Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
☆1,032Jun 16, 2025Updated 9 months ago
Alternatives and similar repositories for violent-python3
Users that are interested in violent-python3 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆2,334Jul 19, 2024Updated last year
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆11May 19, 2020Updated 5 years ago
- Collection of Python Scripts☆189Nov 12, 2024Updated last year
- A Network Packet Sniffing tool developed in Python 3.☆781Sep 10, 2025Updated 6 months ago
- You guessed well, genius !! This tool is intended for the initiation to ethical hacking with python☆72Aug 11, 2019Updated 6 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A collection of useful Python hacking scripts for beginners.☆17Apr 20, 2021Updated 4 years ago
- Personal version of tools from Black Hat Python☆41Dec 23, 2021Updated 4 years ago
- Pentest tool com foco em teste de intrusão em redes wireless para Windows☆12Dec 24, 2019Updated 6 years ago
- A collection of useful Python hacking scripts for beginners☆617Jan 22, 2022Updated 4 years ago
- Information Gathering Simplified.☆84Jan 17, 2023Updated 3 years ago
- Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.☆2,725Apr 20, 2024Updated last year
- 🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources☆1,534Jun 4, 2025Updated 10 months ago
- Python 3 scripts based on lessons learned from Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Securit…☆63Jan 3, 2018Updated 8 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆76,678Mar 16, 2026Updated 3 weeks ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet☆5,482Dec 12, 2024Updated last year
- Linux Cheat Sheet☆127Jul 21, 2020Updated 5 years ago
- A simple asynchronous TCP/IP Connect Port Scanner in Python 3☆94Jun 23, 2023Updated 2 years ago
- Python script to automatically steal all the files and information from a computer using an USB device. Created just for educational purp…☆68Jan 10, 2026Updated 2 months ago
- Ferramenta para criação de payloads HID (human interface device) para android sem nethunter ou rubber ducky☆18Aug 11, 2018Updated 7 years ago
- Python template to assist with buffer overflows☆73Nov 12, 2019Updated 6 years ago
- Writeups on my TryHackMe adventures!☆57Oct 5, 2023Updated 2 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,225Sep 29, 2025Updated 6 months ago
- A pure-Python ARP Cache Poisoning (a.k.a "ARP Spoofing") tool☆286Dec 15, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- articles☆13,767Apr 3, 2023Updated 3 years ago
- EZEA (EaZy Enum Automator), made for OSCP. This tool uses bash to automate most of the enumeration proces☆100May 25, 2021Updated 4 years ago
- Simple Penetration Testing Multitool For Beginners.☆60Dec 8, 2022Updated 3 years ago
- A dump of all the scripts that I make☆19Jul 4, 2021Updated 4 years ago
- A list of resources for those interested in getting started in bug bounties☆11,933Jul 23, 2024Updated last year
- Tool used for enumeration, reporting, and automating low hanging fruit during a penetration test.☆18Jul 8, 2019Updated 6 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆70,044Updated this week
- Bug Hunting Penetration RGB Hat are red, gray, and black hat☆19Jan 21, 2026Updated 2 months ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,830Apr 25, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Homemade Pwnbox / Rogue AP based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap☆2,008Mar 13, 2024Updated 2 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆25,773Jan 25, 2026Updated 2 months ago
- Get All Registered Wifi Passwords from Target Computer.☆703Jan 30, 2024Updated 2 years ago
- This repository is maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, …☆25,794Mar 24, 2026Updated 2 weeks ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,959Jan 28, 2026Updated 2 months ago
- Good For OSCP Training☆443Jan 26, 2019Updated 7 years ago
- An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respect…☆3,452Mar 1, 2024Updated 2 years ago