Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
☆1,036Apr 21, 2026Updated last week
Alternatives and similar repositories for violent-python3
Users that are interested in violent-python3 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆2,339Jul 19, 2024Updated last year
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆11May 19, 2020Updated 5 years ago
- Collection of Python Scripts☆187Nov 12, 2024Updated last year
- A Network Packet Sniffing tool developed in Python 3.☆782Sep 10, 2025Updated 7 months ago
- You guessed well, genius !! This tool is intended for the initiation to ethical hacking with python☆72Aug 11, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A collection of useful Python hacking scripts for beginners.☆17Apr 20, 2021Updated 5 years ago
- Personal version of tools from Black Hat Python☆40Dec 23, 2021Updated 4 years ago
- Pentest tool com foco em teste de intrusão em redes wireless para Windows☆12Dec 24, 2019Updated 6 years ago
- A collection of useful Python hacking scripts for beginners☆615Jan 22, 2022Updated 4 years ago
- Information Gathering Simplified.☆85Jan 17, 2023Updated 3 years ago
- Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.☆2,734Apr 20, 2024Updated 2 years ago
- 🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources☆1,535Jun 4, 2025Updated 10 months ago
- Python 3 scripts based on lessons learned from Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Securit…☆63Jan 3, 2018Updated 8 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆77,264Apr 22, 2026Updated last week
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet☆5,522Dec 12, 2024Updated last year
- Linux Cheat Sheet☆129Jul 21, 2020Updated 5 years ago
- A simple asynchronous TCP/IP Connect Port Scanner in Python 3☆93Jun 23, 2023Updated 2 years ago
- Ferramenta para criação de payloads HID (human interface device) para android sem nethunter ou rubber ducky☆18Aug 11, 2018Updated 7 years ago
- Python script to automatically steal all the files and information from a computer using an USB device. Created just for educational purp…☆69Jan 10, 2026Updated 3 months ago
- Python template to assist with buffer overflows☆73Nov 12, 2019Updated 6 years ago
- Writeups on my TryHackMe adventures!☆57Oct 5, 2023Updated 2 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,272Sep 29, 2025Updated 7 months ago
- A pure-Python ARP Cache Poisoning (a.k.a "ARP Spoofing") tool☆287Dec 15, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- articles☆13,791Apr 3, 2023Updated 3 years ago
- Quick and dirty scripts for pentesting.☆41Jun 12, 2020Updated 5 years ago
- EZEA (EaZy Enum Automator), made for OSCP. This tool uses bash to automate most of the enumeration proces☆100May 25, 2021Updated 4 years ago
- Simple Penetration Testing Multitool For Beginners.☆60Dec 8, 2022Updated 3 years ago
- A dump of all the scripts that I make☆19Jul 4, 2021Updated 4 years ago
- A list of resources for those interested in getting started in bug bounties☆11,975Jul 23, 2024Updated last year
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆70,522Updated this week
- Tool used for enumeration, reporting, and automating low hanging fruit during a penetration test.☆18Jul 8, 2019Updated 6 years ago
- Bug Hunting Penetration RGB Hat are red, gray, and black hat☆19Jan 21, 2026Updated 3 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,878Apr 25, 2024Updated 2 years ago
- Homemade Pwnbox / Rogue AP based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap☆2,011Mar 13, 2024Updated 2 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆25,978Jan 25, 2026Updated 3 months ago
- Get All Registered Wifi Passwords from Target Computer.☆708Jan 30, 2024Updated 2 years ago
- This repository is maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, …☆26,074Updated this week
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,976Jan 28, 2026Updated 3 months ago
- Good For OSCP Training☆444Jan 26, 2019Updated 7 years ago