This repository is the final location for tools I built from the book Black Hat Python
☆12Aug 1, 2018Updated 7 years ago
Alternatives and similar repositories for BlackHatPython
Users that are interested in BlackHatPython are comparing it to the libraries listed below
Sorting:
- This repository contains tools made by completing exercises from various books on blackhat programming. The intent is to learn writing so…☆13Updated this week
- Light C++ Logger Library☆20Nov 24, 2017Updated 8 years ago
- BlackHat Europe 2017 Slides☆25Feb 15, 2018Updated 8 years ago
- Official Black Hat Arsenal Security Tools Repository☆19Jan 1, 2018Updated 8 years ago
- IP kung-FU☆10Mar 14, 2019Updated 7 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆16Jun 10, 2019Updated 6 years ago
- My Quick Note of BlackHat 2015 Arsenal☆26Aug 13, 2015Updated 10 years ago
- finds hidden parameters☆23Aug 12, 2023Updated 2 years ago
- The yaml documents for the CTFman search system.☆12May 16, 2019Updated 6 years ago
- UPPERSAFE Open Source Firewall☆23Dec 8, 2022Updated 3 years ago
- Vulnerability scanner☆14Jan 11, 2019Updated 7 years ago
- ECOin is a P2P crypto-currency with the goal of providing a long-term energy-efficient digital economy strategy.☆13Feb 28, 2026Updated 3 weeks ago
- block ssh bruteforcers☆22Jun 19, 2018Updated 7 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- Installation: Install the NetHunter-Store app from: https://store.nethunter.com/ From the Kali NetHunter Store, install Termux, NetHunt…☆16Dec 18, 2021Updated 4 years ago
- Tools for Cellular Exploitation on a Global Scale - Blackhat USA 2014☆24Feb 12, 2018Updated 8 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- Hacker-gems installs most needed gems for hackers☆13Aug 3, 2017Updated 8 years ago
- A trimmed down sane API for using ZkTeco fingerprint reader usb devices☆13Nov 20, 2023Updated 2 years ago
- Official Athena OS docker base images.☆12Dec 20, 2025Updated 3 months ago
- ASP.NET Core provides necessary APIs to implement secure access to an application.In this tutorial, we will see how to implement Role-Bas…☆11Aug 18, 2019Updated 6 years ago
- Command line Teensy Loader☆11Sep 21, 2015Updated 10 years ago
- nmap nse script for web services screenshot☆16Jul 22, 2013Updated 12 years ago
- Misc resources for my daily pentesting...☆19Mar 26, 2025Updated 11 months ago
- Information Repository on Various Methods of getting shell access into a Windows machine☆17Feb 11, 2020Updated 6 years ago
- HoppEye is a simple payload picker for BashBunny based on linking payloads to LED color.☆31Mar 7, 2018Updated 8 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android), multi function RAT (Remote Administration Tool) mainly written in p…☆12Jan 10, 2020Updated 6 years ago
- Modifed PowerSploit/PowerView to search files and match RegEx for Sensitive info (PII, PCI, Passwords, Usernames, SNMP Strings, etc.)☆14Aug 1, 2018Updated 7 years ago
- PoC of BitcoinCore Denial-Of-Service and DoubleSpending☆10Nov 12, 2018Updated 7 years ago
- AI chat with context retrieval using Convex and LangChain☆23Feb 5, 2026Updated last month
- Detect data containing Personally Identifiable Information (PII) in R☆15Jul 1, 2017Updated 8 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆15Mar 10, 2017Updated 9 years ago
- Arduino Library for the Lepton FLiR Thermal Camera Module.☆12Jan 13, 2018Updated 8 years ago
- dotnetcore json based localization support☆12Dec 2, 2025Updated 3 months ago
- Este repositorio contiene los ejemplos que muestran como usar Dapper y Entity Framework Core juntos en la misma aplicación.☆13Jul 6, 2023Updated 2 years ago
- An unofficial Humax IR4000HD terminal client with enhanced features.☆10Feb 2, 2019Updated 7 years ago
- Proof of Concept for CVE-2018-11776☆21Sep 12, 2018Updated 7 years ago