☆13Sep 25, 2022Updated 3 years ago
Alternatives and similar repositories for Ethical-Hacking
Users that are interested in Ethical-Hacking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- TikTok Phishing Attack Simulation Tool designed for ethical hacking, security awareness, and educational purposes.☆27Aug 2, 2025Updated 8 months ago
- CMSC389R course at UMD☆11Oct 2, 2019Updated 6 years ago
- Scan a host for open HTTP ports and gain information about the services present.☆12Jul 20, 2022Updated 3 years ago
- ☆11May 17, 2025Updated 11 months ago
- Personal Blog. Technology Enthusiast, CTF Player, Vulnerability Research, Reverse Engineering, Pen-Testing, and other.☆10Sep 13, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆23Nov 19, 2019Updated 6 years ago
- #Simple program to track someone by send malicious link☆13May 17, 2020Updated 5 years ago
- ☆17Apr 5, 2021Updated 5 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- Kickstart your Ethical Hacking Journey with Fsociety by GDSC-SMIT Star the Repository and Open your First PR☆37Oct 25, 2023Updated 2 years ago
- ☆12Sep 24, 2023Updated 2 years ago
- ☆12Mar 16, 2025Updated last year
- A GUI program that injects dylib or deb into ipa☆32Feb 20, 2025Updated last year
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆14Oct 24, 2022Updated 3 years ago
- A generic IOT framework, open for all user node-red devices and for any advanced custom logic, with some unique features: rich in interfa…☆25Oct 27, 2024Updated last year
- This tool utilizes the use of Aircrack, Bully, WPS Pixie, and Wash/Reaver into a single script for basic WPS cracking.☆10Jul 21, 2018Updated 7 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- Malware & PoC☆14Dec 29, 2025Updated 3 months ago
- A reconnaissance tool for ethical hackers written in RUST☆21Apr 8, 2024Updated 2 years ago
- ✔️ An illustrative system designed for educational purposes to test a phishing project on the Instagram homepage.☆16Jan 15, 2024Updated 2 years ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆16Apr 8, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆16Aug 17, 2024Updated last year
- ☆21May 3, 2020Updated 5 years ago
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆12Aug 9, 2023Updated 2 years ago
- This contains scripts, tools, and other programs I show case on my youtube channel.☆20Oct 30, 2025Updated 5 months ago
- A script I made to automate basic buffer overflow exploitation as much as possible☆35Oct 17, 2019Updated 6 years ago
- A tutorial for beginners in Ethical Hacking☆39Mar 31, 2026Updated 2 weeks ago
- Quick IR Value Tester☆17Aug 14, 2020Updated 5 years ago
- hacking tools☆14Jan 29, 2023Updated 3 years ago
- MasTKO is a security tool which detects DNS entries associated with AWS’s EC2 servers susceptible to takeover attack and attempts a takeo…☆11Jun 14, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- DIY : https://www.youtube.com/watch?v=oAPZG4rk3v0&t=5s☆19Jul 2, 2023Updated 2 years ago
- Simple detector of ARP poisoning attack☆29Apr 23, 2015Updated 10 years ago
- ☆11Aug 18, 2023Updated 2 years ago
- Unveiling Cyber Threats: From assets to Vulnerability Insights☆17Oct 22, 2024Updated last year
- CHEAT SHEET DE SEGURIDAD PARA ETHICAL HACKING & PENETRATION TESTING☆33Jan 5, 2017Updated 9 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- ☆29May 4, 2023Updated 2 years ago