makikvues / ethical-hackingLinks
Ethical hacking, CTF, tools & etc
☆21Updated 4 years ago
Alternatives and similar repositories for ethical-hacking
Users that are interested in ethical-hacking are comparing it to the libraries listed below
Sorting:
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆44Updated 4 years ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆68Updated 4 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 3 years ago
- OSCP guide and Red Team assessment Guide☆35Updated 5 years ago
- A python approach to interacting with web shells.☆30Updated 4 years ago
- ☆38Updated 2 years ago
- Creates and sends fake meeting invite☆71Updated 4 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 8 months ago
- A python3 script searching for secret on swaggerhub☆66Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆63Updated 3 years ago
- HackTricks Automatic Commands (HAC) is an enumeration platform powered by book.HackTricks.xyz☆22Updated 3 years ago
- A WLAN red team framework.☆156Updated last year
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
- Generate image payloads in JS to bypass filters☆39Updated 4 years ago
- [180+ scripts] There are a few genuine gems in there. And a lot of spaghetti code. Most of these scripts were for solving CTF's. If you …☆63Updated 2 years ago
- ☆74Updated last year
- A collection of commands, scripts, tips, tricks, and other information compiled during my journey to obtaining the OSCP certification.☆25Updated 4 years ago
- OWASP Foundation Web Respository☆36Updated 4 years ago
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆112Updated last year
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆130Updated 2 months ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆64Updated 5 years ago
- Super organized and flexible script for sending phishing campaigns☆55Updated 3 years ago
- Low Interaction Mobile Honeypot☆95Updated 3 months ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 3 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 4 years ago
- Automatically run and save ffuf scans for multiple IPs☆81Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆32Updated 3 years ago
- Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.☆24Updated 5 years ago
- Some random tools I use for penetration testing☆88Updated 6 months ago