All Projects → ehtk → Similar Projects or Alternatives

368 Open source projects that are alternatives of or similar to ehtk

Webspoilt
This script will you help to find the information about the website and to help in penetrating testing
Stars: ✭ 34 (-42.37%)
AttackSurfaceManagement
Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (-23.73%)
Mutual labels:  cybersecurity, hacking-tools
phishEye
phishEye is an ultimate phishing tool in python. Includes popular websites like Facebook, Twitter, Instagram, LinkedIn, GitHub, Dropbox, and many others. Created with Flask, custom templates, and tunneled with ngrok and localhost.run.
Stars: ✭ 47 (-20.34%)
Mutual labels:  cybersecurity, hacking-tools
argus
Argus Advanced Remote & Local Keylogger For macOS and Windows
Stars: ✭ 87 (+47.46%)
Mutual labels:  cybersecurity, ethical-hacking
LAZYPARIAH
A tool for generating reverse shell payloads on the fly.
Stars: ✭ 121 (+105.08%)
Mutual labels:  cybersecurity, ethical-hacking
tryhackme-ctf
TryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (+137.29%)
Mutual labels:  cybersecurity, hacking-tools
Hack Tools
The all-in-one Red Team extension for Web Pentester 🛠
Stars: ✭ 2,750 (+4561.02%)
Mutual labels:  cybersecurity, hacking-tools
Brutus
Botnet targeting Windows machines written entirely in Python & open source security project.
Stars: ✭ 37 (-37.29%)
Mutual labels:  ethical-hacking, hacking-tools
Hack-Utils
Script to facilitate different functions and checks
Stars: ✭ 27 (-54.24%)
Mutual labels:  ethical-hacking, hacking-tools
hackipy
Hacking, pen-testing, and cyber-security related tools built with Python.
Stars: ✭ 26 (-55.93%)
Mutual labels:  cybersecurity, ethical-hacking
dorkScanner
A typical search engine dork scanner scrapes search engines with dorks that you provide in order to find vulnerable URLs.
Stars: ✭ 93 (+57.63%)
Mutual labels:  ethical-hacking, hacking-tools
Kali-Linux-Tools-Interface
Graphical Web interface developed to facilitate the use of security information tools.
Stars: ✭ 169 (+186.44%)
Mutual labels:  cybersecurity, hacking-tools
Sn1per
Attack Surface Management Platform | Sn1perSecurity LLC
Stars: ✭ 4,897 (+8200%)
Mutual labels:  cybersecurity, hacking-tools
H4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+17613.56%)
Mutual labels:  cybersecurity, ethical-hacking
Whoishere.py
WIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.
Stars: ✭ 182 (+208.47%)
Mutual labels:  cybersecurity
Payloads
Git All the Payloads! A collection of web attack payloads.
Stars: ✭ 2,862 (+4750.85%)
Mutual labels:  cybersecurity
Cypheroth
Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.
Stars: ✭ 179 (+203.39%)
Mutual labels:  cybersecurity
Magicpad
MagicPad is an encryption suite for beginners. It is designed to be run standalone via the browser or executable (Electron).
Stars: ✭ 174 (+194.92%)
Mutual labels:  cybersecurity
Docker Security Images
🔐 Docker Container for Penetration Testing & Security
Stars: ✭ 172 (+191.53%)
Mutual labels:  cybersecurity
Attack Website
MITRE ATT&CK Website
Stars: ✭ 231 (+291.53%)
Mutual labels:  cybersecurity
Bbrecon
Python library and CLI for the Bug Bounty Recon API
Stars: ✭ 169 (+186.44%)
Mutual labels:  cybersecurity
Cyberprobe
Capturing, analysing and responding to cyber attacks
Stars: ✭ 162 (+174.58%)
Mutual labels:  cybersecurity
Osweep
Don't Just Search OSINT. Sweep It.
Stars: ✭ 225 (+281.36%)
Mutual labels:  cybersecurity
Slack Watchman
Monitoring your Slack workspaces for sensitive information
Stars: ✭ 159 (+169.49%)
Mutual labels:  cybersecurity
Powershell Red Team
Collection of PowerShell functions a Red Teamer may use to collect data from a machine
Stars: ✭ 155 (+162.71%)
Mutual labels:  cybersecurity
Sharp
An anti-ARP-spoofing application software that use active and passive scanning methods to detect and remove any ARP-spoofer from the network.
Stars: ✭ 150 (+154.24%)
Mutual labels:  cybersecurity
reosploit
A Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Stars: ✭ 89 (+50.85%)
Mutual labels:  cybersecurity
Oscp Cheat Sheet
This is my OSCP cheat sheet made by combining a lot of different resources online with a little bit of tweaking. I used this cheat sheet during my exam (Fri, 13 Sep 2019) and during the labs. I can proudly say it helped me pass so I hope it can help you as well ! Good Luck and Try Harder
Stars: ✭ 216 (+266.1%)
Mutual labels:  cybersecurity
Hackercamp
Enine boyuna siber güvenlik
Stars: ✭ 149 (+152.54%)
Mutual labels:  cybersecurity
Gnuradio
GNU Radio – the Free and Open Software Radio Ecosystem
Stars: ✭ 3,297 (+5488.14%)
Mutual labels:  cybersecurity
Jwtcat
A CPU-based JSON Web Token (JWT) cracker and - to some extent - scanner.
