ethical-hacking
Here are 2,148 public repositories matching this topic...
Language:All
Sort:Most stars
This repository is maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), AI security, vulnerability research, exploit development, reverse engineering, and more. 🔥 Also check:https://hackertraining.org
- Updated
Dec 11, 2025 - Jupyter Notebook
This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks, covering topics such as Network+, Security+, Linux, Python, Traffic Analysis, Git, ELK, AWS, Azure, and Hacking. The repository also includes a `LEARN.md
- Updated
Nov 18, 2025
😎 🔗 Awesome list about all kinds of resources for learning Ethical Hacking and Penetration Testing.
- Updated
Dec 15, 2024
The Python Code Tutorials
- Updated
Oct 6, 2025 - Jupyter Notebook
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
- Updated
Jul 19, 2024 - Python
Complete Listing and Usage of Tools used for Ethical Hacking
- Updated
Oct 23, 2023
A comprehensive guide for web application penetration testing and bug bounty hunting, covering methodologies, tools, and resources for identifying and exploiting vulnerabilities.
- Updated
Sep 11, 2025
Tips and Tutorials for Bug Bounty and also Penetration Tests.
- Updated
Oct 7, 2025
A comprehensive, step-by-step guide to mastering cybersecurity from beginner to expert level with curated resources, tools, and career guidance
- Updated
Oct 6, 2025
Chrome extension for studocu premium free
- Updated
Nov 24, 2025 - JavaScript
Albanian Hacking Tool!! Tools to help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user discovery, Anonymous-sms, Webcam Hack • Powerful DDOS attack tool!! Operating System Requirements works on any of the following operating systems: • Android • Linux • Unix
- Updated
Dec 24, 2024 - Shell
60k+ WordPress Nuclei templates, updated daily from Wordfence intel—filter by severity/tags/CVE and scan in one line. 🚀🔒
- Updated
Dec 17, 2025 - Python
🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware threats😈, analysis and mitigation🧐.
- Updated
Jan 12, 2024 - Assembly
👶 BabySploit Beginner Pentesting Toolkit/Framework Written in Python 🐍
- Updated
Dec 11, 2019 - HTML
Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
- Updated
Jun 16, 2025 - Python
Lockphish it's the first tool (07/04/2020) for phishing attacks on the lock screen, designed to grab Windows credentials, Android PIN and iPhone Passcode using a https link.
- Updated
Jul 27, 2021 - HTML
Vagrant VirtualBox environment for conducting an internal network penetration test
- Updated
Jun 5, 2023 - Ruby
These are my checklists which I use during my hunting.
- Updated
Nov 30, 2023 - HTML
AI-powered penetration testing assistant for automating recon, note-taking, and vulnerability analysis.
- Updated
Dec 2, 2025 - Python
Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations.
- Updated
Sep 3, 2024 - C++
Improve this page
Add a description, image, and links to theethical-hacking topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with theethical-hacking topic, visit your repo's landing page and select "manage topics."