andreffs18 / violent-pythonLinks
Scripts and code example about penetration testing, web, network and exploiting wireless devices.
☆14Updated 7 years ago
Alternatives and similar repositories for violent-python
Users that are interested in violent-python are comparing it to the libraries listed below
Sorting:
- Simple security surveillance script for linux distributions.☆60Updated 8 years ago
- Massive arsenal of hacker tools...☆78Updated 7 years ago
- Samsung TV Denial of Service (DoS) Attack☆36Updated 8 years ago
- Attacking WPA/WPA encrypted access point without client.☆51Updated 11 years ago
- Learn python3 in one picture.☆17Updated 9 years ago
- A Kali Linux Tool to assist with security audits and pentesting. Lots of wrappers for commonly used tools to help extend their usefulness…☆31Updated 12 years ago
- Post-Exploitation Framework☆78Updated 8 years ago
- Security program for recovering passwords and pen-testing servers, routers and IoT devices using brute-force password attacks.☆50Updated last year
- Hacking environment installation scripts for OS X☆27Updated 3 years ago
- Powershell Framework to make an USB auto-executable on infected machines.☆35Updated 8 years ago
- The 802.11 Hacking Repo.☆37Updated 10 years ago
- Papers about known hacking, security, hardware, software, computer, network and other ressources.☆76Updated 5 years ago
- Misc scripts and tools for WiFi☆105Updated 4 years ago
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆34Updated 8 years ago
- Black Nurse DOS attack☆72Updated 7 years ago
- ARP spoof then session jack within your browser☆28Updated 11 years ago
- Prints the IPs on your local network that're sending the most packets☆151Updated 4 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Updated 9 years ago
- Pentesting Hacking Tools, Scripts, Windows, Linux,☆28Updated 9 years ago
- Wifi sniffing and hijacking tool☆79Updated 10 years ago
- Scripts and tools for ISM hacking☆16Updated 7 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆19Updated 8 years ago
- Keylogger using FTP server as an intermediate with some cool additional functions☆22Updated 8 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆40Updated 9 years ago
- PoC Android smart phone botnet☆78Updated 13 years ago
- USB Attack to Decrypt Wi-Fi Communications☆32Updated 10 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- Wi-Fi Backdoors☆39Updated 10 years ago
- Package manager for hackers built by hackers☆36Updated 6 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆37Updated 9 years ago