Python3 Samples For Penetration Testing / Ethical Hacking (Offensive Side of The Python)
☆15Feb 20, 2020Updated 6 years ago
Alternatives and similar repositories for Py4Sec
Users that are interested in Py4Sec are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- IOS/MAC Denial-Of-Service [POC/EXPLOIT FOR MASSIVE ATTACK TO IOS/MAC IN NETWORK]☆35Nov 4, 2018Updated 7 years ago
- Sweep funds to another address☆10Dec 10, 2020Updated 5 years ago
- Bitcoin test suite primarily used to test complex scenarios such as double spends and similar.☆14Jun 21, 2022Updated 3 years ago
- Collections of Tools, Bookmarks, and other guides created to aid in OSINT collection☆18Aug 18, 2021Updated 4 years ago
- A tool to exploit the hash length extension attack in various hashing algorithms☆17Sep 11, 2012Updated 13 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Small container runtime for threat detection☆14Apr 13, 2025Updated last year
- RTSPServer Code Execution Vulnerability CVE-2018-4013☆15Nov 26, 2018Updated 7 years ago
- An tool for search IOT MQTT vulnerable with shodan☆21Sep 15, 2017Updated 8 years ago
- An AIO Tool to check for Vulnerable Amazon S3 Buckets as part of Bug Bounty, the uniqueness of this tool is that it can take a file full …☆46Sep 6, 2024Updated last year
- Introducing the Ransomware Builder – an educational tool with a sleek, modern GUI that makes it easy for anyone to create their own ranso…☆18Aug 4, 2024Updated last year
- Useful tips on how to maximize and balance security and privacy on iOS☆13Oct 9, 2018Updated 7 years ago
- User-mode part of Zerokit platform☆23Mar 30, 2019Updated 7 years ago
- Github repo from YouTube tutorial about customizing Airgeddon's Captive Portal template.☆15Aug 29, 2023Updated 2 years ago
- a raspberry pi zero w based hacking tool that installs a reverse shell on the target pc (running windows) which runs at startup using p4w…☆10Apr 12, 2021Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- https://sites.google.com/securifyinc.com/secblogs/finding-leaked-sensitive-data☆17Jun 14, 2018Updated 7 years ago
- The script specializes in collecting information about sites, protocols and servers, facilitating work on the Metasploit project and repa…☆13Oct 31, 2018Updated 7 years ago
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Apr 17, 2024Updated 2 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Jun 11, 2016Updated 9 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆39Jan 24, 2020Updated 6 years ago
- This is a small extension to make graphql readable☆30Dec 14, 2018Updated 7 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆47Jan 4, 2018Updated 8 years ago
- HEVD Multi-Exploit by m_101☆23Jun 24, 2018Updated 7 years ago
- Botnet IRC C&C Created in python language, developed for language learning☆11May 26, 2016Updated 9 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Python tools for ethical hacking☆45Jul 14, 2019Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆43Jul 16, 2018Updated 7 years ago
- Extract username and passwords from IPTV urls☆13Nov 8, 2025Updated 6 months ago
- Crash macOS and iOS devices with one packet☆46Nov 15, 2018Updated 7 years ago
- Set DCSD LED according to device state (Normal/Recovery/DFU)☆30Jul 12, 2020Updated 5 years ago
- Simple php backdoor based on extension☆22Feb 12, 2015Updated 11 years ago
- Yet Another ASGI Toolkit☆11Jun 1, 2022Updated 3 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- Scrape emails, phone numbers and social media accounts from a website. You can use the found information to gather more information or ju…☆17Dec 6, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- [Checker Emails Twitter + Login API Twitter] - API REST Twitter☆10Aug 18, 2018Updated 7 years ago
- A brookshear virtual machine written in Go☆10Sep 5, 2019Updated 6 years ago
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 6 years ago
- 3D Graphics API low-level abstraction layer☆10Jul 18, 2019Updated 6 years ago
- botnet scanner written in python☆14Apr 4, 2018Updated 8 years ago
- Class☆10Nov 10, 2020Updated 5 years ago