 - HackTricks Automatic Commands (HAC) is an enumeration platform powered by book.HackTricks.xyz☆22Updated 4 years ago
 - Collection Of Reverse Shell that can easily generate using Python3☆60Updated last year
 - The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆59Updated 5 years ago
 - Search for Unix binaries that can be exploited to bypass system security restrictions.☆131Updated 2 months ago
 - Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆44Updated 4 years ago
 - 🐑 Websheep is an app based on a willingly vulnerable ReSTful APIs.☆59Updated last year
 - Tool to generate csrf payloads based on vulnerable requests☆64Updated 5 years ago
 - Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
 - This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆27Updated 7 years ago
 - The largest collection of wordlists in yaml for bug bounty tools☆37Updated last year
 - Multi-threaded URL enumeration/content-discovery tool in Python.☆107Updated last year
 - Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆38Updated last week
 - Pentest stuff☆49Updated last year
 - ☆37Updated 2 years ago
 - DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆121Updated 3 years ago
 - Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pent…☆96Updated 4 years ago
 - Enumeration & fingerprint tool☆24Updated last year