aw-junaid / Black-Hat-PythonLinks
A collection of advanced Python scripts for cybersecurity, penetration testing, and ethical hacking.
☆46Updated 7 months ago
Alternatives and similar repositories for Black-Hat-Python
Users that are interested in Black-Hat-Python are comparing it to the libraries listed below
Sorting:
- A guide to using Kali Linux tools for web penetration testing, ethical hacking, forensics, and bug bounty. Covers setup, key tools, metho…☆41Updated 5 months ago
- Bash For Ethical Hacking☆72Updated 2 years ago
- WebSift is an OSINT ethical hacking tool designed to scrape and extract emails, phone numbers, and social media links or other URLs from …☆163Updated 3 weeks ago
- Obtain a Phone Number full profile including HLR, Reputation, Carrier, Social Media Accounts, Geolocation, Validation, Availabilty, Porta…☆267Updated last year
- SilverInstaEye is a comprehensive OSINT tool for Instagram. It gathers extensive information about the target user.☆155Updated 5 months ago
- We, the WormGPT organization, created an AI to help you code and answer your questions.☆128Updated last year
- Hackcctv☆206Updated 4 months ago
- A framework like a metasploit containg a variety of modules for pentesting or ethical hacking. This repo willl be updated and new modules…☆187Updated 4 months ago
- WormGPT is a malicious AI tool promoted on the dark web as the adversary of ChatGPT. It automates the creation of convincing personalized…☆315Updated last year
- This tool will generate a virus that can only destroy Windows computer. You can also configure to auto run in usb drive☆279Updated 8 months ago
- "Essential Kali Linux commands for ethical hackers and penetration testers."☆107Updated 2 years ago
- Hacx GPT a powerful, evil brother of WormGPT.☆433Updated 2 weeks ago
- fsociety is a penetration toolkit inspired from MR. ROBOT☆97Updated 10 months ago
- Evil Eye is a tool of python based program for simple audio steganography.☆60Updated 3 years ago
- This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in …☆643Updated 6 months ago
- The best WiFi spy avalaible for hire! Made for hackers, for hackers☆224Updated 6 years ago
- Net Strike is a powerful multi-protocol DDoS tool written in Python. It uses IP spoofing for anonymity and maximizes attack speed with mu…☆73Updated 4 months ago
- It is a advanced keylogger.☆63Updated last year
- Bluetooth DOS Attack Script for Educational Purposes. Used in School Project☆160Updated 3 years ago
- HackerGPT Cyber-Security Companion☆60Updated 2 months ago
- tool used to change your IP every second your want☆407Updated last year
- This is a collection of important onion sites that you can leverage for Deepweb and Darkweb Monitoring☆201Updated last year
- GRIM IS A INFORMATION GATHERER AND VULNERABILITY TESTER TOOL, YOU CAN USE IT ON ANY WEBSITE FOR GETTING ITS INFORMATION☆112Updated 4 years ago
- A dos (denial of service) attack for local networks using dead router attack (IPv6) and ARP attack (IPv4) simultaneously☆125Updated 5 months ago
- Advanced phishing investigation and disruption toolkit written in Python xo☆42Updated last month
- hulk is a ddos attacking tool☆165Updated 10 months ago
- Advance OTP Bypass Tool. Termux Supported.☆94Updated 7 months ago
- An email scraper tool has an email finder browser extension that extracts email addresses from a website, website, or social media platfo…☆79Updated 3 years ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆98Updated 2 years ago
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆222Updated last year