Source code and exercises from the book "Black Hat Python" by Justin Seitz.
☆164Jun 19, 2024Updated last year
Alternatives and similar repositories for blackhat_python_book_code
Users that are interested in blackhat_python_book_code are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- wifi dos attack tool☆62Nov 17, 2022Updated 3 years ago
- A Very Cool Process Injector That supports both Shellcode injection and dll injection☆26Sep 22, 2025Updated 7 months ago
- A console utility to bring up new Tor nodes easily☆23May 7, 2022Updated 4 years ago
- Sample ChatGPT-style Q&A app via RAG-pattern on Video transcripts.☆15Jan 10, 2024Updated 2 years ago
- ☆18Nov 25, 2025Updated 5 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Informatrion Gathering Framework☆23Aug 28, 2022Updated 3 years ago
- Free Email Providers☆11Aug 15, 2023Updated 2 years ago
- ShoLister is a tool that collects all available subdomains for specific hostname or organization from Shodan. The tool is designed to be …☆60May 10, 2022Updated 4 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆22Feb 12, 2023Updated 3 years ago
- Offline AI Security Assistant for Air-Gapped Pentesting☆82Apr 19, 2026Updated last month
- Welcome SecToolkit repository! This is a comprehensive collection of cybersecurity and bug bounty hunting topics. Here, you'll find a var…☆49Jun 3, 2025Updated 11 months ago
- 🎩 [penetration testing Book], Kali Magic, Cryptography, Hash Crack, Botnet, Rootkit, Malware, Spyware, Python, Go, C|EH.☆17Apr 15, 2021Updated 5 years ago
- Detect leaks in security event logs.☆20Apr 9, 2019Updated 7 years ago
- buffer overflow examples☆24Dec 20, 2017Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A small library to alter AWS API requests; Used for fuzzing research☆22Nov 2, 2023Updated 2 years ago
- Short Python script for parsing Defender VDM signature files.☆10Sep 22, 2024Updated last year
- The launcher for Unitystation, an open source remake of Space Station 13.☆13Nov 8, 2025Updated 6 months ago
- Quickly filter in-scope domains & urls for bug bounty☆20Mar 19, 2021Updated 5 years ago
- A comprehensive collection of CyberSecurity PDFs. Guides, Research Papers, Education, Information Security, Network Security, Cryptograph…☆116Sep 16, 2024Updated last year
- this is some scripts for pentesting zabbix server☆13Feb 25, 2018Updated 8 years ago
- PWNable pyjail☆13Jan 13, 2025Updated last year
- ☆14Feb 12, 2026Updated 3 months ago
- Shodan Dorks 2023☆244Jan 13, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Installation: Install the NetHunter-Store app from: https://store.nethunter.com/ From the Kali NetHunter Store, install Termux, NetHunt…☆16Dec 18, 2021Updated 4 years ago
- 0x0p1n3r is set of combination of other tools and one line scripts to find subdomains easily and to check subdomain takeover☆57Dec 15, 2020Updated 5 years ago
- ☆16Mar 3, 2025Updated last year
- Automated Recon Tool Installer☆16Jun 29, 2022Updated 3 years ago
- A very simple AEM detector written in rust.🦀☆20Jun 27, 2023Updated 2 years ago
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆20Mar 24, 2026Updated last month
- This repo offers comprehensive information, necessary tools, and instructional videos for beginners in Android penetration testing, provi…☆24Jun 12, 2023Updated 2 years ago
- Ultimate Internet of Things/Industrial Control Systems reconnaissance tool.☆11Feb 11, 2022Updated 4 years ago
- List of some cybersecurity conferences☆59Apr 23, 2026Updated 3 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- URL Fuzzing Tool.☆28Apr 21, 2025Updated last year
- Hacking and Learning consistently for 100 days straight af.☆18Apr 12, 2022Updated 4 years ago
- InfoStealer and worm networking brute telnet,ftp,ssh,smb,rdp combine together both are bestfriend☆46Apr 14, 2026Updated last month
- Free speech to text☆135Dec 1, 2023Updated 2 years ago
- VOID is for scanning and hacking. There is many popular tools in VOID. You can scan web databases and vulnerabilities. Also you can brute…☆37May 23, 2022Updated 3 years ago
- Advanced RAT written in C#, fully controllable through Control-Panel, Discord with dedicated GUI builder to make preparation easier.☆29Jul 27, 2025Updated 9 months ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago