The source codes for my book Understanding Network Hacks - Attack and defense with Python
☆170Dec 8, 2020Updated 5 years ago
Alternatives and similar repositories for python-network-hacks
Users that are interested in python-network-hacks are comparing it to the libraries listed below
Sorting:
- Bypass AntiVirus with Python and Metasploit using shellcode☆11Mar 25, 2016Updated 9 years ago
- But actually for hackers☆31Mar 29, 2020Updated 5 years ago
- ⛷ A collection of hacker scripts.☆28Jan 24, 2017Updated 9 years ago
- Python3 source code and hack code.☆16Dec 19, 2022Updated 3 years ago
- Learning-Pentesting-With-Python☆18Sep 26, 2018Updated 7 years ago
- A remote keylogger with some cool features☆46Jul 29, 2024Updated last year
- Small ESP32 PCB to drive LED Strips☆12Jul 2, 2019Updated 6 years ago
- ARP Exploitation in Python☆10Feb 19, 2017Updated 9 years ago
- Add your configs for tmux☆18Apr 3, 2022Updated 3 years ago
- Python 3 scripts based on lessons learned from Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Securit…☆63Jan 3, 2018Updated 8 years ago
- Simple command line integration to Chat GPT☆11Jan 23, 2023Updated 3 years ago
- Scrippy is a browser extension that holds sql statements (think clip board) to aid devlopers in the testing of websites for basic code in…☆12Aug 21, 2022Updated 3 years ago
- Short Python script that attempts to neuter USB Rubber Duckies.☆13Jun 25, 2019Updated 6 years ago
- Lightweight reverse phone lookup single page application built with Vue, Webpack, Babel, Element-UI, and Bootstrap 4. Using the Whitepage…☆12Sep 14, 2018Updated 7 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- A list of webshells☆17Jul 1, 2023Updated 2 years ago
- Mac OS X Plist parser for NodeJS. Convert a Plist file or string into a native JS object☆11Sep 28, 2022Updated 3 years ago
- Some scripts to do a ping of death attack.☆11Mar 21, 2017Updated 8 years ago
- Download your Ring doorbell videos from The Cloud™☆13Dec 10, 2022Updated 3 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Jan 4, 2023Updated 3 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆31Mar 2, 2022Updated 3 years ago
- Compilation of commands for hacking tasks and security tools as a bit of everything☆14Jul 3, 2025Updated 7 months ago
- Gopro wifi command hack---a sniff result of Gopro App . The Json file can be used as a Gopro control API. Simply connect to yout Gopro ho…☆15Feb 19, 2016Updated 10 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆14May 15, 2019Updated 6 years ago
- Walmart Web Scraper written in Python 3 to extract coupon details for a store location☆14Mar 21, 2018Updated 7 years ago
- using python to hack☆32Mar 29, 2016Updated 9 years ago
- Backdoor, keylogger, mac changer, mitm, netscan, sniffer☆15Aug 15, 2024Updated last year
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆17Dec 23, 2021Updated 4 years ago
- A simple keylogger made in python☆16Aug 10, 2017Updated 8 years ago
- Low cost ventilator based on Dr. Jeffrey Ebin's design☆21Apr 10, 2020Updated 5 years ago
- Intelligence gathering framework☆16Jul 23, 2015Updated 10 years ago
- This is a basic Python script that accepts a website's url in string format to initiate a DDoS attack. For educational purposes only.☆14Jan 3, 2015Updated 11 years ago
- A fake syskey app for dealing with those pesky tech support scammers☆16Sep 26, 2016Updated 9 years ago
- An tool for search IOT MQTT vulnerable with shodan☆20Sep 15, 2017Updated 8 years ago
- A small and efficient tool to find open redirect vulnerabilities.☆17Sep 24, 2021Updated 4 years ago
- Helping my friend with her economics research project by scraping drug information from DarkWeb using selenium and Tor☆18Mar 12, 2020Updated 5 years ago
- [Under Development] This is a modification to the Ubertooth One firmware developed by Great Scott Gadgets. The modified firmware is able …☆22Feb 22, 2022Updated 4 years ago
- Github repository with Write Up, AutoPwn, Tools, Videos of CTF's from HackTheBox and TryHackMe☆19Aug 13, 2022Updated 3 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago