Projects with this topic
-
GhostBuilder is a powerful payload generator tool designed for ethical hacking, red-teaming, penetration testing, and security research
Updated -
ExploitHawk is a powerful terminal-based exploit search tool for ethical hacking and red team operations, designed for Linux distributions(Debian, Rhel, Arch)
C c-programming c-programmin... c-lang exploit-sear... c-exploit-se... exploit-sear... exploit-sear... c-exploit-se... Ethical Hacking ethical-hacking ethical-hack... cybersecurity cybersecurit... pentesting Pentest-Tools penetration ... penetration-... penetration-... Linux redteaming-t... redteaming-toolUpdated -
Bannerhunter is a powerful banner grabbing tool written in C
banner-grabber Ethical Hacking ethical-hacking ethical-hack... cybersecurity cybersec tools C c-language c-programming c-banner-gra... banner-grabb... c-banner-gra... information-... information-... cybersecurit... penetration ... penetration-... penetration-... pentesting Pentest-Tools Linux c-langUpdated -
HashRipper is a powerful and fast multi-threaded ethical hacking tool written in Python for cracking hashes. It supports over 17+ popular hash algorithms
Updated -
ReconHound is a Python-based web reconnaissance tool designed for penetration testers, bug bounty hunters, and ethical hackers. It supports directory and file enumeration, subdomain enumeration, fuzzing, and virtual host (vhost) discovery.
Updated -
ZipRarHunter is a powerful command-line ethical hacking tool designed to crack passwords of ZIP and RAR archive files using a wordlist.
Updated -
NetRaptor is a GUI-based ARP poisoning tool built with Python that allows you to scan a network, select a target and gateway, and perform a Man-in-the-Middle (MITM) attack.
Updated -
FTPBuster is a powerful command-line brute-forcing tool designed to brute-force FTP, SFTP, and explicit FTPS servers by performing dictionary-based attacks.
Updated -
SSHBuster is a powerful command-line SSH brute-forcing tool designed for ethical hacking and penetration testing. It performs dictionary-based attacks to find valid SSH login credentials efficiently.
Updated -
This is a powerful and stealthy PHP reverse shell designed for ethical hacking and penetration testing. It establishes a reliable and quiet connection back to your machine.
Updated