Python ethical-hacking

Open-source Python projects categorized as ethical-hacking

Top 12 Python ethical-hacking Projects

  • blackhat-python3

    Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.

  • violent-python3

    Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.

  • InfluxDB

    Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.

    InfluxDB logo
  • CRLFsuite

    The most powerful CRLF injection (HTTP Response Splitting) scanner.

  • nebula

    AI-Powered Ethical Hacking Assistant (by berylliumsec)

  • Project mention: nebula: AI-Powered Ethical Hacking Assistant - Nebula is an AI-powered assistant specifically designed for the field of ethical hacking. It provides a unique capability for users to input commands using natural language processing, facilitating a seamless transition from intent to execution. | /r/blueteamsec | 2023-10-29
  • JPGtoMalware

    It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganograp

  • dora

    Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found (by sdushantha)

  • PwnLnX

    An advanced multi-threaded, multi-client python reverse shell for hacking linux systems. There's still more work to do so feel free to help out with the development. Disclaimer: This reverse shell should only be used in the lawful, remote administration of authorized systems. Accessing a computer network without authorization or permission is illegal.

  • WorkOS

    The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.

    WorkOS logo
  • try-harder

    "Try Harder" is a cybersecurity retro game designed to simulate 100 real-world scenarios that will help you prepare for the Offensive Security Certified Professional (OSCP) exam, all while offering an immersive experience and retro aesthetic. Enter Real commands correctly, move to the next host, and get a point. Can you get 100?

  • Project mention: I create cybersecurity retro games as a hobby. "Try Harder" is designed to simulate 100 scenarios that will help you prepare for the Offensive Security Certified Professional (OSCP) exam, all while offering an immersive experience and retro aesthetic. Check out my Github and Play it now! | /r/u_Milosilo_hacks | 2023-09-11
  • BrowserBruter

    BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python-based tool leverages Selenium and Selenium-Wire to automate web form fuzzing, making it easier to identify potential vulnerabilities in web applications.

  • Project mention: The Browser Bruter – First Ever Browser based web application fuzzing tool | news.ycombinator.com | 2024-04-08
  • Simple-Async-Port-Scanner

    A simple asynchronous TCP/IP Connect Port Scanner in Python 3

  • Wordlist-Duplicates-Remover

    A useful tool for cleaning up a wordlist.

  • NotesToCommands

    NotesToCommands is a powerful command template experience, allowing users to instantly execute terminal commands, with varying arguments, grouped into sections in a note or file. It was originally created for pentesting uses, to avoid the needed remembrance and retyping of sets of commands for various attacks.

NOTE: The open source projects on this list are ordered by number of github stars. The number of mentions indicates repo mentiontions in the last 12 Months or since we started tracking (Dec 2020).

Python ethical-hacking related posts

Index

What are some of the best open-source ethical-hacking projects in Python? This list will help you:

Project Stars
1 blackhat-python3 1,968
2 violent-python3 936
3 CRLFsuite 499
4 nebula 355
5 JPGtoMalware 354
6 dora 300
7 PwnLnX 220
8 try-harder 151
9 BrowserBruter 122
10 Simple-Async-Port-Scanner 85
11 Wordlist-Duplicates-Remover 6
12 NotesToCommands 5

Sponsored
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com