Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for python ethical hacking
ethical-hacking
x
python
x
68 search results found
Pythoncode Tutorials
⭐
1,923
The Python Code Tutorials
Blackhat Python3
⭐
1,763
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Ethical Hacking Tools
⭐
1,159
Complete Listing and Usage of Tools used for Ethical Hacking
Babysploit
⭐
996
👶 BabySploit Beginner Pentesting Toolkit/Framework Written in Python 🐍
Violent Python3
⭐
867
Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Packet Sniffer
⭐
548
A Network Packet Sniffing tool developed in Python 3.
Rekono
⭐
385
Pentesting automation platform that combines hacking tools to complete assessments
Guia Ackercode
⭐
307
Guia Acker Code de Programação e Hacking
Nebula
⭐
291
AI-Powered Ethical Hacking Assistant
Pycrypt
⭐
266
Python Based Crypter That Can Bypass Any Kinds Of Antivirus Products
Jpgtomalware
⭐
220
It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganograp
Pwnlnx
⭐
215
An advanced multi-threaded, multi-client python reverse shell for hacking linux systems. There's still more work to do so feel free to help out with the development. Disclaimer: This reverse shell should only be used in the lawful, remote administration of authorized systems. Accessing a computer network without authorization or permission is illegal.
Forbidden
⭐
208
Bypass 4xx HTTP response status codes and more. Based on PycURL and Python Requests.
Dora
⭐
206
Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found
Pwnlnx
⭐
196
An advanced multi-threaded, multi-client python reverse shell for hacking linux systems. There's still more work to do so feel free to help out with the development. Disclaimer: This reverse shell should only be used in the lawful, remote administration of authorized systems. Accessing a computer network without authorization or permission is illegal.
Ghost_eye
⭐
171
Ghost Eye Informationgathering Footprinting Scanner and Recon Tool Release. Ghost Eye is an Information Gathering Tool I made in python 3. To run Ghost Eye, it only needs a domain or ip. Ghost Eye can work with any Linux distros if they support Python 3. Author: Jolanda de Koff
Arp Spoofer
⭐
169
A pure-Python ARP Cache Poisoning (a.k.a "ARP Spoofing") tool
Powershell Backdoor Generator
⭐
148
Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero and Hak5 USB Rubber Ducky, and changes its signature after every build for evasion.
Sordeal Stealer
⭐
146
[NEW] Discord token grabber, Grab Passwords/cookies/history/credit cards for all browsers/Antivirus/wifi Passwords/Anti Debug/Kill Discord/AntiUpdate/Add Startup/Fake Error/steal all Cord Tokens/Steal Wallet/address replacer,GUI builder,Discord Injection/steal passwords/credit card/paypal/antidelete/new login/logout/nitro autobuy
Dorkscanner
⭐
125
A typical search engine dork scanner scrapes search engines with dorks that you provide in order to find vulnerable URLs.
Steganographer
⭐
123
Steganograpy in Python | Hide files or data in Image Files
Argus
⭐
111
Argus Advanced Remote & Local Keylogger For macOS and Windows
Hawkish Eyes
⭐
88
Ethical Hacking Tool | Powerfull Tokens Grabber / Stealer Discord, Steal: Browsers Passwords & Cookies, Window Info, Files Sniper, Wallet, Minecraft Account, Bypass Firewall & Antivirus, Discord Injection JS, Chromium Injection JS (Brave, Chrome, OperaGX, Opera, Vivaldi, Edge, yandex).
Simple Async Port Scanner
⭐
77
A simple asynchronous TCP/IP Connect Port Scanner in Python 3
Ethical Hacking Notes
⭐
68
my notes
Sshame
⭐
57
brute force SSH public-key authentication
Ddos Bomber
⭐
49
priyans0830m
Fbhackver2.7
⭐
45
FACEBOOK HACKING TOOL
Try Harder
⭐
41
"Try Harder" is a cybersecurity retro game designed to simulate 100 real-world scenarios that will help you prepare for the Offensive Security Certified Professional (OSCP) exam, all while offering an immersive experience and retro aesthetic. Enter Real commands correctly, move to the next host, and get a point. Can you get 100?
Hulk
⭐
38
hulk is a ddos attacking tool
Webspoilt
⭐
38
This script will you help to find the information about the website and to help in penetrating testing
Ethical Hacking Tools Python
⭐
34
Python programs & tools built in the Ethical Hacking with Python EBook
Brutus
⭐
30
Botnet targeting Windows machines written entirely in Python & open source security project.
Brutesniffing_fisher
⭐
29
hacking tool
Ctf Wr1t3ups
⭐
27
Repository to store summaries of CTF challenges
Crypto
⭐
25
This tool will encrypt-decrypt your files and directories. It has built-in password generator and featured with Colourful UI. It is based on AES (Advanced Encryption Standard) CBC mode Algorithm Symmetric Cryptography and made in Python language (Python3)
Mdpin
⭐
25
MDPin is a server and a website. It contains an UI to fake a Android login screen to steal their pin code. It works via a web browser, by going into fullscreen.
