JackStouffer / Violent-Python
Code that I adapted from the "Violent Python" book
☆56Updated 10 years ago
Related projects ⓘ
Alternatives and complementary repositories for Violent-Python
- Extension of sublister tool to check for subdomain takeovers☆22Updated 6 years ago
- Determine everything you need to know to about a system☆30Updated 6 years ago
- Browse and search through nmap's NSE scripts.☆59Updated 7 years ago
- Orb is a massive footprinting tool.☆45Updated 4 years ago
- Do some quick reconnaissance on a domain-based web-application☆13Updated 3 years ago
- PDF report generator for basic recon☆9Updated 6 years ago
- Script to automate, manage, and multithread Nikto scans.☆58Updated 4 years ago
- API testing tool written with Python☆55Updated 7 years ago
- A reverse shell cheat-sheet tool☆39Updated 5 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆82Updated 6 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 11 years ago
- Various penetration testing tools written in Python. Based mostly on ideas and implementations presented in 'Violent Python: A Cookbook f…☆67Updated 8 years ago
- Offensive Security Certified Profesional (OSCP) course scripts, some have been generalized☆47Updated 7 years ago
- Lama, the application that does not mache these words.☆23Updated 5 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆35Updated 4 years ago
- This is a beginner level session to train you into using SSH more effectively. While pentesters may benefit (especially if they are plan…☆15Updated 5 years ago
- PortForce - A custom port Brute Forcing Tool for CTF's & Pentests☆23Updated 7 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆23Updated 10 years ago
- ☆27Updated 5 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆62Updated 8 years ago
- Reconnaissance scripts for penetration testing☆57Updated 9 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆91Updated 8 years ago
- Python version of OWASP's DirBuster Application.☆29Updated 9 years ago
- A collection of scripts used to interact with the Burp Rest API☆51Updated 5 years ago
- Data collection scripts for All Your Cloud Are Belong To Us conference talk☆29Updated 5 years ago
- A collection of writeups for active HTB boxes.☆10Updated 6 years ago