This repository is aimed to contain all basic tools and resources for cybersecurity. In this repository you will get all material which you must know in cybersecurity field.
-
Updated
Oct 25, 2024 - Python
This repository is aimed to contain all basic tools and resources for cybersecurity. In this repository you will get all material which you must know in cybersecurity field.
WEB-Wordlist-Generator creates related wordlists after scanning your web applications.
Based on the Shodan API, it displays the open ports and security vulnerabilities of the server related to the entered ip or hostname.
(On 06/04/2021) Local Keylogger software has been made for the latest up-to-date "Windows 7, 8 and 10" operatings systems. It managed to circumvent the "Windows Defender" program.
XssPy is a tool designed to help security researchers and ethical hackers identify potential Cross-Site Scripting (XSS) vulnerabilities in web applications. It automates the process of testing for XSS vulnerabilities by analyzing web pages and submitting payloads to check for any possible security issues.
It checks the free proxy addresses it collects from websites and saves the working proxy addresses to the file.
(On 09/04/2021) Remote Keylogger software has been made for the latest up-to-date "Windows 7, 8 and 10" operatings systems. It managed to circumvent the "Windows Defender" program.
Allows creating and tracking http and https protocol calls. It also supports Proxy.
Bu proje, belirli bir IP adresine farklı servisler (SSH, FTP, RDP ve SMB) için brute force saldırıları gerçekleştirmek amacıyla geliştirilmiş bir araçtır. Kullanıcı adı ve parola listeleri kullanılarak hedef sistemde geçerli kimlik bilgileri bulunmaya çalışılır.
Key Smith is a specialized tool for generating password and number lists, designed for ethical hacking and security assessments. Ideal for security professionals and researchers, Key Smith enables users to create diverse combinations of passwords and numeric sequences to test and strengthen the security of systems.
Add a description, image, and links to the ethical-hacker topic page so that developers can more easily learn about it.
To associate your repository with the ethical-hacker topic, visit your repo's landing page and select "manage topics."