Black Hat Python: Python for Pentesters, by EC-Council
☆34Jun 20, 2024Updated last year
Alternatives and similar repositories for Black-Hat-Python-Python-for-Pentesters
Users that are interested in Black-Hat-Python-Python-for-Pentesters are comparing it to the libraries listed below
Sorting:
- Shell Scripting with Bash, by EC-Council☆11Jun 4, 2021Updated 4 years ago
- BlackHat C++ : C++ For Pentesters, by EC-Council☆75Jun 27, 2023Updated 2 years ago
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆26Dec 13, 2022Updated 3 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Mar 1, 2023Updated 3 years ago
- ☆18Sep 13, 2021Updated 4 years ago
- ☆27Mar 14, 2026Updated last week
- Atlassian Confluence Server 7.5.1 Pre-Authorization Arbitrary File Read vulnerability (CVE-2021-26085)☆14Oct 12, 2021Updated 4 years ago
- Firefox with steroids☆16Jun 15, 2025Updated 9 months ago
- اول اداة ددوس اتاك عربيه 🇱🇾☆25Jun 18, 2024Updated last year
- POC for CVE-2023-24488☆14Jul 4, 2023Updated 2 years ago
- Interactive and responsive personal portfolio website showcasing Amine’s projects, skills, blog, and contact information.☆34Nov 17, 2025Updated 4 months ago
- Pentesting Fundamentals for Beginners, by EC-Council☆11Nov 17, 2022Updated 3 years ago
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated last year
- Deep Dive into Hacking and Pentesting, by EC-Council☆17Oct 28, 2022Updated 3 years ago
- Avoid malicious payloads in your webapp with machine learning!☆21Feb 6, 2023Updated 3 years ago
- Passkeep is a simple password manager written in python that fits for personal use only.☆13Oct 30, 2022Updated 3 years ago
- ☆13Sep 28, 2024Updated last year
- Sample Vulnerable and Secure Code Snippets for Various Vulnerabilities☆23Jun 18, 2024Updated last year
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆55Dec 23, 2024Updated last year
- Website Component : Popup Modal Made using HTML CSS and JavaScipt.☆14May 17, 2023Updated 2 years ago
- OpenVAS plugin for GLPi☆13Mar 22, 2022Updated 3 years ago
- ☆12Aug 1, 2024Updated last year
- Fork of OpenSearch Dashboards Security Plugin.☆12Updated this week
- pocsuite3 poc&exp☆24Apr 9, 2025Updated 11 months ago
- CVE-2024-6387 exploit☆14Jul 2, 2024Updated last year
- It is Exploratory Data Analysis of IPL 2023 Auction dataset.☆11Feb 9, 2024Updated 2 years ago
- ☆11Dec 31, 2018Updated 7 years ago
- Tor VPN☆29Feb 25, 2026Updated 3 weeks ago
- Helm charts for deploying Malcolm☆16Mar 12, 2026Updated last week
- ☆15Sep 13, 2023Updated 2 years ago
- A comprehensive guide on SSH penetration testing techniques and methodologies. Authored by Abhinav Sharma, founder and CEO of Global Offe…☆12Jul 1, 2023Updated 2 years ago
- 𝙱𝚛𝚞𝚝𝚎𝚏𝚘𝚛𝚌𝚎 𝚊𝚝𝚝𝚊𝚌𝚔 𝚝𝚘 𝚒𝚗𝚜𝚝𝚊𝚐𝚛𝚊𝚖 𝚞𝚜𝚎𝚛𝚗𝚊𝚖𝚎 𝚠𝚒𝚝𝚑 𝙿𝚢𝚝𝚑𝚘𝚗☆13Mar 10, 2023Updated 3 years ago
- Ataque WPS transparente con rogue AP☆24Aug 8, 2024Updated last year
- Turn a supported list of filetypes (e.g. .docx) into a markdown structured text file. Also optionally defangs indicators and extract text…☆12Mar 4, 2026Updated 2 weeks ago
- AsmrProg Youtube Channel Bootstrap Slider Source Code.☆22Dec 12, 2023Updated 2 years ago
- 🎉 Happy 4th anniversary to the ResetHacker community! 🎉☆11Aug 8, 2024Updated last year
- ☆71May 15, 2025Updated 10 months ago
- Mind-Maps of Several Things☆12Dec 22, 2021Updated 4 years ago
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Dec 24, 2023Updated 2 years ago