A simple python program that uses brute force methods to find the password for a given user on a login webpage.
-
Updated
Jul 6, 2023 - Python
A simple python program that uses brute force methods to find the password for a given user on a login webpage.
A tool for exposing files / vulnerabilities in projects
This is a Python script that tests for http shellshocker vulnerability. If it exists, it allows you to run commands remotely.
HackKit - A complete hacking kit
SHA1 & MD5 pass bruteforcer built in python
This Advanced Keylogger is much more than a Keylogger. This keylogger includes more features other than just keylogging. This program is capable of Recording Keystrokes, Takes Screensnaps, Records Audio, Cracks System Configurations, Records data copied in Clipboard, Sends all the above data via E-mail.
Network Packet Sniffing tool developed in Python 3
Created to do load test with using the SYN-Flood attack which is type of denial of service. It sends SYN request packets to host and condenses the server's traffic.
Hacking-pentester-portfolio
Web Proxy for Python Web Crawler and Ethical Hacking
Cybersecurity, Penetration testing and ethical hacking tools - to be used for educational purposes ONLY. DISCLAIMER: Performing hacking attempts on computers that you do not own (without permission) is illegal!
AccessWiz - A Remote Access Trojan (RAT)
A simple password bruteforce tool, compatible with nearly any login. Powered by Selenium.
It is a tool that changes the MAC address to the desired (or random) address until that device is rebooted. Once, the device is rebooted, the MAC address of that device will be set to its original MAC address.
This repository includes a rainbow table generator for md5 hash.
Tries huge amount of passwords on a desktop application.
IntelliTrace is a discord bot around OSINT techiniques and APIs. Use it to LEGALLY collect information.
LiquidNet: A powerful tool tailored for cybersecurity professionals and ethical hackers. It simplifies the process of collecting IPv4 addresses globally and conducting precise scans, aiding in comprehensive network security assessments and vulnerability analysis.
Add a description, image, and links to the ethical-hacking topic page so that developers can more easily learn about it.
To associate your repository with the ethical-hacking topic, visit your repo's landing page and select "manage topics."