These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a great starting point for more advanced tools/scripts.
☆24May 8, 2018Updated 7 years ago
Alternatives and similar repositories for Python4Pentesters
Users that are interested in Python4Pentesters are comparing it to the libraries listed below
Sorting:
- A few simple scripts and templates I have used during various phishing engagements.☆59Apr 3, 2015Updated 10 years ago
- c programming☆10Oct 31, 2020Updated 5 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆21Dec 2, 2024Updated last year
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Feb 6, 2017Updated 9 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Unified repository for different Metasploit Framework payloads☆16Apr 3, 2017Updated 8 years ago
- SpeedPhishing Framework☆450Aug 8, 2019Updated 6 years ago
- Position and velocity PID control of a DC motor using LabView and Arduino☆15Apr 23, 2018Updated 7 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆35Nov 14, 2016Updated 9 years ago
- A realistic windows testlab deployment tool☆12Feb 24, 2017Updated 9 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- Faraday Workspaces for Bug Bounties☆21Jan 19, 2016Updated 10 years ago
- A tool for exploiting Moxie Marlinspike's SSL "stripping" attack.☆18Nov 28, 2013Updated 12 years ago
- Some simple and useful tools☆15May 8, 2018Updated 7 years ago
- Its a framework filled with alot of options and hacking tools you use directly in the script from brute forcing to payload making im stil…☆16Jan 7, 2021Updated 5 years ago
- This project aims to capture network traffic on a local network, filter out packets related to WhatsApp calls, and extract the public IP …☆25Jan 21, 2025Updated last year
- My presentations from different conferences☆15Sep 12, 2018Updated 7 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Jul 29, 2016Updated 9 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Jun 24, 2016Updated 9 years ago
- A tool (and library) for TACKs☆31Jun 15, 2017Updated 8 years ago
- pArAnoIA - Tiny "Secure" Browser☆12Nov 2, 2024Updated last year
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- Write you a home page with bookmarks well-organized.☆16Aug 25, 2017Updated 8 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆44Sep 26, 2016Updated 9 years ago
- Python Pentest Tools☆22Dec 22, 2025Updated 2 months ago
- Client of Richkware-Manager-Server, that obtains list of all hosts and is able to send commands to do at each of them.☆13Dec 28, 2025Updated 2 months ago
- giskismet – Wireless recon visualization tool☆55Aug 26, 2016Updated 9 years ago
- Metasploit Framework☆10Apr 3, 2017Updated 8 years ago
- ☆12Mar 10, 2026Updated last week
- Prototype for an in memory fuzzer☆13Aug 1, 2017Updated 8 years ago
- List all tracks of an artist ranked by poularity at http://localhost:3000/tracks/{artistName}☆10Sep 24, 2015Updated 10 years ago
- Loading unmanaged dll (32 and 64bits) in managed exe☆11Dec 12, 2020Updated 5 years ago
- Various penetration testing tools written in Python. Based mostly on ideas and implementations presented in 'Violent Python: A Cookbook f…☆70Nov 6, 2016Updated 9 years ago
- Shellcode异或加密工具☆12Mar 23, 2017Updated 8 years ago
- Public exploits☆16May 28, 2018Updated 7 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49May 16, 2017Updated 8 years ago
- website admin panel finder☆34Dec 29, 2020Updated 5 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Dec 18, 2016Updated 9 years ago
- On-demand provisioning tool for Hydra☆30Apr 25, 2019Updated 6 years ago