RobinDavid / Python-programsLinks
Contains various python programs and proof of concept.
☆10Updated 10 years ago
Alternatives and similar repositories for Python-programs
Users that are interested in Python-programs are comparing it to the libraries listed below
Sorting:
- This program focuses on automating the download, installation and compilation of pentest tools from source☆33Updated 7 years ago
- A collaborative CTF framework written in Django.☆17Updated 11 years ago
- A python implementation of airodump-ng☆82Updated 3 years ago
- (Unofficial) Python API for http://netcraft.com☆15Updated 9 years ago
- H2HC 2016 Slides/Materials/Presentations☆29Updated 9 years ago
- Funtenna P0C code demonstrated at Blackhat 2015☆93Updated 10 years ago
- Cracking real-world Crypto, the fun way☆20Updated 9 years ago
- "Zero Click" Remote Code Execution in Mycroft AI vocal assistant☆56Updated 7 years ago
- Pwn2Win CTF 2017☆27Updated 8 years ago
- Program to search tweets, tag, hashtag, user, with locations and maps☆36Updated 10 years ago
- ☆31Updated 11 years ago
- Man in the middle automated attacks☆21Updated 10 years ago
- Funnel is a lightweight yara-based feed scraper☆38Updated 2 years ago
- Protect your parents from phishing☆40Updated 8 years ago
- Fucking Search Engines Scraper - python library to scrap url's from search engines☆49Updated 8 years ago
- Py class that returns fastest http proxy☆55Updated 7 years ago
- Smarter Coffee terminal client.☆94Updated 9 years ago
- Code execution via Python package installation.☆170Updated 7 years ago
- Scapy hands-on at #GreHack16☆15Updated 9 years ago
- Scan for vulnerabilities in JavaScript libraries you use (Python port of retirejs)☆51Updated 6 years ago
- It's a tool to manage vulnerables packages in your *nix server, in a centralized way☆30Updated 5 years ago
- ☆10Updated 9 years ago
- python script to decrypt Firefox stored passwords☆37Updated 11 years ago
- Panic button for protection against cold boot attacks☆146Updated 4 years ago
- ☆13Updated 5 years ago
- Automatically exported from code.google.com/p/miranda-upnp☆69Updated 8 years ago
- This is the write-up of my research presented at the Ethical Hacking Conference Budapest in May 2016☆116Updated 9 years ago
- a 802.11 wireless fuzzer☆93Updated 13 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 7 years ago
- WARCARRIER RF Scanning Terminal with Advanced Logging Features☆60Updated 7 years ago