Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
☆2,310Jul 19, 2024Updated last year
Alternatives and similar repositories for blackhat-python3
Users that are interested in blackhat-python3 are comparing it to the libraries listed below
Sorting:
- Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 …☆1,025Jun 16, 2025Updated 8 months ago
- Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.☆2,694Apr 20, 2024Updated last year
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,498Jan 18, 2026Updated last month
- Awesome hacking is an awesome collection of hacking tools.☆3,751Feb 18, 2026Updated last week
- This repository is maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, …☆25,185Feb 6, 2026Updated 3 weeks ago
- Official Black Hat Arsenal Security Tools Repository☆4,228Aug 26, 2024Updated last year
- 🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources☆1,528Jun 4, 2025Updated 8 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆75,488Feb 16, 2026Updated last week
- A collection of useful Python hacking scripts for beginners☆615Jan 22, 2022Updated 4 years ago
- An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respect…☆3,415Mar 1, 2024Updated last year
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,150Sep 29, 2025Updated 4 months ago
- articles☆13,698Apr 3, 2023Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆2,696Jul 6, 2025Updated 7 months ago
- Collection of Python Scripts☆189Nov 12, 2024Updated last year
- Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet☆5,451Dec 12, 2024Updated last year
- Red Teaming Tactics and Techniques☆4,491Aug 22, 2024Updated last year
- A list of web application security☆6,784Updated this week
- The all-in-one browser extension for offensive security professionals 🛠☆6,633Jan 5, 2025Updated last year
- Attack Surface Management Platform☆9,418Feb 15, 2026Updated last week
- A list of resources for those interested in getting started in bug bounties☆11,832Jul 23, 2024Updated last year
- Homemade Pwnbox / Rogue AP based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap☆1,991Mar 13, 2024Updated last year
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,759Apr 25, 2024Updated last year
- A collection of awesome penetration testing resources, tools and other shiny things☆25,411Jan 25, 2026Updated last month
- A Network Packet Sniffing tool developed in Python 3.☆777Sep 10, 2025Updated 5 months ago
- Course content, lab setup instructions and documentation of our very popular Breaking and Pwning Apps and Servers on AWS and Azure hands …☆950Nov 26, 2022Updated 3 years ago
- A Modern Orchestration Engine for Security☆6,109Feb 19, 2026Updated last week
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.☆3,285Nov 1, 2025Updated 3 months ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆10,923Updated this week
- List of Awesome Red Teaming Resources☆7,788Dec 28, 2023Updated 2 years ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆5,054Updated this week
- Complete Listing and Usage of Tools used for Ethical Hacking☆1,981Oct 23, 2023Updated 2 years ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,910Jan 28, 2026Updated 3 weeks ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,340Feb 14, 2026Updated 2 weeks ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,650Nov 24, 2020Updated 5 years ago
- Tools for Pentesting☆2,126Nov 18, 2023Updated 2 years ago
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆16,768Dec 15, 2024Updated last year
- A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study mater…☆2,727Jun 22, 2020Updated 5 years ago
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.☆13,265Updated this week
- An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.☆5,903Oct 20, 2025Updated 4 months ago