Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
☆1,025Jun 16, 2025Updated 8 months ago
Alternatives and similar repositories for violent-python3
Users that are interested in violent-python3 are comparing it to the libraries listed below
Sorting:
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆2,310Jul 19, 2024Updated last year
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆11May 19, 2020Updated 5 years ago
- A Network Packet Sniffing tool developed in Python 3.☆777Sep 10, 2025Updated 5 months ago
- A collection of useful Python hacking scripts for beginners.☆17Apr 20, 2021Updated 4 years ago
- Collection of Python Scripts☆189Nov 12, 2024Updated last year
- You guessed well, genius !! This tool is intended for the initiation to ethical hacking with python☆71Aug 11, 2019Updated 6 years ago
- A collection of useful Python hacking scripts for beginners☆615Jan 22, 2022Updated 4 years ago
- Personal version of tools from Black Hat Python☆41Dec 23, 2021Updated 4 years ago
- 🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources☆1,528Jun 4, 2025Updated 8 months ago
- Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.☆2,694Apr 20, 2024Updated last year
- create unlimited passwords to brute force any account! This tool is created only for educational purpose.☆28Apr 30, 2023Updated 2 years ago
- Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet☆5,451Dec 12, 2024Updated last year
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆75,488Feb 16, 2026Updated last week
- Python script to automatically steal all the files and information from a computer using an USB device. Created just for educational purp…☆59Jan 10, 2026Updated last month
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,150Sep 29, 2025Updated 4 months ago
- Information Gathering Simplified.☆77Jan 17, 2023Updated 3 years ago
- articles☆13,698Apr 3, 2023Updated 2 years ago
- A pure-Python ARP Cache Poisoning (a.k.a "ARP Spoofing") tool☆286Dec 15, 2021Updated 4 years ago
- A small list of projects for students of programming for cybersecurity☆225Jul 29, 2022Updated 3 years ago
- Pentest tool com foco em teste de intrusão em redes wireless para Windows☆12Dec 24, 2019Updated 6 years ago
- Python 3 scripts based on lessons learned from Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Securit…☆63Jan 3, 2018Updated 8 years ago
- Homemade Pwnbox / Rogue AP based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap☆1,991Mar 13, 2024Updated last year
- An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respect…☆3,415Mar 1, 2024Updated last year
- This repository is maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, …☆25,185Feb 6, 2026Updated 3 weeks ago
- Linux Cheat Sheet☆127Jul 21, 2020Updated 5 years ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,759Apr 25, 2024Updated last year
- A list of resources for those interested in getting started in bug bounties☆11,832Jul 23, 2024Updated last year
- A collection of awesome penetration testing resources, tools and other shiny things☆25,411Jan 25, 2026Updated last month
- Ferramenta para criação de payloads HID (human interface device) para android sem nethunter ou rubber ducky☆18Aug 11, 2018Updated 7 years ago
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,542Feb 11, 2023Updated 3 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆69,062Updated this week
- EZEA (EaZy Enum Automator), made for OSCP. This tool uses bash to automate most of the enumeration proces☆100May 25, 2021Updated 4 years ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,910Jan 28, 2026Updated 3 weeks ago
- Running Hashcat on Google Colab with session backup and restore.☆743Jan 14, 2022Updated 4 years ago
- Get All Registered Wifi Passwords from Target Computer.☆696Jan 30, 2024Updated 2 years ago
- Python3 script to generate Office macros for the EvilOSX framework. Author: Cedric Owens☆28Dec 3, 2020Updated 5 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,498Jan 18, 2026Updated last month
- A swiss army knife for pentesting networks☆9,082Dec 6, 2023Updated 2 years ago
- Wi-Fi CTF Generator application for Raspberry Pi hardware☆24Apr 27, 2018Updated 7 years ago