Stars: ✭ 181 (+206.78%)
Mutual labels:  cybersecurity
SSI Extra Materials
In my computer security courses I make extensive usage of cheatsheets for various tools and extra materials to complement the student learning if they are willing to do so. I have decided to share them to enable others to take advantage of them
Stars: ✭ 42 (-28.81%)
Mutual labels:  cybersecurity
Advancedmemorychallenges
Advanced buffer overflow and memory corruption security challenges
Stars: ✭ 174 (+194.92%)
Mutual labels:  cybersecurity
Oblivion
Data leak checker & OSINT Tool
Stars: ✭ 237 (+301.69%)
Mutual labels:  cybersecurity
CloudFrontier
Monitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Cloud.
Stars: ✭ 102 (+72.88%)
Mutual labels:  cybersecurity
Oscp Pentest Methodologies
备考 OSCP 的各种干货资料/渗透测试干货资料
Stars: ✭ 166 (+181.36%)
Mutual labels:  cybersecurity
Caldera
Automated Adversary Emulation Platform
Stars: ✭ 3,126 (+5198.31%)
Mutual labels:  cybersecurity
Python Honeypot
OWASP Honeypot, Automated Deception Framework.
Stars: ✭ 160 (+171.19%)
Mutual labels:  cybersecurity
Intel-One
Command line tool for passive reconnaissance, able to gather and link public information to a target domain, company or individual. It can make intelligence gathering faster and more effective by drastically reducing manual user interaction. This is achieved through the engineering of a highly customisable single input to multiple output solutio…
Stars: ✭ 23 (-61.02%)
Mutual labels:  cybersecurity
Scylla
The Simplistic Information Gathering Engine | Find Advanced Information on a Username, Website, Phone Number, etc.
Stars: ✭ 154 (+161.02%)
Mutual labels:  cybersecurity
Autottp
Automated Tactics Techniques & Procedures
Stars: ✭ 215 (+264.41%)
Mutual labels:  cybersecurity
Labtainers
Labtainers: A Docker-based cyber lab framework
Stars: ✭ 226 (+283.05%)
Mutual labels:  cybersecurity
Hostintel
A modular Python application to collect intelligence for malicious hosts.
Stars: ✭ 211 (+257.63%)
Mutual labels:  cybersecurity
Dontclickshit
Як не стати кібер-жертвою
Stars: ✭ 149 (+152.54%)
Mutual labels:  cybersecurity
Pyiris Backdoor
PyIris-backdoor is a modular, stealthy and flexible remote-access-toolkit written completely in python used to command and control other systems. It is now in the beta stage, possibly perpetually. There are bugs still present in the framework, feel free to contribute or help me out with this project its still under active development >_>
Stars: ✭ 145 (+145.76%)
Mutual labels:  cybersecurity
Opencti
Authors
Stars: ✭ 2,165 (+3569.49%)
Mutual labels:  cybersecurity
ICS-Security-Products
Lists of products useful for ICS security
Stars: ✭ 78 (+32.2%)
Mutual labels:  cybersecurity
Picoctf
The platform used to run picoCTF. A great framework to host any CTF.
Stars: ✭ 203 (+244.07%)
Mutual labels:  cybersecurity
Misp Dashboard
A dashboard for a real-time overview of threat intelligence from MISP instances
Stars: ✭ 142 (+140.68%)
Mutual labels:  cybersecurity
Personal Security Checklist
🔒 A curated checklist of 300+ tips for protecting digital security and privacy in 2021
Stars: ✭ 2,388 (+3947.46%)
Mutual labels:  cybersecurity
Richelieu
List of the most common French passwords
Stars: ✭ 199 (+237.29%)
Mutual labels:  cybersecurity
Information Security
A place where I can create, collect and share tooling, resources and knowledge about information security.
Stars: ✭ 135 (+128.81%)
Mutual labels:  cybersecurity
Karton
Distributed malware processing framework based on Python, Redis and MinIO.
Stars: ✭ 134 (+127.12%)
Mutual labels:  cybersecurity
Aliens eye
Social media hunter
Stars: ✭ 105 (+77.97%)
Mutual labels:  hacking-tools
py-scripts-other
A collection of some of my scripts
Stars: ✭ 79 (+33.9%)
Mutual labels:  cybersecurity
Betterbackdoor
A backdoor with a multitude of features.
Stars: ✭ 195 (+230.51%)
Mutual labels:  cybersecurity
Jiff
JavaScript library for building web-based applications that employ secure multi-party computation (MPC).
Stars: ✭ 131 (+122.03%)
Mutual labels:  cybersecurity
Wireshark Cheatsheet
Wireshark Cheat Sheet
Stars: ✭ 131 (+122.03%)
Mutual labels:  cybersecurity
Lockphish
Lockphish it's the first tool (07/04/2020) for phishing attacks on the lock screen, designed to grab Windows credentials, Android PIN and iPhone Passcode using a https link.
Stars: ✭ 186 (+215.25%)
Mutual labels:  cybersecurity
Visualize logs
A Python library and command line tools to provide interactive log visualization.
Stars: ✭ 128 (+116.95%)
Mutual labels:  cybersecurity
1-60 of 368 similar projects