apsdehal / HackPyLinks
A collection of notes and script that will help you learn basics of hacking with Python
☆34Updated 11 years ago
Alternatives and similar repositories for HackPy
Users that are interested in HackPy are comparing it to the libraries listed below
Sorting:
- Virtual host brute forcer☆22Updated 12 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Updated 10 months ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Updated 9 years ago
- Arp spoof detection tool☆26Updated 8 years ago
- Pastenum is a text dump enumeration tool.☆14Updated 12 years ago
- Here comes the paintrain!☆11Updated 9 years ago
- Local enumeration and exploitation framework.☆18Updated 8 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆13Updated 12 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- A modular framework and program for synchronous pwning with ssh, powered by Python 3, for educational and controlled penetration testing…☆10Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30Updated 9 years ago
- ☆17Updated 10 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Updated 12 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- RSYaba Modular Brute Force Attacker☆19Updated 11 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 11 years ago
- Generate customized and undetectable exploits for Metasploit.☆22Updated 8 years ago
- Linux and Windows Hardening Points☆12Updated 7 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 12 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 15 years ago
- NMAP Patches and NSE Scripts☆19Updated 12 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Updated 5 years ago
- Searches for interesting cached DNS entries.☆55Updated 11 years ago
- Python OSINT Tool to retrieve pictures from a specific location using Instagram API☆36Updated 10 years ago
- Recursively searches a directory for any file containing a specified string☆48Updated 10 years ago
- Multi source CVE/exploit parser.☆27Updated 8 years ago
- Suite for Information gathering☆12Updated 7 years ago
- (Unofficial) Python API for http://namechk.com☆20Updated 10 years ago