110 Open Source Ethical Hacking Software Projects
Free and open source ethical hacking code projects including engines, APIs, generators, and tools.
Windows Post Exploitation381 ⭐
Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
Algorithm Ethics52 ⭐
A collection of resources and tools designed to provide guidelines for ethical modeling.
Penetration tests on SSH servers using brute force or dictionary attacks. Written in C.
Machine Learning Siem Water Infrastructure21 ⭐
This work aims at using different machine learning techniques in detecting anomalies (including hardware failures, sabotage and cyber-attacks) in SCADA water infrastructure.
Kali Linux Dockerfile12 ⭐
A simple Dockerfile to build an image starting from the latest official one of Kali Linux and including some useful tools.
Python-based spyware for Windows that logs the foreground window activites, keyboard inputs. Furthermore it is able to take screenshots and and run shell commands in the background.
Phishing Mobile App14 ⭐
Phishing mobile application made in React Native for both Android and iOS devices.
A deep look at some recon methodologies and web-application vulnerabilities of my interest where I will merge all my notes gathered from books, videos, articles and own experience with bug bounty hunting / web and network hacking
Ghost Eye Informationgathering Footprinting Scanner and Recon Tool Release. Ghost Eye is an Information Gathering Tool I made in python 3. To run Ghost Eye, it only needs a domain or ip. Ghost Eye can work with any Linux distros if they support Python 3. Author: Jolanda de Koff
Ivan Sincek Keylogger36 ⭐
Windows OS keylogger with a hook mechanism (i.e. with a keyboard hook procedure).
Security Tool Chest51 ⭐
A list of useful security and obfuscation tools useful for red and blue teaming activities. A list made possible by the provided references.
Dfw1n Osint102 ⭐
Australian Open Source Intelligence Gathering Resources, Australias Largest Open Source Intelligence Repository for Cyber Professionals and Ethical Hackers
HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Dictionary Attack Python Script13 ⭐
It is a python script that i wrote, that takes a password list file and tries them all on a given email to check for the correct password
Intro To Ethical Hacking16 ⭐
Dec 28th @ in5 - Introduction to Ethical Hacking and Cyber Security. At this session, we went over the basics of cybersecurity and showed how you can protect yourself from some common attacks. Using Kali Linux as a platform, we isolated exploits and recreate some of the more common major attacks (eg; ‘Man-In-The-Middle’) using a variety of penetration testing tools such as the Browser Exploitation Framework, also showed how to inoculate your systems against each malicious action.
A typical search engine dork scanner scrapes search engines with dorks that you provide in order to find vulnerable URLs.
Capsulecorp Pentest382 ⭐
Vagrant VirtualBox environment for conducting an internal network penetration test
Matthewzito Brutus55 ⭐
extensible exploitation framework shipped on a modular and multi-tasking architecture
Blackhat Python31346 ⭐
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Eonraider Violent Python3694 ⭐
Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Crawlergo To Xray60 ⭐
Hae Java31 ⭐
Lockphish it's the first tool (07/04/2020) for phishing attacks on the lock screen, designed to grab Windows credentials, Android PIN and iPhone Passcode using a https link.
Bialomazur Brutus33 ⭐
Botnet targeting Windows machines written entirely in Python & open source security project.
Lucideus CyberGym is the internal CTF event we organise for our security professionals to grow and learn together. Now everyone can access the challenges that can be easily setup and start playing.
Avyukt is a Exploitation Framework which can be used to generate Malicious Payloads and exploit Windows OS
XSScope is one of the most powerful and advanced GUI Framework for Modern Browser exploitation via XSS.
Python For Ethical Hacking24 ⭐
This is a complete project series on implementing hacking tools available in Kali Linux into python.
This script will you help to find the information about the website and to help in penetrating testing
Top Ethical Hacking Resources18 ⭐
Stay up-to-date with the latest and greatest ethical hacking tools and resources.
Ultimate Hacker Roadmap64 ⭐
Don't know what to focus on to become a Penetration Tester..? This is the BEST roadmap for becoming a modern penetration tester. Everything you need to know to land a paying job, categorized in 5 skill levels.
Pentest Playbook43 ⭐
Pentest Playbook - In other words, this is my hacking notebook where I write down all notes from my journey in cybersecurity.
Osint San265 ⭐
OSINT-SAN Framework дает возможность быстро находить информацию и деанонимизировать пользователей сети интернет.
Pentest Everything50 ⭐
This is the penetration testing cheatsheet I created to get my OSCP certification.
Pentest Handbook21 ⭐
This is a guide for Penetration Testers how to use Penetration Testing tools and their advanced used. Need everyone's help to make it batter. Please send Pool Request to keep this updated for the community.
MDPin is a server and a website. It contains an UI to fake a Android login screen to steal their pin code. It works via a web browser, by going into fullscreen.
An advanced multi-threaded, multi-client python reverse shell for hacking linux systems. There's still more work to do so feel free to help out with the development. Disclaimer: This reverse shell should only be used in the lawful, remote administration of authorized systems. Accessing a computer network without authorization or permission is illegal.
Bash script that automates the enumeration of domains and DNS servers in the active information gathering.
Redherd Framework43 ⭐
RedHerd is a collaborative and serverless framework for orchestrating a geographically distributed group of assets.
Sdushantha Dora146 ⭐
Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found
Ethical Hacking Toolkit is a collection of tools, cheat sheets, and resources for Ethical hackers, Penetration Tester, and Security Researchers etc. It contains almost all tools mentioned in CEH, OSCP, eCPPT and PNPT
Yorgosk Keylogger14 ⭐
A keylogger for Windows, developed as part of the "Build an Advanced Keylogger using C++ for Ethical Hacking!" course on Udemy
Penetration tests on SSH servers using brute force or dictionary attacks. Written in Python.