There are 4 repositories under ethical-hacker topic.
Tips and Tutorials for Bug Bounty and also Penetration Tests.
A collection of awesome software, libraries, learning tutorials, documents, books & technical resources and cool stuff about dark web.
This repository is aimed to contain all basic tools and resources for cybersecurity. In this repository you will get all material which you must know in cybersecurity field.
WEB-Wordlist-Generator creates related wordlists after scanning your web applications.
Install Kali NetHunter on your Android device through Termux Without Root with our user-friendly tool.
Based on the Shodan API, it displays the open ports and security vulnerabilities of the server related to the entered ip or hostname.
ETHICAL-HACKING
4xDraco is a versatile and powerful ethical hacking tool designed for security enthusiasts, penetration testers, and cybersecurity professionals. It provides a comprehensive suite of tools to assist with ethical hacking, including social media penetration testing, phone number analysis.
Perl For Ethical Hackers
(On 06/04/2021) Local Keylogger software has been made for the latest up-to-date "Windows 7, 8 and 10" operatings systems. It managed to circumvent the "Windows Defender" program.
Ethical Hacking Essentials (EHE)
XssPy is a tool designed to help security researchers and ethical hackers identify potential Cross-Site Scripting (XSS) vulnerabilities in web applications. It automates the process of testing for XSS vulnerabilities by analyzing web pages and submitting payloads to check for any possible security issues.
Simple Website Scanner In Ruby
It checks the free proxy addresses it collects from websites and saves the working proxy addresses to the file.
(On 09/04/2021) Remote Keylogger software has been made for the latest up-to-date "Windows 7, 8 and 10" operatings systems. It managed to circumvent the "Windows Defender" program.
Mac Changer In Golang
Allows creating and tracking http and https protocol calls. It also supports Proxy.
Random Password Generator In R
Mark Sowell - Penetration Tester at Check Point Software Technologies Ltd. - CEH Master, CCSM Elite, & Cybersecurity Expert
Mac Changer In Ruby
A comprehensive, categorized, and fully detailed glossary of hacking, cybersecurity, and digital threat terminology — perfect for security professionals, ethical hackers, students, and researchers.
Mark Sowell - Lead Penetration Tester at Check Point Software - OSCP+, CEH Master, CCSM Elite, & Cybersecurity Expert
SudoHopeX Portfolio, Article, Writeups, Projects and documentation web page
Bu proje, belirli bir IP adresine farklı servisler (SSH, FTP, RDP ve SMB) için brute force saldırıları gerçekleştirmek amacıyla geliştirilmiş bir araçtır. Kullanıcı adı ve parola listeleri kullanılarak hedef sistemde geçerli kimlik bilgileri bulunmaya çalışılır.
Config files for my GitHub profile.
Description about-TheAuthor nd Contact info
My Offensive Security Portfolio
Ethical hacking using different tools