Projects with this topic
-
NetSpecter is a lightweight yet powerful asynchronous OSINT and reconnaissance engine built in Python.
Updated -
GhostBuilder is a powerful payload generator tool designed for ethical hacking, red-teaming, penetration testing, and security research
Updated -
HashRipper is a powerful and fast multi-threaded ethical hacking tool written in Python for cracking hashes. It supports over 17+ popular hash algorithms
Updated -
ReconHound is a Python-based web reconnaissance tool designed for penetration testers, bug bounty hunters, and ethical hackers. It supports directory and file enumeration, subdomain enumeration, fuzzing, and virtual host (vhost) discovery.
Updated -
ZipRarHunter is a powerful command-line ethical hacking tool designed to crack passwords of ZIP and RAR archive files using a wordlist.
Updated -
NetScope is a network scanning and monitoring Ethical Hacking tool designed to help users discover and monitor devices in their network.It provides useful information about each device.
Updated -
NetRaptor is a GUI-based ARP poisoning tool built with Python that allows you to scan a network, select a target and gateway, and perform a Man-in-the-Middle (MITM) attack.
Updated -
The Site Scraper Tool is an ethical hacking program developed in Python that enables users to clone websites for educational purposes by copying HTML, CSS, JavaScript, and PHP.
Updated -
FTPBuster is a powerful command-line brute-forcing tool designed to brute-force FTP, SFTP, and explicit FTPS servers by performing dictionary-based attacks.
Updated -
SSHBuster is a powerful command-line SSH brute-forcing tool designed for ethical hacking and penetration testing. It performs dictionary-based attacks to find valid SSH login credentials efficiently.
Updated -
A Dockerized Red vs Blue network simulator built with Python. Explore port scanning, firewall rules, and defense strategies in an engaging terminal-based game.
Where ports burn and firewalls fight!
Updated -
"ShieldGPT es una herramienta de IA especializada en actividades cibernéticas delictivas. Facilita la creación de malware, ataques de phishing, y otras actividades sin las restricciones éticas de los modelos de IA convencionales. Ideal para entornos virtuales y pruebas con herramientas propias."
Updated -
For CTF's and Safe Environments.... CVE-2021-4034 Local PrivEsc.
Updated -
For StuxCTF on TryHackMe...
Updated -
-
Simply example of keylogger on python
Updated