You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
RktDeauther is a Wifi Deauthication Attack(Wifi Denial-of-Service attack) tool.Its build on python and shell program.It can help to disconnect any wifi user and jam all wifi network(wifi Acess Point)
MisCORS - Unleash CORS Misconfigurations Like a Digital Phantom! 🌐✨ Harness the power of MisCORS to silently unveil vulnerabilities in Cross-Origin Resource Sharing. Stealthily analyze web defenses, expose misconfigurations, and empower your security journey. 🕵️♂️🔓 Dive into the shadows of web security with MisCORS. #WebSecurity #CORSExposure
nmap-full is a simple bash script to quickly scan all TCP ports on a host using nmap then perform a detailed slow scan on the results of the quick scan.
Automated bash file used to sniff http requests on a router using the concept of 'Man in the middle' attack by performing an 'ARP(Address Resolution Protocol) poisoning'. Tools used: WireShark, nmap , ettercap
This is a script for remote cracking of password.This is a broken script so before using it please go through it and do necessary changes.Please don't hate me for this shitty broken script , I am a newbie. Please dont use this process for unethical work
ShadowStrike is an interactive bash script for educational SSH brute force simulation. User-configurable with error handling, it leverages Hydra to automate attacks. Ideal for controlled security testing and learning about vulnerabilities.
This script expedites network discovery by leveraging ARP requests to efficiently identify active hosts across an IP range, ideal for rapid network mapping and device inventory.
Sleepy-Duck is an open source project created for automated security testing on application level. It can be used as an educational script to start learning about cyber-security as well as a common tool for vulnerability assessment.
Welcome to the Ethical Hacking Repository! This repository serves as a curated collection of notes, essential concepts, and interactive scripts related to ethical hacking. It is designed to be a valuable resource for individuals interested in ethical hacking and cybersecurity.
Git Exposed leverages the unintended exposure of .git directories to clone and reconstruct complete projects, providing a clear window into potential vulnerabilities.