There are 4 repositories under ethical-hacker topic.
Tips and Tutorials for Bug Bounty and also Penetration Tests.
A collection of awesome software, libraries, learning tutorials, documents, books & technical resources and cool stuff about dark web.
WEB-Wordlist-Generator creates related wordlists after scanning your web applications.
This repository is aimed to contain all basic tools and resources for cybersecurity. In this repository you will get all material which you must know in cybersecurity field.
Based on the Shodan API, it displays the open ports and security vulnerabilities of the server related to the entered ip or hostname.
(On 06/04/2021) Local Keylogger software has been made for the latest up-to-date "Windows 7, 8 and 10" operatings systems. It managed to circumvent the "Windows Defender" program.
Perl For Ethical Hackers
(On 09/04/2021) Remote Keylogger software has been made for the latest up-to-date "Windows 7, 8 and 10" operatings systems. It managed to circumvent the "Windows Defender" program.
It checks the free proxy addresses it collects from websites and saves the working proxy addresses to the file.
Allows creating and tracking http and https protocol calls. It also supports Proxy.
pr0xh4ck || My Official Website
Mac Changer In Golang
Simple Website Scanner In Ruby
Install Kali NetHunter on your Android device through Termux Without Root with our user-friendly tool.
Random Password Generator In R
ETHICAL-HACKING
Mac Changer In Ruby
Ethical Hacking Essentials (EHE)
Config files for my GitHub profile.
Description about-TheAuthor nd Contact info
Ethical hacking using different tools