Codes for malware, viruses and key-logger and other tools
☆37Aug 14, 2021Updated 4 years ago
Alternatives and similar repositories for Ethical-Hacking
Users that are interested in Ethical-Hacking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆21May 3, 2020Updated 5 years ago
- Detect the possible hash-types corresponding to a string, right from your terminal.☆11Jan 5, 2023Updated 3 years ago
- A Node.js module to detect temporary email addresses☆10May 20, 2023Updated 2 years ago
- TikTok Phishing Attack Simulation Tool designed for ethical hacking, security awareness, and educational purposes.☆27Aug 2, 2025Updated 8 months ago
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆14Aug 31, 2017Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- 📱 Detect the user mobile phone (Android or iOS) based on their device's OS☆11Nov 25, 2022Updated 3 years ago
- The largest hacking program with new tools CVE-2023-PoC for the year 2023 It contains all the attack and exploitation tools for testing w…☆19Feb 5, 2024Updated 2 years ago
- Detect websites protected by paywall applications☆17Jan 15, 2019Updated 7 years ago
- Python'un scapy modülü kullanılarak aynı ağda bulunan cihazların ip ve mac adreslerini listeyen script.☆11Jun 24, 2020Updated 5 years ago
- TermuxSocks helps you to setup socks proxy on android without root☆12Aug 21, 2021Updated 4 years ago
- how to hack pattern lock☆15Dec 27, 2020Updated 5 years ago
- phishing lock html php template☆16Apr 22, 2023Updated 2 years ago
- Retrieve an array of possible hash types corresponding to a given string.☆17Jan 5, 2023Updated 3 years ago
- Source Code for 'Beginning Ethical Hacking with Kali Linux' by Sanjib Sinha☆30Dec 3, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- DDRS4PALS - A software for the acquisition and simulation of positron lifetime spectra (PALS) using the DRS4 evaluation board.☆12Aug 29, 2022Updated 3 years ago
- ☆31Feb 15, 2016Updated 10 years ago
- Generate images in Arch Linux on device (a smartphone and tablet) with raytracing. https://sdrausty.github.io/TermuxPovray/☆15Jul 29, 2019Updated 6 years ago
- Simple backdoor written in C targeting Windows 10☆11Jul 16, 2020Updated 5 years ago
- Given one or more Bitcoin addresses with private keys, generates a TeX file suitable for printing and putting into cold storage.☆22May 25, 2024Updated last year
- AI Powered Terminal Based Ethical Hacking Assistant☆93Feb 3, 2025Updated last year
- Python tool to detect critical information (passwords, usernames, strings connectios, etc) in public repositories. GITHUB Hacking.☆22Jan 10, 2022Updated 4 years ago
- Try dictionary words as private keys to find unused funds☆11Dec 6, 2017Updated 8 years ago
- ChatGPT for Ethical Hackers, by EC-Council☆50Mar 18, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- v1版完成对PE头,区段,输入表的解析☆11Apr 16, 2018Updated 8 years ago
- poorman's sudo and chroot wrappers on Android in theTermux app environment☆19Aug 22, 2017Updated 8 years ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆97Apr 27, 2025Updated 11 months ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- RSK Utils to convert keys from BTC to RSK☆13Feb 9, 2022Updated 4 years ago
- Deep learning-based diver detection and tracking modules. #RAL2018 #ICRA2019☆15Apr 10, 2020Updated 6 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆10Apr 18, 2017Updated 8 years ago
- This tool is of Kali Nethunter which helps you to use Kali Nethunter in Termux without rooting your android device. This tool is original…☆16Jan 8, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Simple PE Packer Which Encrypts .text Section☆50May 28, 2017Updated 8 years ago
- A minimal service to detect which cryptocurrency an address corresponds to.☆26Jan 6, 2023Updated 3 years ago
- ☆13Sep 25, 2022Updated 3 years ago
- A GUI program that injects dylib or deb into ipa☆31Feb 20, 2025Updated last year
- A structured portfolio of weekly CEH v13 assessments, vulnerability labs, and ethical hacking documentation to demonstrate practical cybe…☆23Jun 25, 2025Updated 9 months ago
- malicious bash scripts☆10Apr 3, 2022Updated 4 years ago
- what the fuck is this shit☆25Dec 14, 2015Updated 10 years ago