☆13Sep 25, 2022Updated 3 years ago
Alternatives and similar repositories for Ethical-Hacking
Users that are interested in Ethical-Hacking are comparing it to the libraries listed below
Sorting:
- TikTok Phishing Attack Simulation Tool designed for ethical hacking, security awareness, and educational purposes.☆22Aug 2, 2025Updated 7 months ago
- Sirve para ver las peticiones entre el navegador y el servidor pero en el caso del internet gratis a través de vpn también los puede ayud…☆11Oct 1, 2021Updated 4 years ago
- Personal Blog. Technology Enthusiast, CTF Player, Vulnerability Research, Reverse Engineering, Pen-Testing, and other.☆11Sep 13, 2023Updated 2 years ago
- MasTKO is a security tool which detects DNS entries associated with AWS’s EC2 servers susceptible to takeover attack and attempts a takeo…☆11Jun 14, 2023Updated 2 years ago
- Take control of a remote machine using reverse shells in python(The hacking side of python)☆10May 23, 2023Updated 2 years ago
- Create a Discord Bot using Python programming language (discord.py) with this simple template.☆14Apr 27, 2024Updated last year
- ☆13Sep 24, 2023Updated 2 years ago
- Analysis and Creation of Wordlists with Complex Passwords for Password Cracking☆10Feb 23, 2026Updated 2 weeks ago
- A multi-stream TCP relay over UDP. Fixes connecting to minecraft across the world.☆12Jan 16, 2022Updated 4 years ago
- ☆11Aug 18, 2023Updated 2 years ago
- Scan a host for open HTTP ports and gain information about the services present.☆12Jul 20, 2022Updated 3 years ago
- A way to control devices via Bluetooth w/ an ESP32☆14Jul 6, 2024Updated last year
- CMSC389R course at UMD☆11Oct 2, 2019Updated 6 years ago
- Unveiling Cyber Threats: From assets to Vulnerability Insights☆17Oct 22, 2024Updated last year
- Kickstart your Ethical Hacking Journey with Fsociety by GDSC-SMIT Star the Repository and Open your First PR☆36Oct 25, 2023Updated 2 years ago
- ☆13Mar 16, 2025Updated 11 months ago
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆15Apr 8, 2025Updated 11 months ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- This tool utilizes the use of Aircrack, Bully, WPS Pixie, and Wash/Reaver into a single script for basic WPS cracking.☆11Jul 21, 2018Updated 7 years ago
- MCP server for using the REMnux malware analysis toolkit via AI assistants☆47Feb 27, 2026Updated last week
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆12Aug 9, 2023Updated 2 years ago
- Provide a topic and it will create a narrated video: Generate video script -> generate caption images -> narrate the video script -> bind…☆17Apr 10, 2024Updated last year
- hacking tools☆14Jan 29, 2023Updated 3 years ago
- ☆14Feb 7, 2023Updated 3 years ago
- ☆13Jul 13, 2024Updated last year
- [QRS'22] TokenAuditor: Detecting Manipulation Risk in Token Smart Contract by Fuzzing☆16Aug 24, 2023Updated 2 years ago
- A computer vision approach for crop line detection, and heading angle estimation.☆17May 16, 2022Updated 3 years ago
- A collection of 10 network security tools using Scapy for traffic analysis, penetration testing, and network manipulation. Ideal for cybe…☆17Oct 20, 2024Updated last year
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- Malware & PoC☆14Dec 29, 2025Updated 2 months ago
- ✔️ An illustrative system designed for educational purposes to test a phishing project on the Instagram homepage.☆16Jan 15, 2024Updated 2 years ago
- A structured portfolio of weekly CEH v13 assessments, vulnerability labs, and ethical hacking documentation to demonstrate practical cybe…☆20Jun 25, 2025Updated 8 months ago
- ☆15Feb 28, 2020Updated 6 years ago
- BoltWire v6.03 vulnerable to "Improper Access Control"☆13Oct 31, 2023Updated 2 years ago
- An extension of the sigma standard to include security metrics.☆16May 18, 2023Updated 2 years ago
- #Simple program to track someone by send malicious link☆14May 17, 2020Updated 5 years ago
- ☆17Aug 17, 2024Updated last year
- AI hacking snippets for prompt injection, jailbreaking LLMs, and bypassing AI filters. Ideal for ethical hackers and security researchers…☆42Nov 10, 2025Updated 3 months ago
- Vulnerable Windows Server 2012 VM made for practicing certain Active Directory attacks.☆22Jun 13, 2023Updated 2 years ago