Repository navigation

#

blackhat-python

Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.

Python
2134
9 个月前

《python黑帽子:黑客与渗透测试编程之道》代码及实验文件,字典等

Python
380
3 年前

🏴‍☠️ tools (py3 version) of Black Hat Python book 🏴‍☠️

Python
123
5 个月前

《Python黑帽子-黑客与渗透测试编程之道》(Black Hat Python, 2nd Edition)阅读笔记

Python
40
3 年前

[Fugitive was made to offer resourcfulness to 'Osint Investigations' Fugitive will allow you to collect detailed information about "subjects" and in further development will become one of the best OSINT tools for your personal or professional activities]

Python
26
2 年前

<BLACKHAT> Generates CCN|{day}/{year}|{CVV} *** FOR EDUCATIONAL PURPOSES ONLY *** I AM NOT RESPONSIBLE FOR ANY MISUSE ***

Python
26
2 年前

written to increase website visits and in case of excessive use of it, the website will be blacklisted by Google.

Python
19
2 年前

A collection of advanced Python scripts for cybersecurity, penetration testing, and ethical hacking.

Python
14
2 个月前

This repostiory contains the python code of command and control trojan which will be controlled from the GitHub repo which contains the configuration file where attacker can specify the task which trojan has to do in the victim machine and then upload the same content / file in the private gihub repository of the attacker.

Python
13
2 年前

⛔ "Sniffing" refers to monitoring Internet traffic in real time. Sniffers are programs or hardware devices that can spy on you and all your Internet activities. Sometimes legitimate, sometimes illegal, sniffers can make you feel unprotected

12
2 年前

⌨️ A keylogger is nothing more than a memorizer of actions produced on the keyboard: its translation from English is in fact “keylogger”.

10
2 年前

DANGER! DO NOT USE IT! I WARN YOU BEFORE! This script monitors and intercepts Tor traffic to detect and handle malicious activity. It utilizes the Scapy and Stem libraries to analyze network packets and interact with the Tor network.

Python
8
8 个月前

🧬 A payload refers to the component of a computer virus that performs a malicious activity. In addition to the speed at which a virus spreads, the threat level of a virus is calculated by the damage it causes.

8
2 年前