Ethical hacking, CTF, tools & etc
☆22Feb 13, 2021Updated 5 years ago
Alternatives and similar repositories for ethical-hacking
Users that are interested in ethical-hacking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Magicleaks it's a python script that checks if an email or a list of email accounts was compromised☆72Dec 1, 2021Updated 4 years ago
- Example: Client-Side Template Injection with Vue☆25Feb 20, 2023Updated 3 years ago
- This is a collection of Bug Bounty Tips collected from security researchers / bug hunters on Twitter.☆13Feb 19, 2021Updated 5 years ago
- Research & Exploitation framework for Qualcomm EDL Firehorse programmers☆16Jan 21, 2018Updated 8 years ago
- repo with compromised keys and such☆23Dec 29, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆16Apr 5, 2021Updated 5 years ago
- A WLAN red team framework.☆161Feb 9, 2026Updated 3 months ago
- A project based intro to game development using the Unity game engine☆34Aug 26, 2020Updated 5 years ago
- Vulnerability Reports by Aleph Research☆36Mar 10, 2024Updated 2 years ago
- This repository contains complete source code for setting up the environment and exploit code for the vulnerability.☆19Mar 23, 2023Updated 3 years ago
- Crascan is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner.☆32Nov 4, 2018Updated 7 years ago
- Hourly Checked and Updated IP Ranges of AWS Servers☆20Feb 27, 2024Updated 2 years ago
- Various PowerShell scripts that may be useful during red team exercise☆21Apr 28, 2022Updated 4 years ago
- support code for the Bugblat USB sniffers☆16Jun 8, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A tool which allows HackerOne researchers to download their reports into a local, indexed, and searchable repository☆19Sep 29, 2022Updated 3 years ago
- Fork of ligolo-ng with exec and service capability☆17Oct 30, 2023Updated 2 years ago
- Wiki-like CTF write-ups repository by ByteBandits☆103Sep 21, 2025Updated 7 months ago
- ATM security list☆13Aug 10, 2020Updated 5 years ago
- Mobile phone PWN tools and scripts☆16Sep 20, 2020Updated 5 years ago
- Some tee/trustzone helper stuff☆56Sep 29, 2019Updated 6 years ago
- Wireless Hacking, WiFi Security, Vulnerability Analyzer, Pentestration☆12Dec 19, 2016Updated 9 years ago
- Compatible versions of the frida package for each version of the frida-tools package. Automatically updated through CI/CD☆28May 2, 2026Updated last week
- ☆97Feb 26, 2020Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Diffie Hellman key exchange☆13Apr 20, 2017Updated 9 years ago
- ☆18Mar 7, 2019Updated 7 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆44Mar 9, 2023Updated 3 years ago
- Some stuff for doing insane qc chipset pwning.☆44Jun 26, 2022Updated 3 years ago
- Linux kernel source code for Galaxy S22. Extracted from SM-S901U_NA_12_Opensource.zip☆17Oct 7, 2022Updated 3 years ago
- A playground website to learn how different parts of the scrollbar UI can be customized☆11Jun 15, 2025Updated 10 months ago
- Bluetooth Proxy☆16Dec 18, 2012Updated 13 years ago
- a multi-browser extension to encrypt and decrypt textual data using SHA256 algorithm☆20Aug 11, 2025Updated 9 months ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆17Jan 31, 2021Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Tool for cracking password Hashes like MD5, SHA1, SHA256, encrypted PDF, encrypted compressed file,and many other password hashes 🤘🤘☆40Oct 17, 2020Updated 5 years ago
- Mandriva Management Console☆17Nov 22, 2021Updated 4 years ago
- A wrapper around tools used for subdomain enumeration, to automate the workflow, on a given domain, written in bash.☆79Aug 2, 2022Updated 3 years ago
- S3 bucket enumerator☆30Apr 7, 2019Updated 7 years ago
- Javascript keylogger in a chrome extension that sends keystrokes to discord☆10Jan 5, 2024Updated 2 years ago
- This is a supervised Recurrent Neural Network (RNN) learning project treating stock trading as a classification problem. Given input of a…☆12Jul 19, 2020Updated 5 years ago
- Phone Number Gathering & OSINT Tool. Collects Phone Numbers and Performs OSINT on the Numbers. Only works on Nigerian Numbers at the mome…☆14Aug 25, 2020Updated 5 years ago