SaaSHub helps you find the best software and product alternatives Learn more →
Top 23 ethical-hacking Open-Source Projects
-
h4cker
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artificial intelligence security, vulnerability research, exploit development, reverse engineering, and more.
-
90DaysOfCyberSecurity
This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks, covering topics such as Network+, Security+, Linux, Python, Traffic Analysis, Git, ELK, AWS, Azure, and Hacking. The repository also includes a `LEARN.md
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
-
blackhat-python3
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
-
SaaSHub
SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives
-
violent-python3
Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
-
Malware-Exhibit
🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware threats😈, analysis and mitigation🧐.
-
capsulecorp-pentest
Vagrant VirtualBox environment for conducting an internal network penetration test
-
xurlfind3r
A command-line interface (CLI) based passive URLs discovery utility. It is designed to efficiently identify known URLs of given domains by tapping into a multitude of curated online passive sources.
-
JPGtoMalware
It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganograp
-
dora
Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found (by sdushantha)
-
PwnLnX
An advanced multi-threaded, multi-client python reverse shell for hacking linux systems. There's still more work to do so feel free to help out with the development. Disclaimer: This reverse shell should only be used in the lawful, remote administration of authorized systems. Accessing a computer network without authorization or permission is illegal.
-
petep
PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is a useful tool for performing penetration tests of applications with various application protocols. ⚡
-
try-harder
"Try Harder" is a cybersecurity retro game designed to simulate 100 real-world scenarios that will help you prepare for the Offensive Security Certified Professional (OSCP) exam, all while offering an immersive experience and retro aesthetic. Enter Real commands correctly, move to the next host, and get a point. Can you get 100?
-
BrowserBruter
BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python-based tool leverages Selenium and Selenium-Wire to automate web form fuzzing, making it easier to identify potential vulnerabilities in web applications.
-
SaaSHub
SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives
Project mention: Massive-Web-Application-Penetration-Testing-Bug-Bounty-Notes | /r/bugbounty | 2023-05-26
Edit - gotit, for anyone else looking, use this extension - https://github.com/isanchop/stuhack
Project mention: nebula: AI-Powered Ethical Hacking Assistant - Nebula is an AI-powered assistant specifically designed for the field of ethical hacking. It provides a unique capability for users to input commands using natural language processing, facilitating a seamless transition from intent to execution. | /r/blueteamsec | 2023-10-29
Project mention: bettercap VS petep - a user suggested alternative | libhunt.com/r/bettercap | 2023-10-03
Project mention: I create cybersecurity retro games as a hobby. "Try Harder" is designed to simulate 100 scenarios that will help you prepare for the Offensive Security Certified Professional (OSCP) exam, all while offering an immersive experience and retro aesthetic. Check out my Github and Play it now! | /r/u_Milosilo_hacks | 2023-09-11
Project mention: The Browser Bruter – First Ever Browser based web application fuzzing tool | news.ycombinator.com | 2024-04-08
ethical-hacking related posts
-
anyone with studocu premium? need 1 doc unlock
-
nebula: AI-Powered Ethical Hacking Assistant - Nebula is an AI-powered assistant specifically designed for the field of ethical hacking. It provides a unique capability for users to input commands using natural language processing, facilitating a seamless transition from intent to execution.
-
AI Powered Ethical Hacking Assistant
-
AI powered ethical hacking tool will help ethical hackers find vulnerabilities faster
-
AI Powered Ethical Hacking Assistant
-
AI powered ethical hacking tool will help ethical hackers find vulnerabilities faster
-
AI Powered Ethical Hacking tool
-
A note from our sponsor - SaaSHub
www.saashub.com | 6 May 2024
Index
What are some of the best open-source ethical-hacking projects? This list will help you:
Project | Stars | |
---|---|---|
1 | h4cker | 16,589 |
2 | 90DaysOfCyberSecurity | 5,170 |
3 | pythoncode-tutorials | 2,003 |
4 | blackhat-python3 | 1,973 |
5 | Galaxy-Bugbounty-Checklist | 1,315 |
6 | Massive-Web-Application-Penetration-Testing-Bug-Bounty-Notes | 1,184 |
7 | stuhack | 1,101 |
8 | violent-python3 | 936 |
9 | Malware-Exhibit | 911 |
10 | capsulecorp-pentest | 767 |
11 | xurlfind3r | 524 |
12 | CRLFsuite | 499 |
13 | Bug-Bounty-Methodology | 481 |
14 | php-reverse-shell | 422 |
15 | nebula | 358 |
16 | JPGtoMalware | 354 |
17 | dora | 299 |
18 | PwnLnX | 220 |
19 | petep | 157 |
20 | try-harder | 152 |
21 | LAZYPARIAH | 140 |
22 | UnSAFE_Bank | 136 |
23 | BrowserBruter | 128 |
Sponsored