You guessed well, genius !! This tool is intended for the initiation to ethical hacking with python
☆72Aug 11, 2019Updated 6 years ago
Alternatives and similar repositories for hacking-with-python
Users that are interested in hacking-with-python are comparing it to the libraries listed below
Sorting:
- Simple Penetration Testing Multitool For Beginners.☆60Dec 8, 2022Updated 3 years ago
- Bug Hunting Penetration RGB Hat are red, gray, and black hat☆19Jan 21, 2026Updated 2 months ago
- A collection of useful Python hacking scripts for beginners.☆17Apr 20, 2021Updated 4 years ago
- Ferramenta para criação de payloads HID (human interface device) para android sem nethunter ou rubber ducky☆18Aug 11, 2018Updated 7 years ago
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 5 years ago
- create unlimited passwords to brute force any account! This tool is created only for educational purpose.☆28Apr 30, 2023Updated 2 years ago
- Keylogger em Python☆48Jul 10, 2023Updated 2 years ago
- Python script to automatically steal all the files and information from a computer using an USB device. Created just for educational purp…☆63Jan 10, 2026Updated 2 months ago
- Red Teaming Tactics and Techniques☆13Feb 10, 2022Updated 4 years ago
- Different utility scripts for pentesting and hacking.☆45Nov 10, 2017Updated 8 years ago
- Get All Registered Wifi Passwords from Target Computer.☆702Jan 30, 2024Updated 2 years ago
- Personal version of tools from Black Hat Python☆41Dec 23, 2021Updated 4 years ago
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆255Mar 21, 2024Updated 2 years ago
- Network sniffing automation with Bettercap as rogue AP or as client in your network☆25May 30, 2022Updated 3 years ago
- <BLACKHAT> Generates CCN|{day}/{year}|{CVV} *** FOR EDUCATIONAL …☆38Jun 25, 2023Updated 2 years ago
- ☆16May 22, 2024Updated last year
- KeyloggerScreenshot is an intelligent tool which logs keys, makes a Screenshot every 20 seconds, recordes the mouse click with x and y po…☆136Oct 28, 2025Updated 4 months ago
- thelordseye searches and returns detailed information about devices that are directly connected to the internet [IoT] (Smart TV's, Fridge…☆77Oct 25, 2023Updated 2 years ago
- CTF tasks created☆11Jan 12, 2023Updated 3 years ago
- Python google hacking (dorking) script.☆18Jul 15, 2018Updated 7 years ago
- File Clonnig☆12Apr 18, 2024Updated last year
- Docker Challenge creation for CTFd. Allows per team/user containers!☆10Sep 8, 2021Updated 4 years ago
- ssh public host key scanner using shodan☆118Mar 11, 2019Updated 7 years ago
- Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 …☆1,028Jun 16, 2025Updated 9 months ago
- Modular C2 server to tame your pack of wolves☆22Mar 14, 2026Updated last week
- A script to build either Blackarch, Kali linux or ParrotOS Docker container which has the ability to provide desktop environment access e…☆42Jan 12, 2022Updated 4 years ago
- The CyberSecurity Framework (CSF for short) is a local Python3 scripting package which aims directly on Cyber Security auditing, where yo…☆41Oct 28, 2017Updated 8 years ago
- InfoG is an information gathering tool. You can find ip addresses, phone number details and much more.☆37Nov 26, 2020Updated 5 years ago
- An opensource Prank Startup Malware for windows developed using C Programming Language.☆24Aug 10, 2020Updated 5 years ago
- Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.☆2,710Apr 20, 2024Updated last year
- You can track location & service provider details of any phone number by using this project.☆10Feb 19, 2022Updated 4 years ago
- OverWatchINT is an Open Source Intelligence and All-in-One Hacking Tool. It's purpose is to reduce the time and efforts of security resea…☆11May 15, 2022Updated 3 years ago
- اداة تقوم بالتخمين على اللوحات والشل اتمنى ان ينال على اعجابكم☆12Sep 8, 2019Updated 6 years ago
- Grab images and videos and more from Instagram☆17Sep 19, 2020Updated 5 years ago
- A web spider for shodan.io without using the Developer API.☆33Jan 4, 2018Updated 8 years ago
- Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security h…☆14May 8, 2021Updated 4 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆30Feb 27, 2026Updated 3 weeks ago
- Camera Hack bot - Powered by XPH4N70M☆24May 26, 2023Updated 2 years ago
- Spider or repeater to find all links.☆10Feb 7, 2021Updated 5 years ago