🏴☠️ tools (py3 version) of Black Hat Python book 🏴☠️
☆125Nov 10, 2024Updated last year
Alternatives and similar repositories for black-hat-python3-code
Users that are interested in black-hat-python3-code are comparing it to the libraries listed below
Sorting:
- Useful material for learning Python, start coding and learn how to logically solve real world problems.☆26Nov 10, 2024Updated last year
- random scripts☆17Nov 10, 2024Updated last year
- HackerRank-Python 🐍☆14Nov 10, 2024Updated last year
- HacKingPro - Hack Like A Pro !☆147Dec 1, 2025Updated 2 months ago
- University Java project. It's a lightweight tool specialized in tweets analysis.☆11Nov 10, 2024Updated last year
- Are you looking for a word in many pdf files? Do it one time. ⚡☆18Nov 10, 2024Updated last year
- Implementations of various problems using Python. Dynamic Programming, BackTracking & Sorting algorithms☆26Nov 10, 2024Updated last year
- Simple C file decrypter☆12Nov 10, 2024Updated last year
- Some of my assembly code (examples, iterative and recursive algorithms) from Computer's Architecture course in Sapienza University, CS Ba…☆19Nov 10, 2024Updated last year
- Generate customized Password/Passphrase wordlist based on target information☆97Feb 20, 2026Updated last week
- Master of Science in Cybersecurity, Sapienza University of Rome.☆79Nov 10, 2024Updated last year
- List of 9500 (and counting) Spark AR Creators. Open an issue or contact me if you want to be added.❤️☆139Nov 10, 2024Updated last year
- A bash script that fixes the MinGW installation problems with TheFatRat☆16Apr 7, 2023Updated 2 years ago
- Monitoring Registry and File Changes in Windows☆69Jan 14, 2026Updated last month
- TryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.☆251Nov 10, 2024Updated last year
- Easy implementation of some postgreSQL Databases for practicing with Conceptual analysis of requirements, design of relational databases …☆11Nov 10, 2024Updated last year
- A collection of useful links for Pentesters☆174Jun 6, 2025Updated 8 months ago
- This is a keylogger that collects all the data and e-mail it in a set time with system information which includes device S/N and hardware…☆46Oct 25, 2025Updated 4 months ago
- [NOT WORKING] 🤖 CLI Twitter Bot. It's made to reach more engagement based on your interests. See https://github.com/edoardottt/twitterbo…☆40Nov 10, 2024Updated last year
- My experiments in weaponizing ONOS applications (https://github.com/opennetworkinglab/onos)☆20Nov 10, 2024Updated last year
- Little Bug Bounty & Hacking Tools⚔️☆369Nov 10, 2024Updated last year
- Sub-Domain TakeOver Vulnerability Scanner (edoardottt fork)☆79Jan 29, 2025Updated last year
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆17Dec 9, 2017Updated 8 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆37Feb 14, 2026Updated last week
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆55Oct 1, 2020Updated 5 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Jul 21, 2019Updated 6 years ago
- Information Gathering tool - DNS / Subdomains / Ports / Directories enumeration☆1,196Jan 9, 2026Updated last month
- Advanced deauthentication script.☆22Dec 17, 2019Updated 6 years ago
- Docker install for edex-ui☆21Jun 7, 2019Updated 6 years ago
- Detect leaks in security event logs.☆20Apr 9, 2019Updated 6 years ago
- Designed to scan and exploit vulnerabilities within Tor hidden services. TORhunter allows most tools to work as normal while resolving .o…☆114Jan 2, 2022Updated 4 years ago
- All in one subdomain Enumeration tool☆21Jan 1, 2023Updated 3 years ago
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆11May 19, 2020Updated 5 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- APKnife is an advanced APK analysis and modification tool designed for security researchers and ethical hackers. It allows users to extra…☆15Mar 13, 2025Updated 11 months ago
- Just a quick'n'dirty tool to parse leaked databases (csv-like or sql format)☆23Feb 4, 2018Updated 8 years ago
- Spider or repeater to find all links.☆10Feb 7, 2021Updated 5 years ago
- The standard ADB Configuration involves a USB Connection to a physical Device. If you prefer, you can switch over to TCP/IP Mode and conn…☆19Nov 4, 2023Updated 2 years ago
- ⌨️ A keylogger is nothing more than a memorizer of actions produced on the keyboard: its translation from English is in fact “keylogger”.☆10Oct 24, 2022Updated 3 years ago