black hat python
☆134Mar 25, 2021Updated 4 years ago
Alternatives and similar repositories for Black-Hat-Python
Users that are interested in Black-Hat-Python are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository is the final location for tools I built from the book Black Hat Python☆12Aug 1, 2018Updated 7 years ago
- Todo☆23Nov 2, 2020Updated 5 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 9 years ago
- active / passive network scanner☆33Nov 8, 2023Updated 2 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- UPPERSAFE Open Source Firewall☆23Dec 8, 2022Updated 3 years ago
- An Android wrapper for Arc☆11May 13, 2018Updated 7 years ago
- Linkedin Employee Profile Scrapper (Python3 version)☆12Jul 26, 2021Updated 4 years ago
- Python script to find subdomains☆11Aug 22, 2025Updated 7 months ago
- Red Team Server (RTS)☆16Mar 8, 2024Updated 2 years ago
- ☆13Apr 29, 2016Updated 9 years ago
- Go client for Elasticsearch OSINT platform☆15Nov 4, 2023Updated 2 years ago
- A collection of random scripts.☆10Jul 20, 2015Updated 10 years ago
- A fileless Windows keylogger that exfils via DNS.☆32Apr 21, 2017Updated 8 years ago
- Wireless magnetic card emulation☆14Sep 21, 2019Updated 6 years ago
- ☆13Oct 29, 2014Updated 11 years ago
- A collection of notes and script that will help you learn basics of hacking with Python☆34Nov 3, 2014Updated 11 years ago
- Test domain expiration dates.☆12Dec 2, 2022Updated 3 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- The yaml documents for the CTFman search system.☆12May 16, 2019Updated 6 years ago
- lair-docker-compose repo☆17Mar 11, 2021Updated 5 years ago
- Accepts a domain name and queries multiple sources to return subdomains. Includes option to scan the returned subdomains to check connect…☆14Aug 9, 2019Updated 6 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Mar 22, 2018Updated 8 years ago
- This program focuses on automating the download, installation and compilation of pentest tools from source☆33Oct 30, 2018Updated 7 years ago
- ☆11Feb 20, 2015Updated 11 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Jun 18, 2018Updated 7 years ago
- Python Tool for Host Enumeration☆50Mar 24, 2017Updated 9 years ago
- Automated Pentest Recon Scanner☆14Jul 29, 2016Updated 9 years ago
- A simple Script which tests for LFI (Local File Inclusion) via Curl☆15Mar 11, 2019Updated 7 years ago
- All in one tool for ethical hacking and pen testing.☆13May 22, 2023Updated 2 years ago
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆20Feb 23, 2017Updated 9 years ago
- Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability☆27Nov 11, 2020Updated 5 years ago
- Automatically exported from code.google.com/p/lfimap☆16Mar 5, 2016Updated 10 years ago
- ☆16Aug 5, 2022Updated 3 years ago
- My python3 implementation of a Forward Shell☆37Jan 25, 2019Updated 7 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆59Apr 3, 2015Updated 10 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Mar 7, 2020Updated 6 years ago
- local mirror of your Github stars (including ALL branches)☆18Oct 7, 2020Updated 5 years ago