greyshell / python_programming
Learning Python
☆9Updated last month
Alternatives and similar repositories for python_programming:
Users that are interested in python_programming are comparing it to the libraries listed below
- Automate SSH communication with firewalls, switches, etc.☆26Updated 6 years ago
- ☆46Updated 7 years ago
- Basic gui to run and display nmap scan results. Just a POC so far.☆31Updated 11 years ago
- Searches for interesting cached DNS entries.☆54Updated 10 years ago
- Some exploits for ZeroNights 0x03☆37Updated 9 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- Various pentest scripts☆14Updated 10 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Recursively searches a directory for any file containing a specified string☆45Updated 9 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 8 years ago
- TLS SNI virtual hosts bruteforcer☆21Updated 10 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated last year
- Burp extension for automated handling of CSRF tokens☆16Updated 6 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 6 years ago
- Find your router's default password☆14Updated 9 years ago
- [DEPRECATED] Hiccup is a framework that allows the Burp Suite (a web application security testing tool, http://portswigger.net/burp/) to …☆42Updated 6 years ago
- Parses Nmap XML files☆25Updated 9 years ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- Educational Python penetration testing framework☆10Updated 7 years ago
- A set of compiled application restriction bypasses☆29Updated 7 years ago
- Search the ExploitDB with a little more control☆21Updated 7 years ago
- ☆20Updated last year
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 7 years ago
- Remote Desktop Protocol in Twisted Python☆26Updated 6 years ago
- Some of my Nmap scripts☆21Updated 7 years ago
- A simple scanner to find and brute force tomcat manager logins☆28Updated 5 years ago
- Projects and POCs☆59Updated 10 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- Metasploit modules, powershell scripts and custom exploit to perform local privilege escalation on windows systems.☆10Updated 7 years ago