Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
☆2,334Jul 19, 2024Updated last year
Alternatives and similar repositories for blackhat-python3
Users that are interested in blackhat-python3 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 …☆1,032Jun 16, 2025Updated 9 months ago
- Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.☆2,725Apr 20, 2024Updated last year
- Collection of Python Scripts☆189Nov 12, 2024Updated last year
- Awesome hacking is an awesome collection of hacking tools.☆3,801Apr 2, 2026Updated last week
- A collection of useful Python hacking scripts for beginners☆617Jan 22, 2022Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Official Black Hat Arsenal Security Tools Repository☆4,250Aug 26, 2024Updated last year
- 🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources☆1,534Jun 4, 2025Updated 10 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,565Jan 18, 2026Updated 2 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆76,678Mar 16, 2026Updated 3 weeks ago
- This repository is maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, …☆25,794Mar 24, 2026Updated 2 weeks ago
- An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respect…☆3,452Mar 1, 2024Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆2,709Jul 6, 2025Updated 9 months ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,225Sep 29, 2025Updated 6 months ago
- articles☆13,767Apr 3, 2023Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Complete Listing and Usage of Tools used for Ethical Hacking☆2,013Oct 23, 2023Updated 2 years ago
- The all-in-one browser extension for offensive security professionals 🛠☆6,669Jan 5, 2025Updated last year
- A list of web application security☆6,827Feb 27, 2026Updated last month
- Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet☆5,482Dec 12, 2024Updated last year
- Homemade Pwnbox / Rogue AP based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap☆2,008Mar 13, 2024Updated 2 years ago
- A Network Packet Sniffing tool developed in Python 3.☆781Sep 10, 2025Updated 6 months ago
- Attack Surface Management Platform☆9,635Feb 15, 2026Updated last month
- Red Teaming Tactics and Techniques☆4,520Aug 22, 2024Updated last year
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆11May 19, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A list of resources for those interested in getting started in bug bounties☆11,933Jul 23, 2024Updated last year
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,830Apr 25, 2024Updated last year
- A collection of awesome penetration testing resources, tools and other shiny things☆25,773Jan 25, 2026Updated 2 months ago
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.☆3,311Nov 1, 2025Updated 5 months ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,614Apr 1, 2026Updated last week
- Course content, lab setup instructions and documentation of our very popular Breaking and Pwning Apps and Servers on AWS and Azure hands …☆951Nov 26, 2022Updated 3 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,658Nov 24, 2020Updated 5 years ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆5,106Updated this week
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆70,044Updated this week
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- List of Awesome Red Teaming Resources☆7,867Dec 28, 2023Updated 2 years ago
- A Modern Orchestration Engine for Security☆6,180Updated this week
- A collection of hacking tools, resources and references to practice ethical hacking.☆15,192Oct 16, 2023Updated 2 years ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,959Jan 28, 2026Updated 2 months ago
- Tools for Pentesting☆2,138Nov 18, 2023Updated 2 years ago
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.☆13,422Apr 2, 2026Updated last week
- You guessed well, genius !! This tool is intended for the initiation to ethical hacking with python☆72Aug 11, 2019Updated 6 years ago