averagesecurityguy / Python-ExamplesLinks
Example scripts for common python tasks
☆57Updated 13 years ago
Alternatives and similar repositories for Python-Examples
Users that are interested in Python-Examples are comparing it to the libraries listed below
Sorting:
- Scratch space for various python lessons I am trying to work through☆118Updated 5 years ago
- Effective Python Penetration Testing by Packt Publishing☆341Updated 3 years ago
- ☆330Updated 5 years ago
- My Presentations in PDF☆29Updated 9 years ago
- Tool to scrape LinkedIn☆97Updated 8 years ago
- Get detailed information about a Twitter user activity☆101Updated 10 years ago
- ☆68Updated 12 years ago
- Various penetration testing tools written in Python. Based mostly on ideas and implementations presented in 'Violent Python: A Cookbook f…☆70Updated 9 years ago
- scrapin' proxies with ocr☆19Updated 7 years ago
- NoobSecToolkit is a Python Based Tool kit that brings together powerful security and anonymity tools and scripts with predefined security…☆114Updated last year
- "Hacking Secret Ciphers with Python" programs☆359Updated 4 years ago
- A repository for large scripts from my book.☆160Updated 4 years ago
- A Github organization reconnaissance tool.☆218Updated 2 years ago
- Mercure is a tool for security managers who want to train their colleague to phishing.☆269Updated 4 years ago
- Python 3 scripts based on lessons learned from Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Securit…☆63Updated 8 years ago
- Python SQL injection framework☆133Updated 4 years ago
- The Hacker's ToolBox☆190Updated 8 years ago
- Social Engineering for the Blue Team☆11Updated 2 years ago
- Useful pentesting scripts☆85Updated last year
- Chat with hacker assistant☆194Updated 8 years ago
- tools which can be used by forensics experts and ethical hackers☆181Updated 9 years ago
- Various Cheat Sheets related to development and security☆144Updated 5 years ago
- Building a community for those that both seek and wish to provide mentorship in Information Security.☆19Updated 2 years ago
- Unofficial Kali Documentation Project☆159Updated 10 years ago
- Defcon24 Workshop Contents : Ninja Level Infrastructure Monitoring☆127Updated 9 years ago
- Python backdoor that uses http post/get requests to communicate☆42Updated 9 years ago
- A ctypes powered python keylogger.☆107Updated 6 years ago
- Advanced Hash Manipulation☆175Updated 6 years ago
- Helper scripts to remaster Linux Live CD images for the purpose of creating ready to use security wargames with pre-installed vulnerabili…☆52Updated 4 years ago
- Automated WiFi limit evasion☆119Updated 9 years ago