iluxonchik / blackhat-python-book
Code from Blackhat Python book
☆186Updated 5 years ago
Alternatives and similar repositories for blackhat-python-book:
Users that are interested in blackhat-python-book are comparing it to the libraries listed below
- Knowledge is power☆89Updated 7 years ago
- Black Hat Python Labs☆96Updated 5 years ago
- HackBox is a powerful and comprehensive tool that combines a variety of techniques for web application and network security assessments, …☆394Updated last year
- Scripts that are useful for me on pen tests☆527Updated 2 years ago
- Penetration Testing/Security Cheatsheets☆191Updated 9 years ago
- Selenium powered Python script to automate searching for vulnerable web apps.☆341Updated 2 years ago
- black hat python☆130Updated 3 years ago
- Cloak can backdoor any python script with some tricks.☆487Updated 5 years ago
- Python 3 scripts based on lessons learned from Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Securit…☆61Updated 7 years ago
- Personal Collection of Operating Systems Scripts☆558Updated 8 months ago
- Tool made to automate tasks of pentesting.☆166Updated 5 years ago
- ☆150Updated last year
- Proof of concepts of attacks against Wi-Fi implementations☆139Updated 6 years ago
- Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple ac…☆505Updated 6 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆370Updated last year
- Advanced Hash Manipulation☆174Updated 5 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆383Updated 4 years ago
- curated password lists and various other lists/dictionaries for security things☆83Updated 5 years ago
- Python Security Scripts☆243Updated 2 years ago
- This repository is to make life of the pentester easy as it is a collection of the websites that can be used by pentesters for day to day…☆352Updated last year
- Framework for Man-In-The-Middle attacks☆185Updated 7 years ago
- Custom checklists, cheatsheets, links, and scripts☆125Updated 5 years ago
- search for hosts info with shodan☆230Updated 3 years ago
- Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans.☆631Updated 6 years ago
- The Hacker's ToolBox☆183Updated 7 years ago
- A simple Python script to exploit the OpenSSH User Enumeration Timing Attack.☆158Updated 4 years ago
- Pentest Lab on OpenStack with Heat, Chef provisioning and Docker☆380Updated 7 years ago
- Alohomora was written as a POC and presented at both DefCon and Derby Con. The application marries data pulled from the Ohio Voter Regist…☆44Updated 6 years ago
- This is an open source tool to dump the wifi profiles and cleartext passwords of the connected access points on the Windows machine. This…☆275Updated 7 years ago
- A unified console to perform the "kill chain" stages of attacks.☆200Updated last year