r-sajal / Ethical-HackingView external linksLinks
☆13Sep 25, 2022Updated 3 years ago
Alternatives and similar repositories for Ethical-Hacking
Users that are interested in Ethical-Hacking are comparing it to the libraries listed below
Sorting:
- TikTok Phishing Attack Simulation Tool designed for ethical hacking, security awareness, and educational purposes.☆20Aug 2, 2025Updated 6 months ago
- ☆10May 17, 2025Updated 8 months ago
- MasTKO is a security tool which detects DNS entries associated with AWS’s EC2 servers susceptible to takeover attack and attempts a takeo…☆11Jun 14, 2023Updated 2 years ago
- ☆11Aug 18, 2023Updated 2 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- Analysis and Creation of Wordlists with Complex Passwords for Password Cracking☆10Jul 31, 2023Updated 2 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Scan a host for open HTTP ports and gain information about the services present.☆12Jul 20, 2022Updated 3 years ago
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆15Apr 8, 2025Updated 10 months ago
- Kickstart your Ethical Hacking Journey with Fsociety by GDSC-SMIT Star the Repository and Open your First PR☆35Oct 25, 2023Updated 2 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- A collection of 10 network security tools using Scapy for traffic analysis, penetration testing, and network manipulation. Ideal for cybe…☆16Oct 20, 2024Updated last year
- Unveiling Cyber Threats: From assets to Vulnerability Insights☆17Oct 22, 2024Updated last year
- ☆14Feb 7, 2023Updated 3 years ago
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆12Aug 9, 2023Updated 2 years ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- AI hacking snippets for prompt injection, jailbreaking LLMs, and bypassing AI filters. Ideal for ethical hackers and security researchers…☆34Nov 10, 2025Updated 3 months ago
- Malware & PoC☆14Dec 29, 2025Updated last month
- A structured portfolio of weekly CEH v13 assessments, vulnerability labs, and ethical hacking documentation to demonstrate practical cybe…☆19Jun 25, 2025Updated 7 months ago
- An extension of the sigma standard to include security metrics.☆15May 18, 2023Updated 2 years ago
- hacking tools☆14Jan 29, 2023Updated 3 years ago
- [QRS'22] TokenAuditor: Detecting Manipulation Risk in Token Smart Contract by Fuzzing☆16Aug 24, 2023Updated 2 years ago
- BoltWire v6.03 vulnerable to "Improper Access Control"☆13Oct 31, 2023Updated 2 years ago
- #Simple program to track someone by send malicious link☆13May 17, 2020Updated 5 years ago
- ☆15Feb 28, 2020Updated 5 years ago
- Vulnerable Windows Server 2012 VM made for practicing certain Active Directory attacks.☆22Jun 13, 2023Updated 2 years ago
- ✔️ An illustrative system designed for educational purposes to test a phishing project on the Instagram homepage.☆17Jan 15, 2024Updated 2 years ago
- ☆22Jan 29, 2025Updated last year
- Operating System Notes created on 2022☆19Jul 15, 2022Updated 3 years ago
- ☆22Nov 19, 2019Updated 6 years ago
- GBounty Profiles are customizable security test definitions used by the GBounty web scanner to identify vulnerabilities in web applicatio…☆25Mar 11, 2025Updated 11 months ago
- Coursera Course Symmetric Cryptography 🔑 part of Introduction to Applied Cryptography Specialization.☆17Sep 14, 2020Updated 5 years ago
- ☆22Jan 29, 2020Updated 6 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- Sherlock Discord bot☆19Aug 19, 2024Updated last year
- This script can pick up a password from user's databases to WiFi networks.☆18Jul 25, 2022Updated 3 years ago
- The official repository of ICSME'23 paper "Exploring Security Commits in Python"☆18Jul 12, 2023Updated 2 years ago
- A tutorial for beginners in Ethical Hacking☆41Dec 21, 2025Updated last month
- This script demonstrates a time-based blind SQL injection on Moodle platforms, exploiting response delays to extract data.☆20Jul 7, 2024Updated last year