ETHICAL-HACKING
☆12Dec 20, 2023Updated 2 years ago
Alternatives and similar repositories for Ethical-Hacking
Users that are interested in Ethical-Hacking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Powershell payloads for hacking attack. powershell are created for windows automation but hackers use it to hack devices illegally.☆11Aug 6, 2022Updated 3 years ago
- Webcam bruteforcer☆14May 26, 2015Updated 10 years ago
- Alternative password shadowing scheme☆10Feb 22, 2026Updated last month
- ☆11Feb 9, 2023Updated 3 years ago
- 🌌 Real-time threat detection for smart contracts☆10May 16, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A companion android app for Monster Hunter Frontier Z.☆23Aug 19, 2024Updated last year
- Event Query Router☆12Aug 9, 2019Updated 6 years ago
- Baeldung Ops Tutorials☆13Aug 25, 2025Updated 7 months ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- Weaponize Sailfish OS with Kali linux☆12Jan 15, 2020Updated 6 years ago
- 🧠 Using large language models to classify dark net documents in a zero-shot learning enviornments.☆21Apr 1, 2022Updated 3 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- Based on ossiozac/Raspberry-Pi-Zero-Rubber-Ducky-Duckberry-Pi☆12Oct 27, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Bash script presents crontab in human readable form.☆11Apr 21, 2018Updated 7 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- Legacy password hashing framework for PHP applications needing to support or having previously supported PHP below 5.5☆16Nov 22, 2024Updated last year
- Loading unmanaged dll (32 and 64bits) in managed exe☆11Dec 12, 2020Updated 5 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- Queries for Carbon Black Response☆11Feb 11, 2020Updated 6 years ago
- ☆13Aug 20, 2025Updated 7 months ago
- Public exploits☆16May 28, 2018Updated 7 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ▶️ Server on Demand Appliance (Google Compute Engine) - Cloud Build with Terraform and Ansible Showcase☆13Oct 12, 2025Updated 5 months ago
- ☆14Jul 9, 2024Updated last year
- Test Suite for John the Ripper☆25Dec 28, 2025Updated 2 months ago
- Quick script to build host or investigation timelines using Carbon Black Response☆12Sep 25, 2018Updated 7 years ago
- .net enterprise micro-ORM☆14Feb 19, 2026Updated last month
- Small container runtime for threat detection☆14Apr 13, 2025Updated 11 months ago
- Cloud threat detection visualization from excalidraw☆12Apr 25, 2022Updated 3 years ago
- Implementation of bcrypt password hashing scheme☆12Jan 11, 2021Updated 5 years ago
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Installers for EDMWeb☆13Aug 5, 2023Updated 2 years ago
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆16Mar 13, 2026Updated last week
- Smartly browse and select files from Build & Editor☆11Jan 22, 2021Updated 5 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago
- Yet another fseventsd parser for macOS forensics☆12Jul 20, 2024Updated last year
- A toolchain for ASP.NET Core to automatically generate API documentation.☆11Mar 27, 2017Updated 9 years ago
- 威胁检测规则集☆15Jul 5, 2019Updated 6 years ago