Various penetration testing tools written in Python. Based mostly on ideas and implementations presented in 'Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers' by TJ O'Connor and 'Black Hat Python' by Justin Seitz.
☆70Nov 6, 2016Updated 9 years ago
Alternatives and similar repositories for Pentesting-with-Python
Users that are interested in Pentesting-with-Python are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Database of websites for penetration testing☆183Jan 15, 2020Updated 6 years ago
- API Tracker by Cysinfo Team☆22Oct 12, 2016Updated 9 years ago
- ☆23Jan 18, 2021Updated 5 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆24May 8, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Exploit Pack - One step ahead☆12Sep 9, 2013Updated 12 years ago
- Github for the scripts utilised during Penetration test☆237Jun 12, 2017Updated 8 years ago
- my little bucket to store the delusions of grandeur I write in python :D☆30Oct 16, 2014Updated 11 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- This repository contains various shell scripts and tips and tricks used for packaging androidtamer packages☆13Jul 10, 2022Updated 3 years ago
- VOIP Security Audit Framework☆109Jan 22, 2018Updated 8 years ago
- Python and Powershell internal penetration testing framework☆720Feb 22, 2016Updated 10 years ago
- Tools, scripts and tips useful during Penetration Testing engagements.☆641Dec 8, 2025Updated 4 months ago
- Security Related Tools and Resources☆16Aug 10, 2017Updated 8 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- ⛷ A collection of hacker scripts.☆28Jan 24, 2017Updated 9 years ago
- ☆25Jan 18, 2015Updated 11 years ago
- Scripts I use during pentest engagements.☆1,026Aug 18, 2020Updated 5 years ago
- Field guide to gather low-hanging fruits☆14Mar 20, 2025Updated last year
- Metasploit Framework☆26Feb 10, 2026Updated 2 months ago
- scripts for pentesting☆86Aug 21, 2018Updated 7 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Python tools for penetration testers☆2,866Apr 14, 2025Updated 11 months ago
- ☆13Jun 13, 2016Updated 9 years ago
- ☆13May 9, 2017Updated 8 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Feb 6, 2017Updated 9 years ago
- Steal users password with a fake sudo function.☆43Feb 29, 2024Updated 2 years ago
- This repository contains some bettercap transparent proxy example modules.☆16Nov 28, 2017Updated 8 years ago
- Fluxion is the future of MITM WPA attacks Fluxion is a security auditing and social-engineering research tool. It is a remake of linset …☆16Oct 1, 2020Updated 5 years ago
- Download files out of open AWS buckets☆39Dec 12, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 9 years ago
- Black Hat Python Labs☆104Apr 29, 2019Updated 6 years ago
- A collection of post-exploitation tools for network red teaming.☆138Dec 7, 2018Updated 7 years ago
- Penetration Testing tools - one repo to clone them all... containing latest pen testing tools☆541Nov 25, 2019Updated 6 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Dec 1, 2017Updated 8 years ago
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆169Oct 1, 2017Updated 8 years ago
- Code that I adapted from the "Violent Python" book☆57Jul 8, 2014Updated 11 years ago