santosomar / awesome-python
A curated list of awesome Python frameworks, libraries, software and resources
☆11Updated 2 months ago
Alternatives and similar repositories for awesome-python:
Users that are interested in awesome-python are comparing it to the libraries listed below
- This repository includes supplemental information covered in the Pearson video course titled "The Art of Hacking and Exploitation".☆17Updated 6 years ago
- A curated list of Docker resources and projects☆12Updated 9 months ago
- Pentest ToolKit☆27Updated 4 years ago
- Python tool to check the HTTP response code for a list of websites☆21Updated 3 years ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆14Updated 7 years ago
- DPE - Default Password Enumeration☆34Updated 11 years ago
- home! sweet home☆23Updated 5 years ago
- Trying to be the best tool to search for exploits in the terminal.☆11Updated 7 years ago
- Easy Window domain access☆51Updated 10 years ago
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆19Updated 8 months ago
- Guidelines for writing secure code for Python developers.☆20Updated 7 years ago
- A list of the books that I am reading, with priorities.☆31Updated 2 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- Cryptocurrencies related Security resources☆14Updated last year
- Create lists from nmap output.☆13Updated 4 years ago
- Use Tor for anonymous scanning with nmap☆79Updated 9 years ago
- Explains and tests HTTP response headers☆40Updated 5 years ago
- playing around with food and drink sites and OSINT☆14Updated 6 years ago
- Pull A List Of 1000 Most Popular Containers On Docker Hub☆15Updated 4 years ago
- A collection of nmap scripts I've written☆23Updated 8 years ago
- Software exploitation training material☆15Updated 7 years ago
- A copy of articles published at Peerlyst☆38Updated 8 years ago
- ☆19Updated 9 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 7 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Using Ansible as an orchestrator, this project is another solution for testers looking to configure and deploy a new VM or VPS box with t…☆19Updated 7 years ago
- Search bing with python☆12Updated 10 years ago
- devops scripts☆31Updated 8 years ago
- Single stop for security related stuff☆54Updated 8 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 13 years ago