n1cfury / BlackHatPython
This repository is the final location for tools I built from the book Black Hat Python
☆11Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for BlackHatPython
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆22Updated 6 years ago
- Package manager for hackers built by hackers☆35Updated 6 years ago
- ☆15Updated last year
- Python script that acts like the original sudo binary to fool users into entering their passwords☆17Updated 8 years ago
- MS17-010☆12Updated 7 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Network/WebApplication Information Gathering, Enumeration and Vulnerability Scanning (Under Development)☆17Updated 5 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆27Updated 4 months ago
- Red Team Tool Kit☆13Updated 5 years ago
- ☆19Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 6 years ago
- Social Engineering Toys☆36Updated 8 years ago
- NOGO is a packaging script that creates fully undetectable payloads specializing in disabling anti-virus. Created for pentesting (crippli…☆13Updated 5 years ago
- Vulnerability Scanner☆12Updated 9 years ago
- Automation Hacking & Penetration Testing Suite☆11Updated 8 years ago
- The goal of this program is to quickly pull and install repos from its list☆39Updated last year
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆45Updated 6 years ago
- Script is a proof of concept how to control your machine by using social media sites.☆17Updated 6 years ago
- Create lists from nmap output.☆13Updated 3 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 6 years ago