Python 3 scripts based on lessons learned from Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers by TJ O'Connor.
☆63Jan 3, 2018Updated 8 years ago
Alternatives and similar repositories for violent-python3
Users that are interested in violent-python3 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python google hacking (dorking) script.☆18Jul 15, 2018Updated 7 years ago
- ip-keyloger☆10Jan 9, 2026Updated 3 months ago
- ☆18Mar 23, 2018Updated 8 years ago
- Python Tutorial - || Advanced Keylogger || Code Walk-through || Hacking/Info-Sec ||☆87Jan 6, 2025Updated last year
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Source code for 'Beginning Ethical Hacking with Python' by Sanjib Sinha☆27Mar 27, 2017Updated 9 years ago
- Scripts to control an "OSCP-like" lab environment.☆23Aug 14, 2017Updated 8 years ago
- 365 days of hacking (漏洞挖掘365天挑战)☆17Mar 2, 2022Updated 4 years ago
- Password recovery payload for the BashBunny, using LaZagne.☆13Jan 7, 2021Updated 5 years ago
- ☆16Mar 12, 2026Updated 3 weeks ago
- Advanced web server fingerprinting☆22Sep 27, 2017Updated 8 years ago
- Python3 source code and hack code.☆16Dec 19, 2022Updated 3 years ago
- this is a personal version of automatingosint, you can scan onion sites automatically with onionscan☆11Aug 20, 2020Updated 5 years ago
- IP info query☆13May 28, 2025Updated 10 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- learn rust-lang to build systems.☆13Jul 16, 2023Updated 2 years ago
- List of tools and references used by NU Cybersecurity students,☆15Feb 12, 2024Updated 2 years ago
- ☆13Nov 8, 2017Updated 8 years ago
- ☆510May 27, 2018Updated 7 years ago
- Powershell script to monitor a wireless adapter every second until it disconnects.☆14May 15, 2024Updated last year
- Plugins for the Serpico Project☆23Dec 4, 2018Updated 7 years ago
- Google Chrome Database Cracking Hacking - Get username & passwords☆78Jan 6, 2025Updated last year
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 12 years ago
- An accessibility suite giving you control over what you read.☆14Dec 10, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Site Admin Page Finder with Python Script | Edited By Sir.4m1R☆19Aug 22, 2017Updated 8 years ago
- Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 …☆1,032Jun 16, 2025Updated 9 months ago
- This is a python 3 version of the script created by:Dr. Pawel Lachowicz, QuantAtRisk.com Sydney, Australia (ABN 58 495 201 605) +61 4509…☆13May 14, 2015Updated 10 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Jun 10, 2017Updated 8 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- Learn how to use GitHub Pages to publish your website! It's easy, free and you have precise (version) control over your content!☆10Mar 5, 2023Updated 3 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Apr 16, 2021Updated 4 years ago
- This script will try to find a domains subdomains by using google dorking. It will never connect to the site it is researching.☆20May 18, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Python Scripts for Hacking .☆512Nov 27, 2023Updated 2 years ago
- A systemd-enabled Kali Linux Docker image, in the spirit of geerlingguy/docker-debian11-ansible.☆15Mar 9, 2026Updated 3 weeks ago
- Example config.json files for Trunk Recorder☆12Feb 11, 2025Updated last year
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- A collection of Python code, useful for RF work☆13Sep 2, 2022Updated 3 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16May 21, 2021Updated 4 years ago
- gnu radio files☆12Oct 6, 2015Updated 10 years ago