Python Powered Repository
☆15Jan 22, 2020Updated 6 years ago
Alternatives and similar repositories for Python
Users that are interested in Python are comparing it to the libraries listed below
Sorting:
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆37Sep 30, 2019Updated 6 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆19Jan 5, 2022Updated 4 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22May 30, 2015Updated 10 years ago
- This is the vulnerable "proxy" I used on this article: http://resources.infosecinstitute.com/the-ssrf-vulnerability/ . A simple, non-vali…☆14Sep 20, 2016Updated 9 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- pwnig all the (web)things☆21Nov 21, 2020Updated 5 years ago
- Protect your parents from phishing☆40Dec 4, 2017Updated 8 years ago
- WebDigger is a python based tool, specially created to get a company's unknown domain for pentestor.☆17Aug 6, 2016Updated 9 years ago
- Clone repository for Source Code secret anti-forensic tools Marble Framework CIA, Leaked by WikiLeaks.☆29Apr 1, 2017Updated 8 years ago
- Network Guardian☆12Jun 29, 2017Updated 8 years ago
- Microsoft Flow Attack Framework☆23Nov 14, 2019Updated 6 years ago
- nessus plugin for metasploit to connect to a nessus server☆23May 1, 2013Updated 12 years ago
- Listed below are some extra phishing scenarios for wifiphisher these scenarios are only added to provide security awareness. It may not b…☆15Jul 3, 2017Updated 8 years ago
- Yet Another ASGI Toolkit☆10Jun 1, 2022Updated 3 years ago
- SEQ/Ack signature triggered SSL back connect☆10May 20, 2016Updated 9 years ago
- ssh session type for metasploit☆101Feb 5, 2023Updated 3 years ago
- ☆15Apr 12, 2018Updated 7 years ago
- Your last stop for password list generation needs!☆27Mar 4, 2015Updated 11 years ago
- White Hat Arsenal is a collection of very useful scripts, exploits and books.☆13Dec 4, 2019Updated 6 years ago
- Extract unencrypted SSH keys from pageant memory dump☆15Oct 3, 2015Updated 10 years ago
- My collection of nmap nse modules☆64Oct 19, 2019Updated 6 years ago
- RUDY DOS attack script☆12Nov 9, 2025Updated 4 months ago
- Struts2 Vuls Scanner base perl script☆23Feb 11, 2016Updated 10 years ago
- initial push☆14Feb 10, 2015Updated 11 years ago
- MUTE (WxKill) is an Python Application that kills wifi signals☆10Jan 31, 2019Updated 7 years ago
- Web app that calculates various powerlifting scores☆15Jan 7, 2023Updated 3 years ago
- Pineapple Surprise! is a PHP implementation for the Wi-Fi Pineapple or "Jasager". Used in conjunction with dnsspoof it will serve a "surp…☆63Oct 9, 2016Updated 9 years ago
- Proof of Concept for the PHP and JAVA Hashcollision Denial of service attack☆101Jan 17, 2012Updated 14 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Oct 7, 2013Updated 12 years ago
- SUID systemctl exploit ( MSF - Metasploit module )☆17Oct 26, 2019Updated 6 years ago
- z390i configuration for Monterey (opencore)☆10Aug 7, 2022Updated 3 years ago
- Covert Channels for C2 Server☆17Oct 2, 2015Updated 10 years ago
- Refactored version. A telegram bot to rip timetables from SIMConnect☆13Mar 27, 2023Updated 2 years ago
- Mass scanning and fuzzing library☆48Updated this week
- Helps you organize tests in Go programs into groups.☆29Dec 12, 2023Updated 2 years ago
- ☆20May 8, 2015Updated 10 years ago
- For BurpSuite Plugins☆10Jun 25, 2015Updated 10 years ago
- This is a cross-platform Python 2.x Remote Access Trojan (RAT)☆14Mar 11, 2017Updated 9 years ago
- openvpn server configs☆15May 12, 2016Updated 9 years ago