Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
☆2,319Jul 19, 2024Updated last year
Alternatives and similar repositories for blackhat-python3
Users that are interested in blackhat-python3 are comparing it to the libraries listed below
Sorting:
- Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 …☆1,028Jun 16, 2025Updated 9 months ago
- Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.☆2,710Apr 20, 2024Updated last year
- Collection of Python Scripts☆189Nov 12, 2024Updated last year
- Awesome hacking is an awesome collection of hacking tools.☆3,778Mar 13, 2026Updated last week
- A collection of useful Python hacking scripts for beginners☆616Jan 22, 2022Updated 4 years ago
- Official Black Hat Arsenal Security Tools Repository☆4,238Aug 26, 2024Updated last year
- 🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources☆1,533Jun 4, 2025Updated 9 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,541Jan 18, 2026Updated 2 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆76,106Updated this week
- This repository is maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, …☆25,484Mar 12, 2026Updated last week
- An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respect…☆3,427Mar 1, 2024Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆2,699Jul 6, 2025Updated 8 months ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,186Sep 29, 2025Updated 5 months ago
- articles☆13,734Apr 3, 2023Updated 2 years ago
- Complete Listing and Usage of Tools used for Ethical Hacking☆1,997Oct 23, 2023Updated 2 years ago
- The all-in-one browser extension for offensive security professionals 🛠☆6,651Jan 5, 2025Updated last year
- A list of web application security☆6,818Feb 27, 2026Updated 3 weeks ago
- Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet☆5,472Dec 12, 2024Updated last year
- Homemade Pwnbox / Rogue AP based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap☆1,999Mar 13, 2024Updated 2 years ago
- A Network Packet Sniffing tool developed in Python 3.☆779Sep 10, 2025Updated 6 months ago
- Attack Surface Management Platform☆9,466Feb 15, 2026Updated last month
- Red Teaming Tactics and Techniques☆4,509Aug 22, 2024Updated last year
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆11May 19, 2020Updated 5 years ago
- A list of resources for those interested in getting started in bug bounties☆11,902Jul 23, 2024Updated last year
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,802Apr 25, 2024Updated last year
- A collection of awesome penetration testing resources, tools and other shiny things☆25,569Jan 25, 2026Updated last month
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.☆3,298Nov 1, 2025Updated 4 months ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,484Updated this week
- Course content, lab setup instructions and documentation of our very popular Breaking and Pwning Apps and Servers on AWS and Azure hands …☆950Nov 26, 2022Updated 3 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,652Nov 24, 2020Updated 5 years ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆5,085Feb 25, 2026Updated 3 weeks ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆69,539Updated this week
- List of Awesome Red Teaming Resources☆7,834Dec 28, 2023Updated 2 years ago
- A Modern Orchestration Engine for Security☆6,145Updated this week
- A collection of hacking tools, resources and references to practice ethical hacking.☆15,132Oct 16, 2023Updated 2 years ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,937Jan 28, 2026Updated last month
- Tools for Pentesting☆2,135Nov 18, 2023Updated 2 years ago
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.☆13,343Mar 13, 2026Updated last week
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆11,050Updated this week