santosomar / awesome-python
A curated list of awesome Python frameworks, libraries, software and resources
☆11Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for awesome-python
- This repository includes supplemental information covered in the Pearson video course titled "The Art of Hacking and Exploitation".☆16Updated 6 years ago
- A curated list of Docker resources and projects☆13Updated 6 months ago
- python scripts for penetration testing☆11Updated 5 years ago
- devops scripts☆30Updated 7 years ago
- Guidelines for writing secure code for Python developers.☆19Updated 7 years ago
- Pull A List Of 1000 Most Popular Containers On Docker Hub☆14Updated 4 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- All xxx-arsenal repos in one☆15Updated 5 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆19Updated 5 months ago
- A default credential scanner.☆9Updated 6 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆16Updated 4 years ago
- This is a source mirror for 0trace.☆12Updated 10 years ago
- Pentest ToolKit☆27Updated 4 years ago
- A full-fledged msfrpc library for Metasploit framework.☆12Updated 7 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 3 years ago
- SIP hacking tools and scripts☆23Updated 4 years ago
- My preparation notes for CompTIA PenTest+ Certification Exam Objectives, exam number PT0-001☆20Updated 6 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- Advanced python HTTP reverse shell made for Hacking Competition purpose. I am not responsible of what you do with this tool.☆25Updated last year
- My notes, exercises, and reports on reverse engineering and penetrating applications☆17Updated 5 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 3 years ago
- Example packet.proxy plugins.☆21Updated 3 years ago
- Trying to be the best tool to search for exploits in the terminal.☆11Updated 7 years ago
- Kali Linux Wireless Penetration Testing Beginner's Guide - Third Edition, published by Packt☆24Updated last year
- DPE - Default Password Enumeration☆32Updated 11 years ago