Black Hat Python: Python for Pentesters, by EC-Council
☆34Jun 20, 2024Updated last year
Alternatives and similar repositories for Black-Hat-Python-Python-for-Pentesters
Users that are interested in Black-Hat-Python-Python-for-Pentesters are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Complete Mobile Ethical Hacking, by EC-Council☆39Dec 23, 2020Updated 5 years ago
- Shell Scripting with Bash, by EC-Council☆11Jun 4, 2021Updated 4 years ago
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆27Dec 13, 2022Updated 3 years ago
- ☆19Sep 13, 2021Updated 4 years ago
- This repository contains the files that provide the upload functionality in the IIS Server☆37Aug 4, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- O Vansor Forensic Collector é um script de automação desenvolvido para coleta, validação e análise de dados em servidores Linux.☆12Sep 9, 2024Updated last year
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆11May 19, 2020Updated 6 years ago
- Atlassian Confluence Server 7.5.1 Pre-Authorization Arbitrary File Read vulnerability (CVE-2021-26085)☆14Oct 12, 2021Updated 4 years ago
- 📸🚀HTML5 QR Scan App! This innovative application, built using HTML5, PHP, and the power of [html5-qrcode](https://github.com/mebjas/htm…☆11Aug 25, 2024Updated last year
- POC for CVE-2023-24488☆14Jul 4, 2023Updated 2 years ago
- Interactive and responsive personal portfolio website showcasing Amine’s projects, skills, blog, and contact information.☆38Nov 17, 2025Updated 6 months ago
- Pentesting Fundamentals for Beginners, by EC-Council☆11Nov 17, 2022Updated 3 years ago
- OSCP prep checklist - study plan, exam structure, tools, and methodology☆70Feb 4, 2026Updated 3 months ago
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Deep Dive into Hacking and Pentesting, by EC-Council☆17Oct 28, 2022Updated 3 years ago
- اول اداة ددوس اتاك عربيه 🇱🇾☆29Jun 18, 2024Updated last year
- ☆33Updated this week
- Passkeep is a simple password manager written in python that fits for personal use only.☆14Oct 30, 2022Updated 3 years ago
- Ungraded practice exercises for python scripting for security course.☆12Jun 22, 2025Updated 10 months ago
- ☆14Sep 28, 2024Updated last year
- Sample Vulnerable and Secure Code Snippets for Various Vulnerabilities☆24Jun 18, 2024Updated last year
- ☆19Oct 27, 2025Updated 6 months ago
- An Exploitation tool to exploit the confluence server that are vulnerable to CVE-2023-22527 leads to RCE☆10Jan 23, 2024Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Website Component : Popup Modal Made using HTML CSS and JavaScipt.☆14May 17, 2023Updated 3 years ago
- Real time graph generator of the network topology using traceroute, nmap and arborJS☆12Dec 1, 2013Updated 12 years ago
- OpenVAS plugin for GLPi☆13Mar 22, 2022Updated 4 years ago
- ☆10Jan 26, 2023Updated 3 years ago
- ☆10Oct 15, 2023Updated 2 years ago
- ☆12Aug 1, 2024Updated last year
- DualShock 4 userspace driver with a Cemuhook Motion Server - epigramx' fork for correct yaw axis multiplier, true MAC address and misc im…☆18Dec 8, 2020Updated 5 years ago
- pocsuite3 poc&exp☆24Apr 9, 2025Updated last year
- CVE-2024-6387 exploit☆14Jul 2, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- It is Exploratory Data Analysis of IPL 2023 Auction dataset.☆11Feb 9, 2024Updated 2 years ago
- ☆15Sep 13, 2023Updated 2 years ago
- Who needs authentication? This cache purge vulnerability finder doesn't!☆10Apr 20, 2023Updated 3 years ago
- On-Premises Open Cyber Threat Intelligence Platform☆11Oct 29, 2024Updated last year
- A comprehensive guide on SSH penetration testing techniques and methodologies. Authored by Abhinav Sharma, founder and CEO of Global Offe…☆13Jul 1, 2023Updated 2 years ago
- Kali for Penetration Testers, by EC-Council☆13Jan 10, 2023Updated 3 years ago
- Ataque WPS transparente con rogue AP☆24Aug 8, 2024Updated last year