Topic: ethical-hacking Goto Github
Some thing interesting about ethical-hacking
Some thing interesting about ethical-hacking
ethical-hacking,A living document for penetration testing and offensive security.
Organization: 0xffsec
Home Page: https://0xffsec.com/handbook
ethical-hacking,Tips and Tutorials for Bug Bounty and also Penetration Tests.
User: 0xmaximus
ethical-hacking,It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganography methods. However, since the payload in the JPG file is encrypted, it cannot be easily decrypted. It also uses the "garbage code insertion/dead-code insertion" method to prevent the payload from being caught by the antivirus at runtime.
User: abdulkadir-gungor
ethical-hacking,Guia Acker Code de Programação e Hacking
User: alestanalves
ethical-hacking,🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware threats😈, analysis and mitigation🧐.
User: alvin-tosh
ethical-hacking,OSINT-SAN Framework дает возможность быстро находить информацию и деанонимизировать пользователей сети интернет.
User: bafomet666
Home Page: https://osintsan.ru
ethical-hacking,AI-Powered Ethical Hacking Assistant
Organization: berylliumsec
Home Page: https://twitter.com/berylliumsec_
ethical-hacking,Ghost Eye Informationgathering Footprinting Scanner and Recon Tool Release. Ghost Eye is an Information Gathering Tool I made in python 3. To run Ghost Eye, it only needs a domain or ip. Ghost Eye can work with any Linux distros if they support Python 3. Author: Jolanda de Koff
User: bullseye0
Home Page: https://hackingpassion.com
ethical-hacking,HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
User: chrispetrou
ethical-hacking,Australian Open Source Intelligence Gathering Resources, Australias Largest Open Source Intelligence Repository for Cyber Professionals and Ethical Hackers
User: dfw1n
Home Page: https://www.crimol.com
ethical-hacking,Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero and Hak5 USB Rubber Ducky, and changes its signature after every build to help avoid AV.
User: drew-alleman
ethical-hacking,Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
User: emilyanncr
ethical-hacking,A pure-Python ARP Cache Poisoning (a.k.a "ARP Spoofing") tool
User: eonraider
ethical-hacking,Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
User: eonraider
ethical-hacking,A Network Packet Sniffing tool developed in Python 3.
User: eonraider
ethical-hacking,Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
User: eonraider
ethical-hacking,This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks, covering topics such as Network+, Security+, Linux, Python, Traffic Analysis, Git, ELK, AWS, Azure, and Hacking. The repository also includes a `LEARN.md
User: farhanashrafdev
ethical-hacking,Most Powerfull 😈Crash any android device with virus from any link using termux or kali linux
User: hackerxphantom
ethical-hacking,Instagram Bruteforce Tool Super Fast Crack Auto/Manual Attack 10M Password List
User: hackerxphantom
ethical-hacking,Complete Listing and Usage of Tools used for Ethical Hacking
User: hhhrrrttt222111
ethical-hacking,A command-line interface (CLI) based passive URLs discovery utility. It is designed to efficiently identify known URLs of given domains by tapping into a multitude of curated online passive sources.
Organization: hueristiq
Home Page: https://github.com/hueristiq/xurlfind3r
ethical-hacking,Chrome extension for studocu premium free
User: isanchop
ethical-hacking,Work in progress...
User: ivan-sincek
ethical-hacking,Bypass 4xx HTTP response status codes and more. Based on PycURL and Python Requests.
User: ivan-sincek
ethical-hacking,Penetration testing utility and antivirus assessment tool.
User: ivan-sincek
ethical-hacking,Work in progress...
User: ivan-sincek
ethical-hacking,Work in progress...
User: ivan-sincek
ethical-hacking,PHP shells that work on Linux OS, macOS, and Windows OS.
User: ivan-sincek
ethical-hacking,PowerShell scripts for communicating with a remote host.
User: ivan-sincek
ethical-hacking,Work in progress...
User: ivan-sincek
ethical-hacking,Lockphish it's the first tool (07/04/2020) for phishing attacks on the lock screen, designed to grab Windows credentials, Android PIN and iPhone Passcode using a https link.
User: jaykali
Home Page: https://www.kalilinux.in/2020/05/lockphish.html
ethical-hacking,Don't know what to focus on to become a Penetration Tester..? This is the BEST roadmap for becoming a modern penetration tester. Everything you need to know to land a paying job, categorized in 5 skill levels.
User: kennyslaboratory
ethical-hacking,XSScope is one of the most powerful and advanced GUI Framework for Modern Browser exploitation via XSS.
User: kleiton0x00
ethical-hacking,:baby: BabySploit Beginner Pentesting Toolkit/Framework Written in Python :snake:
User: m4cs
ethical-hacking,A typical search engine dork scanner scrapes search engines with dorks that you provide in order to find vulnerable URLs.
User: madhavmehndiratta
ethical-hacking,Penetration tests on SSH servers using brute force or dictionary attacks. Written in C.
User: matricali
ethical-hacking,"Try Harder" is a cybersecurity retro game designed to simulate 100 real-world scenarios that will help you prepare for the Offensive Security Certified Professional (OSCP) exam, all while offering an immersive experience and retro aesthetic. Enter Real commands correctly, move to the next host, and get a point. Can you get 100?
User: milosilo
ethical-hacking,Steganograpy in Python | Hide files or data in Image Files
User: priyansh-anand
ethical-hacking,A list of useful payloads and Bypass for Web Application Security and Bug Bounty/CTF
User: r0x4r
Home Page: https://github.com/R0X4R/D4rkXSS
ethical-hacking,Vagrant VirtualBox environment for conducting an internal network penetration test
User: r3dy
Home Page: https://www.manning.com/books/the-art-of-network-penetration-testing?a_aid=royce
ethical-hacking,The most powerful CRLF injection (HTTP Response Splitting) scanner.
User: raghavd3v
ethical-hacking,Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found
User: sdushantha
ethical-hacking,Repository for security-related Python scripts.
User: shathi28
ethical-hacking,An advanced multi-threaded, multi-client python reverse shell for hacking linux systems. There's still more work to do so feel free to help out with the development. Disclaimer: This reverse shell should only be used in the lawful, remote administration of authorized systems. Accessing a computer network without authorization or permission is illegal.
User: thatstraw
ethical-hacking,This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artificial intelligence security, vulnerability research, exploit development, reverse engineering, and more.
Organization: the-art-of-hacking
Home Page: https://hackerrepo.org
ethical-hacking,These are my checklists which I use during my hunting.
User: tuhin1729
ethical-hacking,PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is a useful tool for performing penetration tests of applications with various application protocols. ⚡
User: warxim
Home Page: https://petep.warxim.com
ethical-hacking,The Python Code Tutorials
User: x4nth055
Home Page: https://www.thepythoncode.com
ethical-hacking,Recursos de hacking ético
User: zamarrowski
A declarative, efficient, and flexible JavaScript library for building user interfaces.
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google ❤️ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.