iluxonchik / blackhat-python-book
Code from Blackhat Python book
☆188Updated 6 years ago
Alternatives and similar repositories for blackhat-python-book
Users that are interested in blackhat-python-book are comparing it to the libraries listed below
Sorting:
- Black Hat Python Labs☆99Updated 6 years ago
- Tool made to automate tasks of pentesting.☆165Updated 5 years ago
- Violent Python scripts used in book and few other required files☆2Updated 5 years ago
- Scripts that are useful for me on pen tests☆530Updated 2 years ago
- Various penetration testing tools written in Python. Based mostly on ideas and implementations presented in 'Violent Python: A Cookbook f…☆67Updated 8 years ago
- Python Security Scripts☆244Updated 3 years ago
- Scratch space for various python lessons I am trying to work through☆117Updated 4 years ago
- swiss army knife for hackers☆525Updated last year
- Python 3 scripts based on lessons learned from Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Securit…☆62Updated 7 years ago
- Exploit pack for pentesters and ethical hackers.☆115Updated 8 years ago
- The Collective. A repo for a collection of red team and/or pen test projects found mostly on Github. https://github.com/ceramicskate0/The…☆35Updated 5 years ago
- HackBox is a powerful and comprehensive tool that combines a variety of techniques for web application and network security assessments, …☆398Updated 2 years ago
- Automates some pentest jobs via nmap xml file☆324Updated 6 years ago
- One of the biggest annoyances of using Recon-ng is getting everything set up to use it. So here I’ll outline the different API keys it c…☆160Updated 7 years ago
- Selenium powered Python script to automate searching for vulnerable web apps.☆344Updated 3 years ago
- network reconnaissance toolkit☆421Updated 6 years ago
- Official Black Hat Arsenal Security Tools Repository☆150Updated 3 years ago
- Command-line tool to scan Google search results for vulnerabilities☆523Updated 2 weeks ago
- Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple ac…☆509Updated 7 years ago
- curated password lists and various other lists/dictionaries for security things☆83Updated 2 months ago
- search for hosts info with shodan☆230Updated 3 years ago
- Advanced Hash Manipulation☆178Updated 5 years ago
- black hat python☆131Updated 4 years ago
- ☆180Updated last year
- Hamburglar -- collect useful information from urls, directories, and files☆319Updated 2 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆332Updated 9 months ago
- Cheat sheet and notes inspired by the book RTFM - Red Team Field Manual☆182Updated 10 months ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆372Updated 2 years ago
- Cloak can backdoor any python script with some tricks.☆493Updated 6 years ago
- A collection of various awesome lists for hackers, pentesters and security researchers☆327Updated 8 years ago