JackStouffer / Violent-PythonLinks
Code that I adapted from the "Violent Python" book
☆57Updated 10 years ago
Alternatives and similar repositories for Violent-Python
Users that are interested in Violent-Python are comparing it to the libraries listed below
Sorting:
- Script to automate, manage, and multithread Nikto scans.☆60Updated 5 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 11 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆31Updated 7 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 8 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆93Updated 8 years ago
- This is a beginner level session to train you into using SSH more effectively. While pentesters may benefit (especially if they are plan…☆15Updated 6 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 8 years ago
- A tool to generate email addresses from LinkedIn using google dorking.☆46Updated 6 years ago
- Do some quick reconnaissance on a domain-based web-application☆13Updated 4 years ago
- Reconnaissance scripts for penetration testing☆57Updated 9 years ago
- Quick scan to find live hosts on the network/across networks☆48Updated 10 years ago
- My pentest cheat sheet☆15Updated 8 years ago
- Offensive Security Certified Profesional (OSCP) course scripts, some have been generalized☆51Updated 7 years ago
- PHP tool to test XSS☆22Updated 5 years ago
- (Unofficial) Python API for http://netcraft.com☆15Updated 8 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- Random collection of exploit code, tools, scripts, etc.☆26Updated 10 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆37Updated 7 years ago
- Practice Web App written in python with some vulnerabilities.☆34Updated 4 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 8 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- Collection of useful scripts.☆78Updated 2 years ago
- Scans a list of websites for Cloudfront or S3 Buckets☆104Updated 3 years ago
- ☆26Updated 8 years ago
- ☆28Updated 6 years ago
- Automated enumeration☆30Updated 4 years ago
- This tests a list of s3 buckets to see if they have dir listings enabled or if they are uploadable☆55Updated 11 months ago
- Linux bash tool for Enumeration & Privilege Escalation☆56Updated 5 years ago
- Python version of OWASP's DirBuster Application.☆29Updated 10 years ago
- Web interface for recon-ng☆14Updated 9 years ago