Python Penetration Testing Tools
☆17Jul 19, 2025Updated 7 months ago
Alternatives and similar repositories for python-pentesting
Users that are interested in python-pentesting are comparing it to the libraries listed below
Sorting:
- ☆537Feb 19, 2026Updated last week
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated last year
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- DefCon Red Team Village 2023 Workshop on DLL Sideloading☆19Aug 15, 2023Updated 2 years ago
- Cannon is a post-exploitation framework fully developed using python3. You will be able to download and upload files, run pre-defined mod…☆19Jul 21, 2021Updated 4 years ago
- Socks4 reverse proxy for penetration testing. Python 2 and 3 compatible.☆17Jul 1, 2022Updated 3 years ago
- Bug Bounty Recon Tools☆28Apr 13, 2024Updated last year
- Don't expect much :) Just expect to learn new things!☆64Mar 11, 2021Updated 4 years ago
- ☆28Jun 12, 2017Updated 8 years ago
- Pentest/Red Team: Resources, repos and scripts.☆82Nov 13, 2025Updated 3 months ago
- Simple Python script to sort nuclei scans by severity and URL☆29May 24, 2023Updated 2 years ago
- A collection of Bug Bounty Tips collected from GitHub to all bug bounty hunters☆29Dec 12, 2023Updated 2 years ago
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Jan 10, 2024Updated 2 years ago
- A solid recon tool I use personally.☆30May 12, 2023Updated 2 years ago
- XSS Bypass☆30Feb 15, 2024Updated 2 years ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆38Dec 16, 2024Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆42Aug 10, 2025Updated 6 months ago
- Template Nuclei SSTI☆34Nov 18, 2025Updated 3 months ago
- Secure NotebookLM MCP Server - Query Google NotebookLM from Claude/AI agents with 14 security hardening layers☆30Feb 20, 2026Updated last week
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆36Dec 12, 2023Updated 2 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆42Jul 18, 2024Updated last year
- A curated list of tools and techniques written from experience in weaponization of malware☆41Oct 26, 2023Updated 2 years ago
- Quotes Maker (quotesmaker.py) is a python based quotes to image converter. You can convert either one quote or pass a file containing quo…☆12Sep 8, 2020Updated 5 years ago
- This is a gui interface for airmon-ng☆14Mar 23, 2023Updated 2 years ago
- ATL.dll and WmiMgmt.msc UAC Bypass☆12Apr 26, 2025Updated 10 months ago
- Burp extension to specify the token value for the Authenication header while scanning.☆10Sep 18, 2018Updated 7 years ago
- BSentry is a comprehensive collection of additional security checks designed to enhance your Burp Suite experience.☆12Aug 16, 2024Updated last year
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆37Jul 27, 2025Updated 7 months ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆94Jul 3, 2021Updated 4 years ago
- ☆46Nov 5, 2025Updated 3 months ago
- ☆11Jan 1, 2025Updated last year
- ☆13Jul 9, 2024Updated last year
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- ☆10Jun 26, 2024Updated last year
- Learn Winapi in this Repo with examples, to understand its abstraction in reverse engineering for Windows.☆11Aug 8, 2022Updated 3 years ago
- How to really install tensorflow-gpu from source on a clean instance of Ubuntu☆11Sep 29, 2023Updated 2 years ago
- Pentester's toolbox☆12Jan 21, 2026Updated last month
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 5 years ago