Top 23 Python Hacking Projects
A list of useful payloads and bypass for Web Application Security and Pentest/CTFProject mention: Anyone try 327ing the Texas Hotline? | reddit.com/r/xkcd | 2021-09-03
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.Project mention: What's the "best" coding language to know/learn? | reddit.com/r/hacking | 2021-06-15
Optimize your datasets for ML. Goodbye, boilerplate code - the fastest dataset optimization and management tool for computer vision.
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡Project mention: Awesome Penetration Testing | dev.to | 2021-10-06
Ciphey - Automated decryption tool using artificial intelligence and natural language processing.
Universal Radio Hacker: Investigate Wireless Protocols Like A BossProject mention: Convert Radio Waves to Bits (RF Demodulation) | reddit.com/r/engineering | 2021-08-12
Hey cool video! If you haven’t already, check out Universal Radio Hacker, which pretty much combines most of the steps you did with Inspectrum and Gnuradio. https://github.com/jopohl/urh
Web path scannerProject mention: Release dirsearch v0.4.2 - Web Path Scanner | reddit.com/r/netsec | 2021-09-12
People tracker on the Internet: OSINT analysis and research tool by Jose PinoProject mention: Can you backtrace a VPN covered IP to reach its origin? If so, which is the process (from a high-level) | reddit.com/r/AskNetsec | 2021-10-09
Well I would highly recommend using this Trape OSINT tool for tracking people on internet (Github)
🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell you what it is! 🧙♀️Project mention: Is there an application or way to find hashes? | reddit.com/r/HowToHack | 2021-06-24
Do you mean something like this: https://github.com/bee-san/pyWhat
Run Linux Software Faster and Safer than Linux with Unikernels.
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.Project mention: Trying to find a username and password to access a virtual machine to solve a CTF? | reddit.com/r/HowToHack | 2021-04-06
shot in the dark.... but the port 135 being open might be interesting?
Fully automated offensive security framework for reconnaissance and vulnerability scanningProject mention: How do I automate recon for 450+ hosts? Sn1per alternatives | reddit.com/r/AskNetsec | 2021-01-28
I've used https://github.com/yogeshojha/rengine and https://github.com/j3ssie/Osmedeus with great success.
Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install almost 370+ hacking tools in termux app and other linux based distributions.Project mention: I don't understand the problem can I get some help troubleshooting? | reddit.com/r/termux | 2021-03-02
I didn't try it myself but did you follow the directions listed here? https://github.com/rajkumardusad/Tool-X
Scalable Automated Adversary Emulation PlatformProject mention: Guidance on certs in Cybersecurity Field | reddit.com/r/cybersecurity | 2021-10-11
Osintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nicknameProject mention: Instagram osint tools for specific use case | reddit.com/r/OSINT | 2021-06-12
If you are trying to run OSINT on the Instagram platform then I would suggest looking at the OSintgram tool. https://github.com/Datalux/Osintgram
Like nmap for mapping wifi networks you're not connected to, plus device trackingProject mention: I Hacked My Standing Desk with a Raspberry Pi | news.ycombinator.com | 2021-07-25
Well, instead of a teensy, the esp32 is sure a good bet.
But since you've got the Pi, the next logical step is to get an rtc upgrade and run chrony/openntpd and a backup dns cache. Why not? I mean its right there on the desk. Could add a quick binary clock for practicality.
Since you might now be dependent on the thing, its easy to add snmp for monitoring, hack in some rrdtool or whatever to graph your sit/stand time, maybe a serial connection to monitor your UPS power situation, and you get a free Pi-hole by now! Probably a little overkill to run wireguard on the thing, though.
Why stop there? Have it control some functional LED lighting (Zack uses an ESP32 instead of the pi--must not care about clock drift. The biometric sensor is also a little expensive and uncomfortable looking.) with suntime for a perfectly and coherently illuminated environment. For the extremely paranoid, yet lazy and obsessive (who does that not describe?) you can grab an extra wifi dongle with raw monitoring mode to have some fun with trackerjacker. Use an innovative static base station running map mode, so when an influx of unknown devices with increasing strength and/or known vehicle SSIDs or PAN beacons are detected, just go full Red Alert (using those very practical leds) and score a quick win by raising the desk and commanding your IoT lighting for a deft escape. Maybe you can use this for the girlfriend too, you've already got rrdtool or cacti or whatever graphing the desk height, so you could also use that capability to gain insight as to when it should reach out and trigger your coffee maker's ESP32, certainly while raising the desk.
Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related emailProject mention: r/196 user thinks he's a hero for grabbing someone's IP | reddit.com/r/averageredditor | 2021-08-13
There's a bit more you can do with an IP, and I'll elaborate. Your IP may be tied to several publicly dumped accounts. Tools such as h8mail will index data from these breaches. This is the beginning of the reconnaissance phase. An IP has more value than some may expect
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.Project mention: oscp and ctf bash script fro recon help | reddit.com/r/cybersecurity | 2020-12-24
Find leaked secrets via github searchProject mention: techgaun/github-dorks - Find leaked secrets via github search | reddit.com/r/GithubSecurityTools | 2021-02-19
Notes about attacking Jenkins serversProject mention: JAF is an internally developed, red team-oriented tool from Accenture for interacting with Jenkins build servers. | reddit.com/r/netsec | 2021-05-05
I'm maintaining a list of scripts and exploits for Jenkins here: https://github.com/gquere/pwn_jenkins
Tool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.Project mention: ULPT Request: how can I use up as much WiFi as possible while I’m at work? | reddit.com/r/UnethicalLifeProTips | 2021-09-22
Just use netcut(https://arcai.com/ ), or evillimiter(https://github.com/bitbrute/evillimiter ). That way, you can slow down their wifi without affecting your speed at all
🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡Project mention: I have a hashed password, but have no idea on how to crack it. | reddit.com/r/HowToHack | 2021-06-14
perhaps try Dehash.me or HashPals
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security ResourcesProject mention: Lockdoor Framework 2.3 release, a penetration testing framework | reddit.com/r/cybersecurity | 2021-06-16
Check the website here
Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.Project mention: Make-My-Threads | reddit.com/r/tryhackme | 2021-02-16
How is this different from interlace
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.Project mention: How do you improve your blue team skills? | reddit.com/r/blueteamsec | 2021-01-17
Drone pentesting framework consoleProject mention: dhondta/dronesploit: Drone pentesting framework console | reddit.com/r/hacking | 2021-10-03
What are some of the best open-source Hacking projects in Python? This list will help you:
Are you hiring? Post a new remote job listing for free.