Solid Python toolkit for those in the security industry. Some by me, most by smarter people.
☆56Jan 20, 2025Updated last year
Alternatives and similar repositories for Python-Security-Tool-Database
Users that are interested in Python-Security-Tool-Database are comparing it to the libraries listed below
Sorting:
- The goal of this guide is very simple - to teach anyone interested in cyber security, regardless of their knowledge level, how to make th…☆835Jun 27, 2025Updated 8 months ago
- Alfred is a advanced OSINT information gathering tool☆11Nov 14, 2025Updated 3 months ago
- ☆10Jan 1, 2023Updated 3 years ago
- Extract WinSCP Credentials from any Windows System or winscp config file☆22Jul 10, 2025Updated 7 months ago
- OSINTk.o is a customized Kali Linux-based ISO image with pre-installed packages and scripts☆293Nov 2, 2023Updated 2 years ago
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆16Jun 25, 2025Updated 8 months ago
- List of the main services that focus on Poland and Polish-speaking communities☆69Sep 18, 2025Updated 5 months ago
- Seekolver is a tool focused on attack-surface mapping. It performs searches for subdomains associated with root domains and root domains …☆40Dec 11, 2023Updated 2 years ago
- Discover and monitor internet assets using favicon hashes across search engines.☆226Oct 11, 2025Updated 4 months ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Apr 9, 2025Updated 10 months ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆15Aug 16, 2022Updated 3 years ago
- A collaborative hub for Nuclei templates. Contribute, share, and explore powerful vulnerability detection tools!☆50Feb 1, 2025Updated last year
- This repository contains tutorials and tools for working with IP search engines. Search engines that search all devices connected to the …☆311Aug 27, 2025Updated 6 months ago
- Current links from the OSINT Inception start-me project☆192May 15, 2023Updated 2 years ago
- Step-by-step guide to building a custom machine for OSINT activities. The Basic Package includes a robust LINUX system strengthening proc…☆127Feb 22, 2024Updated 2 years ago
- ☆131Oct 13, 2023Updated 2 years ago
- The app is used to download posts from Telegram feeds and save them to text files for later OSINT AI use☆53Mar 31, 2025Updated 11 months ago
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆787Jan 9, 2025Updated last year
- Script to test NetSec capabilities.☆21May 1, 2023Updated 2 years ago
- Cast your OSINT net further a field and see what else you can discover on the Internet.☆92Nov 29, 2025Updated 3 months ago
- ☆12Jul 29, 2019Updated 6 years ago
- In this repository you will find sample commands and test files for each day of the course "Linux for OSINT. A 21-day course for beginner…☆577Jan 6, 2026Updated last month
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager☆23Jan 4, 2025Updated last year
- OSINT tool to find info about your old pages.☆19Mar 19, 2022Updated 3 years ago
- Here is where I upload all the notes i take about the Ethereum world to share with everyone.☆23Nov 6, 2018Updated 7 years ago
- 针对多个框架的高度自定义的内存马一键打入工具 | A highly customized memory shell one-click injection tool for multiple frameworks☆49Feb 6, 2024Updated 2 years ago
- ☆24Oct 12, 2021Updated 4 years ago
- A Red Teaming tool focused on profiling the target.☆29Jan 10, 2026Updated last month
- BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python…☆335Sep 11, 2025Updated 5 months ago
- Strumenti utili per la ricerca di WebCam e Wifi di pubblico accesso - Useful tools for searching for public access webcams and Wi-Fi netw…☆109Dec 20, 2024Updated last year
- Burp Suite's extension to scan and crawl Single Page Applications☆107Apr 14, 2023Updated 2 years ago
- This repository contains the best fuzzing wordlist files☆34Dec 2, 2024Updated last year
- System that detects danger levels relative to drivers. Once a driver overpasses a biker, the system detects this unauthorised act, and re…☆10Apr 19, 2021Updated 4 years ago
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆261Jul 2, 2025Updated 7 months ago
- Workshop & Talk Slide Decks from HackSpaceCon☆26Dec 14, 2025Updated 2 months ago
- Penetration-List: A comprehensive resource for testers, covering all types of vulnerabilities and materials used in Penetration Testing. …☆885Dec 28, 2025Updated 2 months ago
- Creazione d'identità Fake - Impostazione Privacy Profili Social - Creazione Ambiente di Lavoro☆460Jan 18, 2026Updated last month
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆63Apr 13, 2024Updated last year
- Source code and examples for PassiveAggression☆64Jun 6, 2024Updated last year