53 results for “topic:blackhat-python”
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
《python黑帽子:黑客与渗透测试编程之道》代码及实验文件,字典等
hulk is a ddos attacking tool
🏴☠️ tools (py3 version) of Black Hat Python book 🏴☠️
fsociety is a penetration toolkit inspired from MR. ROBOT
A collection of advanced Python scripts for cybersecurity, penetration testing, and ethical hacking.
wifi dos attack tool
《Python黑帽子-黑客与渗透测试编程之道》(Black Hat Python, 2nd Edition)阅读笔记
Personal version of tools from Black Hat Python
<BLACKHAT> Generates CCN|{day}/{year}|{CVV} *** FOR EDUCATIONAL PURPOSES ONLY *** I AM NOT RESPONSIBLE FOR ANY MISUSE ***
[Fugitive was made to offer resourcfulness to 'Osint Investigations' Fugitive will allow you to collect detailed information about "subjects" and in further development will become one of the best OSINT tools for your personal or professional activities]
Python3 Script For Gmail Hacking
written to increase website visits and in case of excessive use of it, the website will be blacklisted by Google.
Professional Use Only - Handle With Extreme Care! This tool is designed for experienced security professionals and red teams. It provides a battle-tested framework for infrastructure hardening, threat detection, and offensive security research. PoisonIvory is not for script kiddies! It intentionally requires deep technical knowledge to operate ...
python based sqli detector tool
Remake Of The USB Rubber Ducky In Python With Better Features. Steals IPv4+IPv6 And Other IPs, And Browsing History From: Brave, Microsoft Edge, Opera, Google Chrome, Firefox. And System Info, And Computer Component Infos As Well. Has New Editions Available!
This repostiory contains the python code of command and control trojan which will be controlled from the GitHub repo which contains the configuration file where attacker can specify the task which trojan has to do in the victim machine and then upload the same content / file in the private gihub repository of the attacker.
This repository is based on the book "Black Hat Python" contains code and resources related to the tools and scripts discussed in the book. The repository provides access to source code written in Python, setup instructions, example data, documentation, and potential updates for the tools and scripts. The repository serves as a resource for readers
⛔ "Sniffing" refers to monitoring Internet traffic in real time. Sniffers are programs or hardware devices that can spy on you and all your Internet activities. Sometimes legitimate, sometimes illegal, sniffers can make you feel unprotected
⌨️ A keylogger is nothing more than a memorizer of actions produced on the keyboard: its translation from English is in fact “keylogger”.
Terminal based credential stuffing tool. Easy to build configs.
get metadata from pdf
Please do not try this at home. Gatherings of malware/ransomware etc. Written in Python and Bash
Download all files on victim pc and screenshot your pc screen. Have a fun and Funny Hacking
This script looks at a Email:password wordlist and Then attempts to locate the Imap server for the domains remaining. If a imap server responds the script will try to login via imap; if successful a hit will be logged in your results text file.
🧬 A payload refers to the component of a computer virus that performs a malicious activity. In addition to the speed at which a virus spreads, the threat level of a virus is calculated by the damage it causes.
All in one arp tool
Welcome to Page where you will find all kind cyber security/hacking/pentesting related tools
A script for creating a reverse shell tunnel for linux servers
Mac Changer In Python