igniteflow / violent-python
Hacking as per the book
☆34Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for violent-python
- Shodan.io Command Line Interface☆44Updated 3 years ago
- Various penetration testing tools written in Python. Based mostly on ideas and implementations presented in 'Violent Python: A Cookbook f…☆67Updated 8 years ago
- Prints the IPs on your local network that're sending the most packets☆144Updated 3 years ago
- Simple security surveillance script for linux distributions.☆58Updated 7 years ago
- Twintelligence is a free Twitter OSINT tool☆51Updated 3 years ago
- hackpack to go with lazykali on menu application Kali Linux☆28Updated 10 years ago
- Python OSINT Tool to retrieve pictures from a specific location using Instagram API☆35Updated 9 years ago
- Orb is a massive footprinting tool.☆45Updated 4 years ago
- Use Tor for anonymous scanning with nmap☆79Updated 9 years ago
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆30Updated 7 years ago
- Social Toolkit for Phishing Attacks (Cross-Plataform)☆20Updated 8 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆22Updated 6 years ago
- Social Engineering Tool Oriented to facebook☆54Updated 7 years ago
- Small backdoor using cookie.☆59Updated 8 years ago
- A fully featured backdoor that uses Gmail as a C&C server☆19Updated 9 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Pentest ToolKit☆27Updated 4 years ago
- Python 3 scripts based on lessons learned from Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Securit…☆61Updated 6 years ago
- A Simple network sniffer implemented on Python 3☆72Updated 4 years ago
- ☆66Updated 10 years ago
- Determine everything you need to know to about a system☆30Updated 6 years ago
- An installation script to help with the setup of a Kali VM for The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim☆16Updated 9 years ago
- VAMPY - Minimal tool for RAM dumping.☆10Updated 7 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆166Updated 9 years ago
- Massive arsenal of hacker tools...☆76Updated 7 years ago
- Python Remote Administration Tool☆13Updated 7 years ago
- Python implementation of the SlowLoris DoS attack.☆22Updated 7 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆31Updated 12 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Updated 9 years ago
- A refresh of LazyKali which simplifies install of tools and configuration. Original author appears missing.☆46Updated 8 years ago