π΄ββ οΈ tools (py3 version) of Black Hat Python book π΄ββ οΈ
β125Nov 10, 2024Updated last year
Alternatives and similar repositories for black-hat-python3-code
Users that are interested in black-hat-python3-code are comparing it to the libraries listed below
Sorting:
- HackerRank-LinuxShell Solutionsβ47Nov 10, 2024Updated last year
- HacKingPro - Hack Like A Pro !β153Dec 1, 2025Updated 3 months ago
- List of Tech/Geo/Economics/Politics sources of news. πβ22Apr 3, 2023Updated 2 years ago
- University Java project. It's a lightweight tool specialized in tweets analysis.β11Nov 10, 2024Updated last year
- Generate customized Password/Passphrase wordlist based on target informationβ97Feb 27, 2026Updated 2 weeks ago
- This repository contains tools made by completing exercises from various books on blackhat programming. The intent is to learn writing soβ¦β13Mar 13, 2026Updated last week
- Monitoring Registry and File Changes in Windowsβ69Jan 14, 2026Updated 2 months ago
- This is a keylogger that collects all the data and e-mail it in a set time with system information which includes device S/N and hardwareβ¦β46Oct 25, 2025Updated 4 months ago
- MINOTAUR: The STRONGEST Secure Prompt EVER! Prompt Security Challenge, Impossible GPT Security, Prompts Cybersecurity, Prompting Vulnerabβ¦β25Mar 27, 2024Updated last year
- Docker install for edex-uiβ20Jun 7, 2019Updated 6 years ago
- List of 9500 (and counting) Spark AR Creators. Open an issue or contact me if you want to be added.β€οΈβ139Nov 10, 2024Updated last year
- A collection of useful links for Pentestersβ177Jun 6, 2025Updated 9 months ago
- My experiments in weaponizing ONOS applications (https://github.com/opennetworkinglab/onos)β20Nov 10, 2024Updated last year
- Little Bug Bounty & Hacking ToolsβοΈβ372Updated this week
- A simple amazon tracker that sends you an email when prices of your followed products fall down!β25Jun 16, 2022Updated 3 years ago
- Black Hat Ethical Hacking | PHP Backdoor Shell v1.0β19May 22, 2018Updated 7 years ago
- This tool named "Tracer-Tester" is mainly use to Check Ports, Trace Ip, Domain Lookup , All working apis are present in the script , If yβ¦β10Jan 11, 2024Updated 2 years ago
- <BLACKHAT> Generates CCN|{day}/{year}|{CVV} *** FOR EDUCATIONAL β¦β38Jun 25, 2023Updated 2 years ago
- black hat pythonβ134Mar 25, 2021Updated 4 years ago
- Mikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.β81Jun 11, 2018Updated 7 years ago
- Information Gathering tool - DNS / Subdomains / Ports / Directories enumerationβ1,200Jan 9, 2026Updated 2 months ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Pythonβ55Oct 1, 2020Updated 5 years ago
- Cyber-Security Bible! Theory and Tools, Kali Linux, Penetration Testing, Bug Bounty, CTFs, Malware Analysis, Cryptography, Secure Programβ¦β174Mar 6, 2026Updated 2 weeks ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.β39Feb 14, 2026Updated last month
- A list of web application securityβ92Sep 11, 2019Updated 6 years ago
- Designed to scan and exploit vulnerabilities within Tor hidden services. TORhunter allows most tools to work as normal while resolving .oβ¦β114Jan 2, 2022Updated 4 years ago
- QR designer web app with a novel method of designing qr codes that does not take advantage of error correctionβ10Sep 24, 2024Updated last year
- Uses Shodan API to pull down C2 servers to run known exploits on them.β18Dec 9, 2017Updated 8 years ago
- Find open databases - Powered by Binaryedge.ioβ14Jan 4, 2020Updated 6 years ago
- Easy implementation of some postgreSQL Databases for practicing with Conceptual analysis of requirements, design of relational databases β¦β11Nov 10, 2024Updated last year
- 1000 black hat tools Collected From githubβ81Dec 12, 2023Updated 2 years ago
- Using Google translate as WebProxyβ13May 22, 2023Updated 2 years ago
- A python program to grab Wi-Fi credentials from a windows machine.β18Feb 28, 2025Updated last year
- In this repositiories you will get some intresting this but this should be use for fun or kidding. This method should not be performed atβ¦β15Apr 27, 2023Updated 2 years ago
- Official Black Hat Arsenal Security Tools Repositoryβ4,238Aug 26, 2024Updated last year
- Download books from Perlego.com in PDF formatβ13Sep 19, 2023Updated 2 years ago
- Package manager for hackers built by hackersβ36Aug 31, 2018Updated 7 years ago
- Lazymux is a huge list of Many Hacking tools and PEN-TESTING tools! NOTE: Am not Responsible of bad use of this project.β159Mar 4, 2020Updated 6 years ago
- Notes for the Cryptography course at Sapienzaβ12Jun 24, 2020Updated 5 years ago