Repository navigation
blackhat-python
- Website
- Wikipedia
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
《python黑帽子:黑客与渗透测试编程之道》代码及实验文件,字典等
hulk is a ddos attacking tool
🏴☠️ tools (py3 version) of Black Hat Python book 🏴☠️
fsociety is a penetration toolkit inspired from MR. ROBOT
wifi dos attack tool
《Python黑帽子-黑客与渗透测试编程之道》(Black Hat Python, 2nd Edition)阅读笔记
Personal version of tools from Black Hat Python
[Fugitive was made to offer resourcfulness to 'Osint Investigations' Fugitive will allow you to collect detailed information about "subjects" and in further development will become one of the best OSINT tools for your personal or professional activities]
<BLACKHAT> Generates CCN|{day}/{year}|{CVV} *** FOR EDUCATIONAL PURPOSES ONLY *** I AM NOT RESPONSIBLE FOR ANY MISUSE ***
written to increase website visits and in case of excessive use of it, the website will be blacklisted by Google.
Python3 Script For Gmail Hacking
A collection of advanced Python scripts for cybersecurity, penetration testing, and ethical hacking.
This repostiory contains the python code of command and control trojan which will be controlled from the GitHub repo which contains the configuration file where attacker can specify the task which trojan has to do in the victim machine and then upload the same content / file in the private gihub repository of the attacker.
⛔ "Sniffing" refers to monitoring Internet traffic in real time. Sniffers are programs or hardware devices that can spy on you and all your Internet activities. Sometimes legitimate, sometimes illegal, sniffers can make you feel unprotected
⌨️ A keylogger is nothing more than a memorizer of actions produced on the keyboard: its translation from English is in fact “keylogger”.
DANGER! DO NOT USE IT! I WARN YOU BEFORE! This script monitors and intercepts Tor traffic to detect and handle malicious activity. It utilizes the Scapy and Stem libraries to analyze network packets and interact with the Tor network.
A script for creating a reverse shell tunnel for linux servers
🧬 A payload refers to the component of a computer virus that performs a malicious activity. In addition to the speed at which a virus spreads, the threat level of a virus is calculated by the damage it causes.