Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality. Learn more →
Top 12 Python ethical-hacking Projects
-
blackhat-python3
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
-
violent-python3
Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
-
JPGtoMalware
It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganograp
-
dora
Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found (by sdushantha)
-
PwnLnX
An advanced multi-threaded, multi-client python reverse shell for hacking linux systems. There's still more work to do so feel free to help out with the development. Disclaimer: This reverse shell should only be used in the lawful, remote administration of authorized systems. Accessing a computer network without authorization or permission is illegal.
-
WorkOS
The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.
-
try-harder
"Try Harder" is a cybersecurity retro game designed to simulate 100 real-world scenarios that will help you prepare for the Offensive Security Certified Professional (OSCP) exam, all while offering an immersive experience and retro aesthetic. Enter Real commands correctly, move to the next host, and get a point. Can you get 100?
-
BrowserBruter
BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python-based tool leverages Selenium and Selenium-Wire to automate web form fuzzing, making it easier to identify potential vulnerabilities in web applications.
-
NotesToCommands
NotesToCommands is a powerful command template experience, allowing users to instantly execute terminal commands, with varying arguments, grouped into sections in a note or file. It was originally created for pentesting uses, to avoid the needed remembrance and retyping of sets of commands for various attacks.
Project mention: nebula: AI-Powered Ethical Hacking Assistant - Nebula is an AI-powered assistant specifically designed for the field of ethical hacking. It provides a unique capability for users to input commands using natural language processing, facilitating a seamless transition from intent to execution. | /r/blueteamsec | 2023-10-29
Project mention: I create cybersecurity retro games as a hobby. "Try Harder" is designed to simulate 100 scenarios that will help you prepare for the Offensive Security Certified Professional (OSCP) exam, all while offering an immersive experience and retro aesthetic. Check out my Github and Play it now! | /r/u_Milosilo_hacks | 2023-09-11
Project mention: The Browser Bruter – First Ever Browser based web application fuzzing tool | news.ycombinator.com | 2024-04-08
Python ethical-hacking related posts
- nebula: AI-Powered Ethical Hacking Assistant - Nebula is an AI-powered assistant specifically designed for the field of ethical hacking. It provides a unique capability for users to input commands using natural language processing, facilitating a seamless transition from intent to execution.
- AI Powered Ethical Hacking Assistant
- AI powered ethical hacking tool will help ethical hackers find vulnerabilities faster
- AI Powered Ethical Hacking Assistant
- AI powered ethical hacking tool will help ethical hackers find vulnerabilities faster
- AI Powered Ethical Hacking tool
- I create cybersecurity retro games as a hobby. "Try Harder" is designed to simulate 100 scenarios that will help you prepare for the Offensive Security Certified Professional (OSCP) exam, all while offering an immersive experience and retro aesthetic. Check out my Github and Play it now!
-
A note from our sponsor - InfluxDB
www.influxdata.com | 28 Apr 2024
Index
What are some of the best open-source ethical-hacking projects in Python? This list will help you:
Project | Stars | |
---|---|---|
1 | blackhat-python3 | 1,968 |
2 | violent-python3 | 936 |
3 | CRLFsuite | 499 |
4 | nebula | 355 |
5 | JPGtoMalware | 354 |
6 | dora | 300 |
7 | PwnLnX | 220 |
8 | try-harder | 151 |
9 | BrowserBruter | 122 |
10 | Simple-Async-Port-Scanner | 85 |
11 | Wordlist-Duplicates-Remover | 6 |
12 | NotesToCommands | 5 |
Sponsored