Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues invo...
翻译 - 贾斯汀·塞茨(Justin Seitz)的《黑帽Python》一书的源代码。该代码已完全转换为Python 3,经过重新格式化以符合PEP8标准,并进行了重构以消除涉及不赞成使用的库的实现的依赖关系问题。
hulk is a ddos attacking tool
🏴☠️ tools (py3 version) of Black Hat Python book 🏴☠️
fsociety is a penetration toolkit inspired from MR. ROBOT
《Python黑帽子-黑客与渗透测试编程之道》(Black Hat Python, 2nd Edition)阅读笔记
wifi dos attack tool
Personal version of tools from Black Hat Python
[Fugitive was made to offer resourcfulness to 'Osint Investigations' Fugitive will allow you to collect detailed information about "subjects" and in further development will become one of the best OSI...
<BLACKHAT> Generates CCN|{day}/{year}|{CVV} *** FOR EDUCATIONAL PURPOSES ONLY *** I AM NOT RESPONSIBLE FOR ANY MISUSE...
written to increase website visits and in case of excessive use of it, the website will be blacklisted by Google.
Python3 Script For Gmail Hacking
⛔ "Sniffing" refers to monitoring Internet traffic in real time. Sniffers are programs or hardware devices that can spy on you and all your Internet activities. Sometimes legitimate, sometimes illegal...
This repostiory contains the python code of command and control trojan which will be controlled from the GitHub repo which contains the configuration file where attacker can specify the task which tro...
A collection of advanced Python scripts for cybersecurity, penetration testing, and ethical hacking.
⌨️ A keylogger is nothing more than a memorizer of actions produced on the keyboard: its translation from English is in fact “keylogger”.
DANGER! DO NOT USE IT! I WARN YOU BEFORE! This script monitors and intercepts Tor traffic to detect and handle malicious activity. It utilizes the Scapy and Stem libraries to analyze network packets a...
A script for creating a reverse shell tunnel for linux servers
🧬 A payload refers to the component of a computer virus that performs a malicious activity. In addition to the speed at which a virus spreads, the threat level of a virus is calculated by the damage ...