JackStouffer / Violent-Python
Code that I adapted from the "Violent Python" book
☆57Updated 10 years ago
Alternatives and similar repositories for Violent-Python:
Users that are interested in Violent-Python are comparing it to the libraries listed below
- Do some quick reconnaissance on a domain-based web-application☆13Updated 3 years ago
- A collection of Nmap NSE scripts that I made.☆27Updated 12 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆94Updated 4 years ago
- Script to automate, manage, and multithread Nikto scans.☆59Updated 5 years ago
- Some wordpress user enumeration scripts.☆39Updated 8 years ago
- Python SQL injection framework☆133Updated 3 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 10 years ago
- A tool to generate email addresses from LinkedIn using google dorking.☆46Updated 6 years ago
- API testing tool written with Python☆56Updated 8 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 7 years ago
- Personal blog about security, exploitation, CTFs, ...☆20Updated 6 years ago
- Examine HTTP response headers for common security issues☆39Updated 2 years ago
- Python version of OWASP's DirBuster Application.☆29Updated 10 years ago
- Quick scan to find live hosts on the network/across networks☆48Updated 10 years ago
- Listing subdomains about a main domain☆58Updated 6 years ago
- Shell-style script to search exploit-db.com exploits.☆60Updated 5 months ago
- These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)☆17Updated 7 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Various penetration testing tools written in Python. Based mostly on ideas and implementations presented in 'Violent Python: A Cookbook f…☆68Updated 8 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 11 years ago
- ☆18Updated 6 years ago
- ☆47Updated 9 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- A collection of nmap scripts I've written☆23Updated 8 years ago
- Scripts for OSCE☆18Updated 6 years ago
- ☆15Updated 2 years ago
- A number of scripts POC's and problems solved as pentests move along.☆44Updated 9 months ago
- PDF report generator for basic recon☆9Updated 6 years ago
- Weape-Wireless-EAP-Extractor☆27Updated 11 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆69Updated 7 years ago