python tools to assist in penetration testing
☆14Jan 19, 2026Updated 2 months ago
Alternatives and similar repositories for pypentesting
Users that are interested in pypentesting are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Reverse shell generator☆23Oct 3, 2019Updated 6 years ago
- gosocks is a golang based implementation of a socks5 server which supports custom handlers☆12Mar 10, 2026Updated last week
- A tool for recovering server credentials from a pgadmin4 database☆20Oct 16, 2021Updated 4 years ago
- A collection of Metasploit plugins I have written for various reasons.☆15Dec 5, 2020Updated 5 years ago
- GUI / CLI tools & resources used for Capture-The-Flags competitions and Computer Security learning☆12Aug 11, 2021Updated 4 years ago
- 🔥 Catalyst - THE Rust framework where webdev sucks less☆12Jun 10, 2025Updated 9 months ago
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆12May 11, 2023Updated 2 years ago
- Playing with Playwright☆10Sep 11, 2020Updated 5 years ago
- :e-mail: Enumerate usernames through SMTP service☆18Jun 30, 2019Updated 6 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 6 years ago
- An ARM disassembler written in Python that also generates pseudo-code☆15Jan 6, 2017Updated 9 years ago
- ☆13Aug 15, 2017Updated 8 years ago
- r2yara - Module for Yara using radare2 information☆35Oct 10, 2023Updated 2 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- Note:- Run this Script in root user.☆16Oct 13, 2017Updated 8 years ago
- Quickly add http and https domains to BurpSuite's scope with all paths.☆16Jun 2, 2016Updated 9 years ago
- Let's learn end to end automation by automating a full application.☆15Aug 17, 2023Updated 2 years ago
- Perl wrapper for the capstone library☆13Mar 7, 2017Updated 9 years ago
- LD_PRELOAD Linux rootkit (x86 & ARM)☆26Apr 8, 2019Updated 6 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆55Oct 1, 2020Updated 5 years ago
- A framework for writing and running regression tests for RetDec and related tools.☆24Feb 3, 2025Updated last year
- Open-source advanced cracking tool made in Electron.JS☆19Jul 7, 2020Updated 5 years ago
- Code execution via Python package installation.☆170Nov 28, 2018Updated 7 years ago
- Windows based IRC Bot☆44Aug 5, 2014Updated 11 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago
- Multi source CVE/exploit parser.☆27Aug 30, 2017Updated 8 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆37Sep 30, 2019Updated 6 years ago
- MERK is an open source, cross-platform, multiple-document interface GUI IRC client for Windows, Linux, and macOS written in Python, PyQt5…☆40Updated this week
- golang program to parse Pastebin for keywords and send them per E-Mail☆33Sep 1, 2025Updated 6 months ago
- put this here because archival reasons.☆28Feb 18, 2018Updated 8 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆26Feb 4, 2017Updated 9 years ago
- Scripts for OSCE☆18Dec 28, 2018Updated 7 years ago
- Setup of NGINX, and turning it into a Reverse Proxy with hardened rules/settings.☆11Apr 22, 2020Updated 5 years ago
- glibc getcwd() local privilege escalation compiled binaries☆32Feb 9, 2018Updated 8 years ago
- Perl IRC Bot for scanning and exploiting VNC servers on several ports using Mojo::IRC module.☆12Oct 27, 2021Updated 4 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 12 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Oct 11, 2015Updated 10 years ago
- TOOL - Unauthenticated Remote DNS , Scanner ranger IP.☆11Feb 18, 2015Updated 11 years ago
- 💉 A tool that allows shellcode injection into another process's memory space. It works for both Windows x64 and x86 systems.☆12Oct 1, 2019Updated 6 years ago