This repository collects lists of security-relavent Python APIs, along with examples of exploits using those APIs
☆36May 9, 2021Updated 4 years ago
Alternatives and similar repositories for python_security
Users that are interested in python_security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Burp extension that add a tab to edit Office Open XML document (xlsx,docx,pptx)☆14Nov 26, 2017Updated 8 years ago
- A python library to extract TCP sessions from PCAPs.☆24Nov 10, 2020Updated 5 years ago
- ☆16Jul 11, 2021Updated 4 years ago
- ☆10Nov 24, 2018Updated 7 years ago
- Javascript file change monitoring☆17Mar 13, 2026Updated last week
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Pythonize Intruder Payload☆13Dec 15, 2020Updated 5 years ago
- Using Microsoft 365 App Passwords for persistence☆23Sep 2, 2020Updated 5 years ago
- fastjson auto type derivation search☆21Aug 19, 2021Updated 4 years ago
- Terraform to run Scoutsuite security scan of projects within a Google Cloud Org. Report will be published to a GCS bucket.☆17Jan 5, 2026Updated 2 months ago
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆11Jan 10, 2017Updated 9 years ago
- This repo gives an overview of some GCP metadata API attack and defend patterns☆79Mar 23, 2020Updated 6 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Feb 20, 2022Updated 4 years ago
- A collection of code for interacting with API sources directly to improve your understanding of those services.☆66Dec 11, 2020Updated 5 years ago
- A command-line tool for Cross-Site WebSocket Hijacking☆44Oct 18, 2023Updated 2 years ago
- A Node.js vulnerability finding tool.☆96Aug 7, 2025Updated 7 months ago
- Open methodologies on measuring, documenting and conducting research on information controls, Internet censorship, and online surveillanc…☆16Oct 16, 2021Updated 4 years ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆21Oct 28, 2020Updated 5 years ago
- ☆20Aug 15, 2020Updated 5 years ago
- A mitmproxy addon that allows use of the HTTP Toolkit Android app.☆10Jun 25, 2023Updated 2 years ago
- Collaborative repository to catalogue insecure functions in various programming languages.☆11May 9, 2022Updated 3 years ago
- ☆17Nov 15, 2022Updated 3 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Convert an IP into Alternative / Obfuscated versions of itself☆14Aug 13, 2022Updated 3 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆12Feb 16, 2021Updated 5 years ago
- 杂 物 收 纳☆15Aug 4, 2023Updated 2 years ago
- Complex payload encoder☆241Jan 20, 2024Updated 2 years ago
- Google Workspace password sprayer with anti-captcha☆14Mar 11, 2026Updated last week
- ☆25May 30, 2017Updated 8 years ago
- Seecurity helper tool to detect entry points of WordPress plugins☆10May 16, 2024Updated last year
- ☆19Apr 16, 2025Updated 11 months ago
- A curated list of the more mature AI tools for enhancing developer productivity☆34Jan 19, 2026Updated 2 months ago
- ☆49Jul 14, 2020Updated 5 years ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Dec 28, 2021Updated 4 years ago
- This is my personal blog where I talk about science and technology, especially about offensive cybersecurity.☆12Dec 28, 2025Updated 2 months ago
- ☆21Mar 4, 2021Updated 5 years ago
- ☆17Jul 12, 2019Updated 6 years ago
- ☆15Apr 5, 2023Updated 2 years ago
- Most of the Google Acquisitions for Bug Bounty Hunter.☆64Sep 3, 2022Updated 3 years ago