☆13Sep 25, 2022Updated 3 years ago
Alternatives and similar repositories for Ethical-Hacking
Users that are interested in Ethical-Hacking are comparing it to the libraries listed below
Sorting:
- TikTok Phishing Attack Simulation Tool designed for ethical hacking, security awareness, and educational purposes.☆23Aug 2, 2025Updated 7 months ago
- Personal Blog. Technology Enthusiast, CTF Player, Vulnerability Research, Reverse Engineering, Pen-Testing, and other.☆11Sep 13, 2023Updated 2 years ago
- MasTKO is a security tool which detects DNS entries associated with AWS’s EC2 servers susceptible to takeover attack and attempts a takeo…☆11Jun 14, 2023Updated 2 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- CMSC389R course at UMD☆11Oct 2, 2019Updated 6 years ago
- Analysis and Creation of Wordlists with Complex Passwords for Password Cracking☆10Feb 23, 2026Updated 2 weeks ago
- ☆13Sep 24, 2023Updated 2 years ago
- Scan a host for open HTTP ports and gain information about the services present.☆12Jul 20, 2022Updated 3 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- ☆11Aug 18, 2023Updated 2 years ago
- ☆14Oct 24, 2022Updated 3 years ago
- ☆13Mar 16, 2025Updated 11 months ago
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆16Apr 8, 2025Updated 11 months ago
- Unveiling Cyber Threats: From assets to Vulnerability Insights☆17Oct 22, 2024Updated last year
- Extension to Keyboard.h to allow non-US keyboards and Unicode characters☆15Oct 19, 2021Updated 4 years ago
- Kickstart your Ethical Hacking Journey with Fsociety by GDSC-SMIT Star the Repository and Open your First PR☆36Oct 25, 2023Updated 2 years ago
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆12Aug 9, 2023Updated 2 years ago
- A collection of 10 network security tools using Scapy for traffic analysis, penetration testing, and network manipulation. Ideal for cybe…☆17Oct 20, 2024Updated last year
- Activation of Office 2019☆13Oct 13, 2019Updated 6 years ago
- ☆14Feb 7, 2023Updated 3 years ago
- ☆13Jul 13, 2024Updated last year
- hacking tools☆14Jan 29, 2023Updated 3 years ago
- [QRS'22] TokenAuditor: Detecting Manipulation Risk in Token Smart Contract by Fuzzing☆16Aug 24, 2023Updated 2 years ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- Steganography-Payload-Hider☆13Jan 8, 2026Updated 2 months ago
- ✔️ An illustrative system designed for educational purposes to test a phishing project on the Instagram homepage.☆16Jan 15, 2024Updated 2 years ago
- BoltWire v6.03 vulnerable to "Improper Access Control"☆13Oct 31, 2023Updated 2 years ago
- ☆15Feb 28, 2020Updated 6 years ago
- ☆18Sep 7, 2024Updated last year
- ☆22Jan 29, 2025Updated last year
- AI hacking snippets for prompt injection, jailbreaking LLMs, and bypassing AI filters. Ideal for ethical hackers and security researchers…☆42Nov 10, 2025Updated 3 months ago
- #Simple program to track someone by send malicious link☆14May 17, 2020Updated 5 years ago
- ☆17Aug 17, 2024Updated last year
- Vulnerable Windows Server 2012 VM made for practicing certain Active Directory attacks.☆22Jun 13, 2023Updated 2 years ago
- Operating System Notes created on 2022☆19Jul 15, 2022Updated 3 years ago
- ☆23Nov 19, 2019Updated 6 years ago
- Coursera Course Symmetric Cryptography 🔑 part of Introduction to Applied Cryptography Specialization.☆17Sep 14, 2020Updated 5 years ago
- PoC script for CVE-2023-20110 - Cisco Smart Software Manager On-Prem SQL Injection Vulnerability☆16Jul 16, 2023Updated 2 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year