There are 10 repositories under blackhat-python topic.
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
《python黑帽子:黑客与渗透测试编程之道》代码及实验文件,字典等
🏴☠️ tools (py3 version) of Black Hat Python book 🏴☠️
fsociety is a penetration toolkit inspired from MR. ROBOT
A collection of advanced Python scripts for cybersecurity, penetration testing, and ethical hacking.
wifi dos attack tool
《Python黑帽子-黑客与渗透测试编程之道》(Black Hat Python, 2nd Edition)阅读笔记
Personal version of tools from Black Hat Python
<BLACKHAT> Generates CCN|{day}/{year}|{CVV} *** FOR EDUCATIONAL PURPOSES ONLY *** I AM NOT RESPONSIBLE FOR ANY MISUSE ***
[Fugitive was made to offer resourcfulness to 'Osint Investigations' Fugitive will allow you to collect detailed information about "subjects" and in further development will become one of the best OSINT tools for your personal or professional activities]
Python3 Script For Gmail Hacking
written to increase website visits and in case of excessive use of it, the website will be blacklisted by Google.
python based sqli detector tool
This is a python3 script for hacking Gmail account using Brute-force attack.
Professional Use Only - Handle With Extreme Care! This tool is designed for experienced security professionals and red teams. It provides a battle-tested framework for infrastructure hardening, threat detection, and offensive security research. PoisonIvory is not for script kiddies! It intentionally requires deep technical knowledge to operate ...
This repostiory contains the python code of command and control trojan which will be controlled from the GitHub repo which contains the configuration file where attacker can specify the task which trojan has to do in the victim machine and then upload the same content / file in the private gihub repository of the attacker.
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate issues of dependency resolution involving deprecated modules.
Remake Of The USB Rubber Ducky In Python With Better Features. Steals IPv4+IPv6 And Other IPs, And Browsing History From: Brave, Microsoft Edge, Opera, Google Chrome, Firefox. And System Info, And Computer Component Infos As Well. Has New Editions Available!
This repository is based on the book "Black Hat Python" contains code and resources related to the tools and scripts discussed in the book. The repository provides access to source code written in Python, setup instructions, example data, documentation, and potential updates for the tools and scripts. The repository serves as a resource for readers
A script for creating a reverse shell tunnel for linux servers
Please do not try this at home. Gatherings of malware/ransomware etc. Written in Python and Bash. together with the help of A.I. & Stackoverflow
All in one arp tool
As hackers, we put a premium on function over elegance as time is always scarce. When you need to quickly create a solution to a problem, style concerns come secondary.
Download all files on victim pc and screenshot your pc screen. Have a fun and Funny Hacking
Keylogger in python
xss vulnerability tool
Internet Protocol Show Information
This script looks at a Email:password wordlist and Then attempts to locate the Imap server for the domains remaining. If a imap server responds the script will try to login via imap; if successful a hit will be logged in your results text file.