Python Pentest Tools
☆22Dec 22, 2025Updated 3 months ago
Alternatives and similar repositories for Python-Pentest-Tools
Users that are interested in Python-Pentest-Tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 👨🏼💻 Brute force wifi passwords with AppleScript.☆14Jan 7, 2020Updated 6 years ago
- I created my own Keylogger I am going to open source its code .But no one is allowed to use it commercially and I have actual copy right…☆11Sep 30, 2017Updated 8 years ago
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆20Feb 23, 2017Updated 9 years ago
- Pentoo installer rewritten by Wuodan to be more modular☆11Jan 9, 2026Updated 3 months ago
- ☆11Feb 20, 2015Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- php tool for network scanning☆20May 7, 2015Updated 10 years ago
- Control the parameters of an Android system with the power of Xposed framework. 通过Xposed框架控制Android参数。☆16Mar 24, 2017Updated 9 years ago
- CVE-2017-8570 Exploit☆21Aug 14, 2017Updated 8 years ago
- ☆12Jun 12, 2021Updated 4 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆24May 8, 2018Updated 7 years ago
- Evil Twin Attack Bash script☆12Feb 21, 2016Updated 10 years ago
- A modular pentesting framework implemented in C☆13Aug 6, 2018Updated 7 years ago
- Opens a reverse PowerShell terminal to the client. Shell receives commands through TCP☆24Apr 18, 2015Updated 10 years ago
- Mobile Pentest related stuff☆14Jun 14, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Search hashes in different website.☆34Oct 3, 2020Updated 5 years ago
- use bash shell to handle a menu selection with up/down key☆19Feb 26, 2015Updated 11 years ago
- This tool is phishing tool. Easy to use.☆19Mar 14, 2020Updated 6 years ago
- This tool audits a website before hand and can exploit vulnerabilities if the website scanned has any.☆14Jul 3, 2013Updated 12 years ago
- 🀄️ WebShell Backdoor Framework☆16Jun 7, 2018Updated 7 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- ☆12Mar 10, 2026Updated last month
- A simple, lightweight Remote Access Tool written in Python☆16Apr 11, 2019Updated 6 years ago
- Command line SIP clients based SIP SIMPLE SDK☆35Jan 15, 2021Updated 5 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Phishing webapp generator☆42Aug 17, 2018Updated 7 years ago
- Open Source Intelligence☆25Feb 25, 2017Updated 9 years ago
- ☆27Apr 16, 2017Updated 8 years ago
- SMF2WPBridge is a simple one way bridge from Simple Machine Forum to Wordpress.☆12Apr 10, 2020Updated 5 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆52Feb 28, 2017Updated 9 years ago
- 🎥 Brickcom Private Security Cam's Scan and Exploit Improper view DataBase 📺 Watching priv8 (records 📼) in real time from almost countr…☆21Jan 16, 2019Updated 7 years ago
- Wordpress.org svn repositories spider☆12Aug 4, 2014Updated 11 years ago
- Script to change all MAC Addresses☆12Oct 3, 2013Updated 12 years ago
- A collection of spywares for education scopes☆44Apr 4, 2017Updated 9 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- A collection of tools for every PENTEST engagement☆12Oct 21, 2019Updated 6 years ago
- Listen to a curated collection of essays via. text-to-speech☆10Apr 10, 2019Updated 7 years ago
- Download and Inject code into Google Chrome extensions☆13Nov 16, 2017Updated 8 years ago
- Mirai Botnet DB Project☆27Mar 20, 2019Updated 7 years ago
- A customized mixed PT-BR wordlist for pentesting purposes.☆14Apr 14, 2019Updated 6 years ago
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago