This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
-
Updated
Apr 16, 2026 - C
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
Penetration tests on SSH servers using brute force or dictionary attacks. Written in C.
A reverse shell for Windows and Linux written in C.
A USB-based script for Ethical hacking with multiple attacks
Trojan (Ransomware) Phishing Simulator for Cybersecurity Training.
RedTeam-Agent: AI-Powered Autonomous Red Team Framework via Model Context Protocol. AI红队与内网渗透自动化框架,支持 gogo, fscan, httpx, nuclei, impacket, playwright 等 15+ 渗透工具,让 LLM 直接化身安全审计黑客。
Codes for malware, viruses and key-logger and other tools
Generate customized wordlists for penetration testing practice (e.g. brute force attack, dictionary attack, etc.)
Kernel-space x86_64 Linux rootkit leveraging kprobes and ftrace for syscall hooking (hiding entries and reverse shell backdoor)
Exfiltrate data from a compromised target using covert channels
GhostBLE is a BLE privacy scanner for the M5Stack Cardputer. It discovers nearby devices, analyzes their privacy posture, and visualizes BLE activity with the interactive mascot Nibbles.
is a PoC exploit targeting a specific vulnerability in the Linux kernel (CVE-2024-0582)
ExploitHawk is a powerful terminal-based exploit search tool for ethical hacking and red team operations, designed for Linux distributions(Debian, Rhel, Arch)
is a PoC script designed to demonstrate a potential vulnerability within the UDF (Universal Disk Format) filesystem implementation on macOS systems
is a PoC exploit for the macOS vulnerability CVE-2023-40404. This PoC leverages IOKit APIs to interact with the IOUserEthernetResource network service, manipulating the system's network interfaces
🏴☠️ Tools for pen-testing, CTFs & wargames. 🏴☠️
🛡️ Bypass DEP/NX protection on Windows x64 using hardware breakpoints and instruction emulation to execute code from non-executable memory.
Linux-based cybersecurity resource and toolkit for learning commands, system operations, and security practices.
Solutions to the popular library of binary exploitation CTFs made by exploit.education, Protostar
Add a description, image, and links to the ethical-hacking topic page so that developers can more easily learn about it.
To associate your repository with the ethical-hacking topic, visit your repo's landing page and select "manage topics."