santosomar / awesome-python
A curated list of awesome Python frameworks, libraries, software and resources
☆11Updated 5 months ago
Alternatives and similar repositories for awesome-python
Users that are interested in awesome-python are comparing it to the libraries listed below
Sorting:
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆11Updated 2 weeks ago
- A curated list of Docker resources and projects☆14Updated 11 months ago
- This repository includes supplemental information covered in the Pearson video course titled "The Art of Hacking and Exploitation".☆20Updated 7 years ago
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆19Updated 2 months ago
- Pentest ToolKit☆28Updated 5 years ago
- devops scripts☆33Updated 8 years ago
- Determine everything you need to know to about a system☆32Updated 6 years ago
- ☆19Updated 10 years ago
- python scripts for penetration testing☆11Updated 5 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- Guidelines for writing secure code for Python developers.☆20Updated 8 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆22Updated 5 months ago
- lulz: automated webstalking tool☆52Updated 8 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- This is a source mirror for 0trace.☆12Updated 11 years ago
- A simple script for translating IP addresses to GeoLocations☆42Updated 3 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆23Updated 7 years ago
- A copy of articles published at Peerlyst☆39Updated 8 years ago
- Use Tor for anonymous scanning with nmap☆84Updated 9 years ago
- Open Standard Vulnerability & Compliance Scanner☆43Updated 9 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Twintelligence is a free Twitter OSINT tool☆51Updated 4 years ago
- Python tool to check the HTTP response code for a list of websites☆21Updated 3 years ago
- This tool will harvest valid DNS subdomains from a given domain.☆65Updated 3 years ago
- A collection of curated Java Deserialization Exploits☆10Updated 6 years ago
- Identify the different types of hashes used to encrypt passwords.☆10Updated 8 years ago
- Cryptocurrencies related Security resources☆14Updated last year
- Search Nmap and Metasploit scanning scripts.☆55Updated 7 years ago
- Package manager for hackers built by hackers☆36Updated 6 years ago
- Scrape pastes from pastebin and archive them for review☆16Updated 6 years ago