Python3 Samples For Penetration Testing / Ethical Hacking (Offensive Side of The Python)
☆15Feb 20, 2020Updated 6 years ago
Alternatives and similar repositories for Py4Sec
Users that are interested in Py4Sec are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- IOS/MAC Denial-Of-Service [POC/EXPLOIT FOR MASSIVE ATTACK TO IOS/MAC IN NETWORK]☆35Nov 4, 2018Updated 7 years ago
- SecRep Is a Repository That Contain Useful Intrusion, Penetration and Hacking Archive Including Tools List, Cheetsheet and Payloads☆19Jan 9, 2019Updated 7 years ago
- PoC of BitcoinCore Denial-Of-Service and DoubleSpending☆10Nov 12, 2018Updated 7 years ago
- browse the blockstream explorer with visual tool to build raw transactions from specific UTXOs☆15Aug 9, 2019Updated 6 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Aug 19, 2015Updated 10 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- find an unconfirmed transaction you like and fire up my app. Input your Wallet address when prompted to and warch the tx be rerouted to y…☆12May 8, 2020Updated 5 years ago
- Sweep funds to another address☆10Dec 10, 2020Updated 5 years ago
- Bitcoin test suite primarily used to test complex scenarios such as double spends and similar.☆14Jun 21, 2022Updated 3 years ago
- A Minimal Yet Powerful Crawler for Extracting all The Internal/External/Fuzz-able Links from a website☆34Oct 31, 2018Updated 7 years ago
- Collections of Tools, Bookmarks, and other guides created to aid in OSINT collection☆18Aug 18, 2021Updated 4 years ago
- A tool to exploit the hash length extension attack in various hashing algorithms☆17Sep 11, 2012Updated 13 years ago
- Small container runtime for threat detection☆14Apr 13, 2025Updated 11 months ago
- RTSPServer Code Execution Vulnerability CVE-2018-4013☆15Nov 26, 2018Updated 7 years ago
- An tool for search IOT MQTT vulnerable with shodan☆21Sep 15, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆12Dec 26, 2022Updated 3 years ago
- ☆18Jan 2, 2018Updated 8 years ago
- An AIO Tool to check for Vulnerable Amazon S3 Buckets as part of Bug Bounty, the uniqueness of this tool is that it can take a file full …☆44Sep 6, 2024Updated last year
- Introducing the Ransomware Builder – an educational tool with a sleek, modern GUI that makes it easy for anyone to create their own ranso…☆18Aug 4, 2024Updated last year
- Useful tips on how to maximize and balance security and privacy on iOS☆13Oct 9, 2018Updated 7 years ago
- User-mode part of Zerokit platform☆22Mar 30, 2019Updated 7 years ago
- bitcoin replace-by-fee double spend tool☆26May 26, 2015Updated 10 years ago
- a raspberry pi zero w based hacking tool that installs a reverse shell on the target pc (running windows) which runs at startup using p4w…☆10Apr 12, 2021Updated 4 years ago
- MattockFS Computer Forensics File-System☆12Mar 26, 2018Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Collection of IronPython scripts and executables for penetration testing☆57Feb 26, 2019Updated 7 years ago
- https://sites.google.com/securifyinc.com/secblogs/finding-leaked-sensitive-data☆17Jun 14, 2018Updated 7 years ago
- The script specializes in collecting information about sites, protocols and servers, facilitating work on the Metasploit project and repa…☆13Oct 31, 2018Updated 7 years ago
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Apr 17, 2024Updated last year
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆39Jan 24, 2020Updated 6 years ago
- Legacy version of binary hashcat for Linux (64 bits). Used on airgeddon docker container.☆19Mar 30, 2017Updated 9 years ago
- ☆14May 8, 2017Updated 8 years ago
- This is a small extension to make graphql readable☆30Dec 14, 2018Updated 7 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆47Jan 4, 2018Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- hashcrack is a python script which uses online hash crackers to find cleartext of a hash in less than 3 seconds☆49Mar 30, 2026Updated last week
- Botnet IRC C&C Created in python language, developed for language learning☆11May 26, 2016Updated 9 years ago
- Python tools for ethical hacking☆45Jul 14, 2019Updated 6 years ago
- Slides of 44Con 2018☆23Oct 11, 2018Updated 7 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆43Jul 16, 2018Updated 7 years ago
- Extract username and passwords from IPTV urls☆12Nov 8, 2025Updated 5 months ago