Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
☆2,339Jul 19, 2024Updated last year
Alternatives and similar repositories for blackhat-python3
Users that are interested in blackhat-python3 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 …☆1,036Apr 21, 2026Updated last week
- Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.☆2,734Apr 20, 2024Updated 2 years ago
- Collection of Python Scripts☆187Nov 12, 2024Updated last year
- Awesome hacking is an awesome collection of hacking tools.☆3,815Apr 2, 2026Updated 3 weeks ago
- Official Black Hat Arsenal Security Tools Repository☆4,263Aug 26, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A collection of useful Python hacking scripts for beginners☆615Jan 22, 2022Updated 4 years ago
- 🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources☆1,535Jun 4, 2025Updated 10 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,596Jan 18, 2026Updated 3 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆77,264Apr 22, 2026Updated last week
- This repository is maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, …☆26,074Updated this week
- An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respect…☆3,465Mar 1, 2024Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆2,732Jul 6, 2025Updated 9 months ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,272Sep 29, 2025Updated 7 months ago
- articles☆13,791Apr 3, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- The all-in-one browser extension for offensive security professionals 🛠☆6,698Jan 5, 2025Updated last year
- Complete Listing and Usage of Tools used for Ethical Hacking☆2,022Oct 23, 2023Updated 2 years ago
- Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet☆5,522Dec 12, 2024Updated last year
- A list of web application security☆6,823Apr 10, 2026Updated 2 weeks ago
- Homemade Pwnbox / Rogue AP based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap☆2,011Mar 13, 2024Updated 2 years ago
- A Network Packet Sniffing tool developed in Python 3.☆782Sep 10, 2025Updated 7 months ago
- Attack Surface Management Platform☆9,696Feb 15, 2026Updated 2 months ago
- Red Teaming Tactics and Techniques☆4,575Aug 22, 2024Updated last year
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆11May 19, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A list of resources for those interested in getting started in bug bounties☆11,975Jul 23, 2024Updated last year
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,878Apr 25, 2024Updated 2 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆25,978Jan 25, 2026Updated 3 months ago
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.☆3,323Nov 1, 2025Updated 5 months ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,729Apr 22, 2026Updated last week
- Course content, lab setup instructions and documentation of our very popular Breaking and Pwning Apps and Servers on AWS and Azure hands …☆952Nov 26, 2022Updated 3 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,658Nov 24, 2020Updated 5 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆70,522Updated this week
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆5,130Apr 19, 2026Updated last week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- List of Awesome Red Teaming Resources☆7,888Dec 28, 2023Updated 2 years ago
- A Modern Orchestration Engine for Security☆6,211Apr 15, 2026Updated 2 weeks ago
- A collection of hacking tools, resources and references to practice ethical hacking.☆15,258Oct 16, 2023Updated 2 years ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,976Jan 28, 2026Updated 3 months ago
- Tools for Pentesting☆2,139Nov 18, 2023Updated 2 years ago
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.☆13,507Updated this week
- You guessed well, genius !! This tool is intended for the initiation to ethical hacking with python☆72Aug 11, 2019Updated 6 years ago