recon
violent-python3
Our great sponsors
recon | violent-python3 | |
---|---|---|
1 | 4 | |
77 | 936 | |
- | - | |
3.1 | 1.3 | |
6 months ago | about 1 year ago | |
Python | Python | |
GNU General Public License v3.0 or later | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
recon
violent-python3
- Recommend me a Cybersecurity book similar to ViolentPython
- Programming for hacking
- Software security
-
Is "Violent Python" a good book for beginners?
I don't recommend reading the old books violent python and blackhat python because they're written in python2 which is officially outdated. If you do read them, you have to not only learn programming, but be able to convert it to python3. There are already some conversions done in Github like this which you can use to read side by side with the book but I think it's still not good for a programming beginner to do. You're free to try though and see how it works for you.
What are some alternatives?
rengine - reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with minimal configuration and with the help of reNgine's correlation, it just makes recon effortless.
blackhat-python3 - Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
reconness - ReconNess is a platform to allow continuous recon (CR) where you can set up a pipeline of #recon tools (Agents) and trigger it base on schedule or events.
pythoncode-tutorials - The Python Code Tutorials
Vulnnr - Vulnnr - Vulnerability Scanner And Mass Exploiter, created for pentesting.
Keylogger - Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Nebula - Nebula is a cloud C2 Framework, which at the moment offers reconnaissance, enumeration, exploitation, post exploitation on AWS, but still working to allow testing other Cloud Providers and DevOps Components.
nfstream - NFStream: a Flexible Network Data Analysis Framework.
dirsearch - Web path scanner
IP-Tracker - Track any ip address with IP-Tracker. IP-Tracker is developed for Linux and Termux. you can retrieve any ip address information using IP-Tracker.
Ashok - Ashok is a OSINT Recon Tool , a.k.a :heart_eyes: Swiss Army knife .
Raccoon - A high performance offensive security tool for reconnaissance and vulnerability scanning