JackStouffer / Violent-Python
Code that I adapted from the "Violent Python" book
☆57Updated 10 years ago
Alternatives and similar repositories for Violent-Python:
Users that are interested in Violent-Python are comparing it to the libraries listed below
- Examine HTTP response headers for common security issues☆39Updated 2 years ago
- Offensive Security Certified Profesional (OSCP) course scripts, some have been generalized☆48Updated 7 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆91Updated 8 years ago
- Script to automate, manage, and multithread Nikto scans.☆57Updated 4 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 7 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆23Updated 10 years ago
- Random collection of exploit code, tools, scripts, etc.☆25Updated 9 years ago
- Linux pentest tools☆87Updated 5 years ago
- A reverse shell cheat-sheet tool☆39Updated 5 years ago
- API testing tool written with Python☆55Updated 7 years ago
- Scripts for OSCE☆18Updated 6 years ago
- A tool to generate email addresses from LinkedIn using google dorking.☆45Updated 6 years ago
- Collection of some scripts I've written in Perl, Python BASH, GO and JS to automate some common ops.☆33Updated 6 years ago
- This is a beginner level session to train you into using SSH more effectively. While pentesters may benefit (especially if they are plan…☆15Updated 5 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 6 years ago
- Automatic remote/local file inclusion vulnerability analysis and exploit tool☆61Updated 5 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆83Updated 6 years ago
- Helper scripts to assist penetration testing and exploit development☆36Updated last month
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Personal blog about security, exploitation, CTFs, ...☆20Updated 5 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆95Updated 4 years ago
- ☆0Updated 6 years ago
- Terribad PrivEsc enumeration script for Windows systems☆14Updated 4 years ago
- Determine everything you need to know to about a system☆30Updated 6 years ago
- Do some quick reconnaissance on a domain-based web-application☆13Updated 3 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 8 years ago
- Extension of sublister tool to check for subdomain takeovers☆22Updated 6 years ago