Python For Ethical Hacking
⭐
23
This is a complete project series on implementing hacking tools available in Kali Linux into python.
Hackipy
⭐
22
Hacking, pen-testing, and cyber-security related tools built with Python.
Brutekrag
⭐
21
Penetration tests on SSH servers using brute force or dictionary attacks. Written in Python.
Kali Linux Dockerfile
⭐
20
A simple Dockerfile to build an image starting from the latest official one of Kali Linux and including some useful tools.
Porthub
⭐
19
A fast port scanner written in python with a focus on reliability and simplicity.
Itsmetraw
⭐
17
Python For Ethical Hacking
⭐
17
Build tools for hacking ethically using python.
Chad
⭐
17
Search Google Dorks like Chad. / Social media takeover tool.
Kalnemix
⭐
16
A powerful command-line tool for website reconnaissance and information gathering
Machine Learning Siem Water Infrastructure
⭐
15
This work aims at using different machine learning techniques in detecting anomalies (including hardware failures, sabotage and cyber-attacks) in SCADA water infrastructure.
Pentest
⭐
13
Pentesting Notes, Cheetsheets and Guide
Whitehat
⭐
12
Python Packages For Ethical Hacking
Hashexploit
⭐
12
HashExpoit is Great Tool For Cracking Hash
Ceh
⭐
12
CEH (Maktabkhooneh)
Tofu
⭐
11
Windows offline filesystem hacking tool for Linux
Pentesting
⭐
11
Cyber Security
Selene
⭐
10
Séléné is a database dumper written in python3. Usefull during pentesting and CTFs.
Multitool
⭐
10
Simple Penetration Testing Multitool For Beginners.
Jwt Bf
⭐
10
Brute force a JWT token. Script uses multithreading.
Beginners Guide To Ethical Hacking
⭐
10
For beginners which zero knowledge on ethical hacking!
P0znmitm
⭐
9
Advanced MITM Tool
Fuzzout
⭐
9
Every Hacker's Go to Fuzzing List. Introducing the Ultimate Fuzzing Directory: Your Go-To Resource for Penetration Testers and Bug Bounty Hunters! Unlock the power of comprehensive fuzzing with our meticulously curated Fuzzing Directory, a one-stop solution designed to streamline your penetration testing and bug bounty hunting endeavors.
Wordlist Extender
⭐
9
Extend wordlist by appending digits and special characters to each word.
Domain Extractor
⭐
8
Extract valid or partially valid domain names and IPs from malicious or invalid URLs.
Automated Reconator
⭐
7
X_insta
⭐
7
X_INSTA Powerful INSTAGRAM Password Brute Force Tool For Windows
Netprobe
⭐
7
NetProbe: Network Probe
Amounts
⭐
6
Generate a wordlist to fuzz amounts or any other numerical values.
Venus_grabber
⭐
6
one of the best grabber of 2023 written in python
Revoltshing
⭐
6
FRAMEWORK REVOLTSHING v.2 . HTTP SERVER FOR PHISHING
Anongt
⭐
6
Redirect All Traffic Through Tor Network For Kali Linux
Loki
⭐
6
Ransomware is unique among cybercrime because in order for the attack to be successful, it requires the victim to become a willing accomplice even after the fact.
Ethical Hacking Study
⭐
5
Ethical Hacking - Useful Resources
Fsociety
⭐
5
fsociety is a penetration toolkit inspired from MR. ROBOT
Ethical Hacking
⭐
5
Hackers4fun Writeups
⭐
5
Writeups for H4ck3rs4Fun Challenges posted on Twitter
Bad Boy
⭐
5
A framework inspired from https://youtu.be/RWIL-6xhmXU
Ddos Tool
⭐
5
This is a tools for ddos attack {distributed denial of service} you can test networks,servers,any others device with it.
Dupknock
⭐
5
Python tool to help you knockout duplicate entries from multiple files and generate the final output
Nagooglesearch
⭐
5
Not another Google searching tool.
Notestocommands
⭐
5
NotesToCommands is a powerful command template experience, allowing users to instantly execute terminal commands, with varying arguments, grouped into sections in a note or file. It was originally created for pentesting uses, to avoid the needed remembrance and retyping of sets of commands for various attacks.
Related Searches
Python Flask (17,643)
Python Script (17,086)
Python Machine Learning (14,099)
Python Tensorflow (13,736)
Python Command Line (13,351)
Python Jupyter Notebook (12,976)
Python Network (11,495)
Python Testing (9,479)
Python Natural Language Processing (9,064)
Python Artificial Intelligence (8,580)
1-68 of 68 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.