Black Hat Ethical Hacking (@blackhatethicalhacking)
  • Stars
    star
    2,313
  • Global Rank 13,077 (Top 0.5 %)
  • Followers 1,227
  • Following 37
  • Registered about 9 years ago
  • Most used languages
    Shell
    67.6 %
    Python
    23.5 %
    Assembly
    2.9 %
    Go
    2.9 %
    PHP
    2.9 %
  • Location πŸ‡ΊπŸ‡Έ United States
  • Country Total Rank 4,337
  • Country Ranking
    Shell
    753
    Assembly
    1,815
    PHP
    5,598
    Python
    7,751

Top repositories

1

Bug_Bounty_Tools_and_Methodology

Bug Bounty Tools used on Twitch - Recon
130
star
2

DDoSlayer

An Advanced Layer 7 DDoS tool written by Black Hat Ethical Hacking
Python
92
star
3

TerminatorZ

TerminatorZ is a highly sophisticated and efficient web security tool that scans for top potential vulnerabilities with known CVEs in your web applications.
Shell
49
star
4

ScopeHunter

ScopeHunter is a command-line tool for finding in scope targets for bug bounty programs.
Shell
32
star
5

XSSRocket

XSS Rocket is written by Black Hat Ethical Hacking with the help of #ChatGPT as experimentation, with a lot of hours spent modifying the code generated by ChatGPT, and is designed for Offensive Security and XSS (Cross-Site Scripting) attacks.
Shell
32
star
6

bf_active_sub

Subdomain Bruteforce - Bounty Quick Code
Shell
24
star
7

SQLMutant

SQLMutant is a comprehensive SQL injection testing tool that provides several features to test for SQL injection vulnerabilities in web applications, uses various techniques to detect vulnerabilities, including pattern matching, error analysis, and timing attacks. The integration of Waybackurls and Arjun allows the tool to find additional
Shell
22
star
8

SQL-INJECTION-PWN

A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty
Shell
19
star
9

s3-buckets-aio-pwn

An AIO Tool to check for Vulnerable Amazon S3 Buckets as part of Bug Bounty, the uniqueness of this tool is that it can take a file full of buckets, and check all of them with various attack scenarios if they are vulnerable
Shell
18
star
10

bheh-sub-pwner

This bash script tool, will perform advanced subdomain enumeration, save the results, it will then probe the subdomains into urls, save the results in a separate file, it will then resolve all the subdomains into ip addresses and save the results separately.
Shell
15
star
11

BHEH_PHP_SHELL

Black Hat Ethical Hacking | PHP Backdoor Shell v1.0
PHP
13
star
12

CVE-2020-2034-POC

Determine the Version Running on the Palo Alto Network Firewall for the Global Protect Portal
Python
11
star
13

SecretOpt1c

SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accuracy!
Shell
11
star
14

isitalive

This tool will resolve a list of Domains, IPs, Hosts, URLs and save the results for valid/invalid fast!
Shell
10
star
15

Clone_BHEH_Offensive_Tools_v1

Clone Some BHEH Fav Tools
Shell
9
star
16

Domain2IP-Converter

Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty
Shell
8
star
17

bheh_conky_theme

Black Hat Ethical Hacking - Official Theme for Conky Manager
8
star
18

NucleiMonst3r

Nucleimonst3r is a powerful vulnerability scanner that provides red-teamers with quick and accurate results.
Shell
7
star
19

shodan_quick_recon

A Python Tool that uses Shodan API's to perform quick recon for vulnerabilities
Python
7
star
20

parrotfromdebian

Convert Your Debian Into Parrot OS Pentesting Mach1ne
Shell
6
star
21

cisco_asa_poc_xss

Cisco VPN Portal XSS PoC for Paypal
Python
5
star
22

DTK-CName-Checker-by-bheh

Shell
5
star
23

snort_installation_bheh

Installation Methods for Snort by Cisco IPS
5
star
24

Talk2Me

Talk2Me interacts with OpenAI's language model to generate text responses and saves the conversation for future reference.
Shell
5
star
25

dalfox-burp-oneliner

Personal - Experimentation
Shell
5
star
26

howtoscanatargetblackhatstyle

How to Scan A Target - Black Hat Style - Recon is the heart of Hacking
4
star
27

NSA---Zippybeer

Testing Purposes
Python
4
star
28

SSRFPwned

Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSRF
Shell
3
star
29

Debian_Kali_Converter_GC

Convert Debian 10 to Kali Linux on Google Cloud or Any Debian
3
star
30

OpenRediWrecked

A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of carefully crafted payloads with encoding techniques.
Shell
3
star
31

bheh_zsh_config

BHEH Official Zsh Config
2
star
32

lazykali

Automatically exported from code.google.com/p/lazykali
Shell
2
star
33

bulkwhois

Bulk Whois, that can be saved to a text file for Recon Purposes
Shell
2
star
34

blackhatethicalhacking

Who We Are
2
star
35

d1rwrtutzhw795.cloudfront.net

2
star
36

antispoof

Anti Spoof - Blocks/Notifies when ARP Scans are Detected
Shell
2
star
37

updatemykalitwitch

A cool Script that updates your Kali Linux!
Shell
2
star
38

BHEH-OSINT

blackhatethicalhacking.com
2
star
39

payloads_pentesting

Payloads for Pentesting
1
star
40

corkami

Automatically exported from code.google.com/p/corkami
Assembly
1
star
41

fud

fud by month
1
star
42

reconinpython3

This is my python3 code
Python
1
star