Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality. Learn more โ
Top 23 Python hacking-tool Projects
-
xxh
๐ Bring your favorite shell wherever you go through the ssh. Xonsh shell, fish, zsh, osquery and so on.
-
Ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. (by EntySec)
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
-
blackhat-python3
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
-
Keylogger
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail. (by aydinnyunus)
-
DDoS-Ripper
DDos Ripper a Distributable Denied-of-Service (DDOS) attack server that cuts off targets or surrounding infrastructure in a flood of Internet traffic
-
Lockdoor-Framework
๐ Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
-
SaaSHub
SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives
-
DumpsterFire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
-
violent-python3
Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
-
AutoPWN-Suite
AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.
-
recollapse
REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications
-
sipvicious
SIPVicious OSS is a VoIP security testing toolset. It helps security teams, QA and developers test SIP-based VoIP systems and applications. This toolset is useful in simulating VoIP hacking attacks against PBX systems especially through identification, scanning, extension enumeration and password cracking.
-
tookie-osint
Tookie is a advanced OSINT information gathering tool that finds social media accounts based on inputs.
-
NIVOS
NIVOS is a hacking tool that allows you to scan deeply , crack wifi, see people on your network. It applies to all linux operating systems. And it is improving every day, new packages are added. Thank You For Using NIVOS :> [NIVOS Created By NIVO Team]
-
TireFire
Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortable GUI-ish platform. Great for OSCP/HTB type Machines as well as penetration testing.
-
Preferred-Network-List-Sniffer
A reconnaissance tool for capturing and displaying SSIDs from device's Preferred Network List.
-
Dimorf
Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OSยดs
-
Beginner-Bug-Bounty-Automation
Many script that can be modified according to your needs for Information Gathering and Asset discovery in Bug Bounty Hunting (Pull requests are welcome!)
-
SaaSHub
SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives
Tookie-OSINT is an advanced OSINT tool that searches for social media accounts based on the input username. Tookie has lots of options and settings and is currently in heavy development by our team so more features are to come. Tookie will now include more then just social media OSINT. Thanks for your time and thanks to everyone who made this possible. :D https://github.com/Alfredredbird/tookie-osint
Project mention: Show HN: Tool that captures SSIDs from device's Preferred Network List | news.ycombinator.com | 2023-12-24
Python hacking-tools related posts
-
Alfred, an Advanced Osint Tool
-
Alfred, an Advanced Osint Tool
-
Code feedback?
-
Alfred, an Advanced Osint Tool
-
Alfred, a Advanced Osint Tool
-
Alfred, a advanced OSINT tool
-
A Advanced Osint Tool
-
A note from our sponsor - InfluxDB
www.influxdata.com | 24 May 2024
Index
What are some of the best open-source hacking-tool projects in Python? This list will help you:
Project | Stars | |
---|---|---|
1 | xxh | 5,025 |
2 | Ghost | 2,560 |
3 | blackhat-python3 | 1,990 |
4 | Keylogger | 1,948 |
5 | DDoS-Ripper | 1,940 |
6 | 100-redteam-projects | 1,787 |
7 | Lockdoor-Framework | 1,305 |
8 | 007-TheBond | 1,041 |
9 | DumpsterFire | 970 |
10 | violent-python3 | 949 |
11 | AutoPWN-Suite | 883 |
12 | recollapse | 856 |
13 | sipvicious | 846 |
14 | tookie-osint | 635 |
15 | Black-Tool | 385 |
16 | NIVOS | 370 |
17 | TireFire | 137 |
18 | Preferred-Network-List-Sniffer | 133 |
19 | recon | 77 |
20 | Dimorf | 50 |
21 | XGS | 45 |
22 | Beginner-Bug-Bounty-Automation | 23 |
23 | MIXON | 15 |
Sponsored