Skip to content
#

ethical-hacking

Here are 126 public repositories matching this topic...

Hands-on Vulnerability Assessment & Pentesting Lab using DVWA hosted on Metasploitable and attacked from Kali Linux. Simulates OWASP Top 10 web vulnerabilities like SQLi, XSS, CSRF, and more using real-world tools such as SQLmap, Hydra, Burp Suite, and manual exploitation. Includes report, screenshots, and attack walkthroughs.

  • Updated Jun 8, 2025
  • HTML

A web-based cybersecurity toolkit that provides simple, open-source utilities like steganography, hash generators, and encoders/decoders. It’s designed to help users hide, analyze, and process data securely through a clean and accessible interface.

  • Updated Sep 3, 2025
  • HTML

Cyphisher provides simulated phishing scenarios and awareness resources to help security teams train staff, validate controls, and run controlled exercises. Strictly for educational use and authorized testing only — do not deploy against systems or users without explicit written consent.

  • Updated Oct 1, 2025
  • HTML

Improve this page

Add a description, image, and links to the ethical-hacking topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the ethical-hacking topic, visit your repo's landing page and select "manage topics."

Learn more