Name: Black Hat Ethical Hacking
Type: User
Company: @blackhatethicalhacking
Bio: Offensive Security: Information Security Solutions, Digital Forensics, Offensive Security Courses, Content Production, and Bug Bounty Hunting!
Twitter: secur1ty1samyth
Location: Global
Blog: https://www.blackhatethicalhacking.com
Black Hat Ethical Hacking's Projects
Bypass Two-Factor-Authentication
POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln
A script to test credentials against Active Directory Federation Services (ADFS), allowing password spraying or bruteforce attacks.
Turn a Raspberry Pi into an Alexa Client
In-depth Attack Surface Mapping and Asset Discovery_AI_Experimentation_by_SaintDruG
androrat
GitHub Is the HOME ! 🔱 We believe in God, everyone else is suspicious 🔱
Anti Spoof - Blocks/Notifies when ARP Scans are Detected
Some of the questions which i was asked when i was giving interviews for Application/Product Security roles. I am sure this is not an exhaustive list but i felt these questions were important to be asked and some were challenging to answer
A Tool for Domain Flyovers
HTTP parameter discovery suite.
Automatically exported from code.google.com/p/armitage
Advanced Search & Mass Exploit Scanner- فاحص متقدم لبحث و استغلال الثغرات بالجملة
Automated Mass Exploiter
A curated list of various bug bounty tools
A Collection of Hacks in IoT Space so that we can address them (hopefully).
:scream: A curated list of amazingly awesome OSINT
🔍 A collection of interesting, funny, and depressing search queries to plug into https://shodan.io/ 👩💻
The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, ffuf, masscan, nuclei, meg and many more!
Toolkit to detect and keep track on Blind XSS, XXE & SSRF
The Browser Exploitation Framework Project
The Swiss Army knife for 802.11, BLE and Ethernet networks reconnaissance and MITM attacks.
Subdomain Bruteforce - Bounty Quick Code
blackhatethicalhacking.com
This bash script tool, will perform advanced subdomain enumeration, save the results, it will then probe the subdomains into urls, save the results in a separate file, it will then resolve all the subdomains into ip addresses and save the results separately.
Black Hat Ethical Hacking - Official Theme for Conky Manager
Black Hat Ethical Hacking | PHP Backdoor Shell v1.0
BHEH Official Zsh Config
The source code of main tools used in Bitcoin "non-malware-based" attacks.
An OSINT tool to search for accounts by username in social networks.