Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
☆2,349Jul 19, 2024Updated last year
Alternatives and similar repositories for blackhat-python3
Users that are interested in blackhat-python3 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 …☆1,042Apr 21, 2026Updated 3 weeks ago
- Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.☆2,745Apr 20, 2024Updated 2 years ago
- Collection of Python Scripts☆188Nov 12, 2024Updated last year
- Awesome hacking is an awesome collection of hacking tools.☆3,832May 11, 2026Updated last week
- Official Black Hat Arsenal Security Tools Repository☆4,281Aug 26, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A collection of useful Python hacking scripts for beginners☆616Jan 22, 2022Updated 4 years ago
- 🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources☆1,540Jun 4, 2025Updated 11 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,612Jan 18, 2026Updated 4 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆77,765Apr 22, 2026Updated 3 weeks ago
- This repository is maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, …☆26,336May 10, 2026Updated last week
- An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respect…☆3,488Mar 1, 2024Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆2,735Jul 6, 2025Updated 10 months ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,322May 7, 2026Updated last week
- articles☆13,811Apr 3, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- The all-in-one browser extension for offensive security professionals 🛠☆6,717Jan 5, 2025Updated last year
- Complete Listing and Usage of Tools used for Ethical Hacking☆2,032Oct 23, 2023Updated 2 years ago
- Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet☆5,536Dec 12, 2024Updated last year
- A list of web application security☆6,822Apr 28, 2026Updated 3 weeks ago
- A Network Packet Sniffing tool developed in Python 3.☆784Sep 10, 2025Updated 8 months ago
- Homemade Pwnbox / Rogue AP based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap☆2,045Mar 13, 2024Updated 2 years ago
- Attack Surface Management Platform☆9,799Apr 29, 2026Updated 2 weeks ago
- Red Teaming Tactics and Techniques☆4,589Aug 22, 2024Updated last year
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆11May 19, 2020Updated 6 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A list of resources for those interested in getting started in bug bounties☆12,004Jul 23, 2024Updated last year
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,917Apr 25, 2024Updated 2 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆26,089Jan 25, 2026Updated 3 months ago
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.☆3,337Nov 1, 2025Updated 6 months ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,848Updated this week
- Course content, lab setup instructions and documentation of our very popular Breaking and Pwning Apps and Servers on AWS and Azure hands …☆952Nov 26, 2022Updated 3 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,663Nov 24, 2020Updated 5 years ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆5,141Apr 19, 2026Updated last month
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆70,971Updated this week
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- List of Awesome Red Teaming Resources☆7,916Dec 28, 2023Updated 2 years ago
- A collection of hacking tools, resources and references to practice ethical hacking.☆15,326Oct 16, 2023Updated 2 years ago
- A Modern Orchestration Engine for Security☆6,327May 11, 2026Updated last week
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,993Jan 28, 2026Updated 3 months ago
- Tools for Pentesting☆2,140Nov 18, 2023Updated 2 years ago
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.☆13,575May 11, 2026Updated last week
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆11,282May 12, 2026Updated last week