Python 3 scripts based on lessons learned from Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers by TJ O'Connor.
☆63Jan 3, 2018Updated 8 years ago
Alternatives and similar repositories for violent-python3
Users that are interested in violent-python3 are comparing it to the libraries listed below
Sorting:
- But actually for hackers☆31Mar 29, 2020Updated 5 years ago
- Various penetration testing tools written in Python. Based mostly on ideas and implementations presented in 'Violent Python: A Cookbook f…☆70Nov 6, 2016Updated 9 years ago
- Python google hacking (dorking) script.☆18Jul 15, 2018Updated 7 years ago
- ip-keyloger☆10Jan 9, 2026Updated last month
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- Some scripts to do a ping of death attack.☆11Mar 21, 2017Updated 8 years ago
- Code that I adapted from the "Violent Python" book☆57Jul 8, 2014Updated 11 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16May 21, 2021Updated 4 years ago
- ⛷ A collection of hacker scripts.☆28Jan 24, 2017Updated 9 years ago
- WebSetting☆16Jul 19, 2022Updated 3 years ago
- A ptrace based sandbox. (PoC)☆14Jun 3, 2018Updated 7 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆21Dec 2, 2024Updated last year
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- Helping my friend with her economics research project by scraping drug information from DarkWeb using selenium and Tor☆18Mar 12, 2020Updated 5 years ago
- 365 days of hacking (漏洞挖掘365天挑战)☆17Mar 2, 2022Updated 3 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Oct 17, 2017Updated 8 years ago
- Lewis & Clark CCDC Team Resources☆17Mar 27, 2015Updated 10 years ago
- A chat server and client implemented with Python 3.x.☆16Jan 26, 2026Updated last month
- Different utility scripts for pentesting and hacking.☆45Nov 10, 2017Updated 8 years ago
- Miner(cpu or gpu) for bitcoin, secretly run in a period of time☆23Dec 26, 2022Updated 3 years ago
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 3 years ago
- This is the official repository for Basic Malware Analysis Course☆20Jan 11, 2022Updated 4 years ago
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 12 years ago
- A XPath injection demonstration application☆21Nov 14, 2020Updated 5 years ago
- Simple Client-Server Chat Application using Python Sockets☆19Feb 21, 2018Updated 8 years ago
- Python toolbox for hacking and problem solving☆22Sep 5, 2016Updated 9 years ago
- The source codes for my book Understanding Network Hacks - Attack and defense with Python☆170Dec 8, 2020Updated 5 years ago
- ☆12May 13, 2020Updated 5 years ago
- GNURadio Companion Flowgraphs for my HackRF One Projects☆31Feb 20, 2015Updated 11 years ago
- ☆16Jul 28, 2020Updated 5 years ago
- FFXI Gearswap Lua for the impaired☆10Feb 2, 2026Updated 3 weeks ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- ☆29Apr 16, 2020Updated 5 years ago
- Hacking Wifi-Passwords,Chrome-Saved-Passwords,Copying the Scripts to Windows-Startup folder,Index-Sites-Files-Downloader☆30Dec 15, 2017Updated 8 years ago
- ☆28Aug 9, 2020Updated 5 years ago
- Reverse Shell with Python 3☆26Dec 25, 2020Updated 5 years ago
- 用于去除 Xshell7 / Xftp7 免费版本在关闭时出现的弹窗。☆10Jan 24, 2023Updated 3 years ago
- In this work, we compared the predictive capabilities of six different machine learning algorithms - linear regression, random forest, ex…☆14Sep 21, 2020Updated 5 years ago
- Unofficial Windower Addons☆38Jan 14, 2026Updated last month