This repository will contain python scripts for hackers and pentesters

Overview

Python Scripts For Hackers & Pentesters

This repository will contain python scripts for hackers and pentesters. stop being limited with availble tools. Build your own.

Don't be a script kiddie

Don't be script kiddie, try to write your own applications and get your hacking tools to do what you want them to do and if there isn't a hacking tool that does what you want to do create your own.

Day 01: Creating A Wi-Fi Password Stealer

In this tutorial I'm going to show you how you can create a simple python script that can steal passwords for all the wi-fi networks on a computer. But before we jump into into scripting. This can save you a lot of time and effort unlike using brute forcing method. **Complete Guide: **https://xtremepentest.hashnode.dev/create-a-your-own-wi-fi-password-stealer

Day 02: Creating An FTP Brute-Forcer(ftpbust3r)

In this tutorial you will learn how to crack ftp servers using dictionary attack(brute force with a word-list) with the help of a ftplib module in python. A brute-force attack is an attack that submits many passwords to a password protected file or service with the hope of guessing correctly.

We will be using the ftplib module which comes built-in with python and colorama (third-part) module to print colors in python. Complete Guide: https://xtremepentest.hashnode.dev/creating-an-ftp-brute-forcerftpbust3r-in-python

Day 03: Creating Your Own Keylogger (keybust3r)

In this guide, we are going to learn how to code a very effective, yet precise keylogger using a third-part python module called pynput. In case if you don't know, a keylogger is program that monitors keystrokes. A keylogger's basic functionality is to monitor keystrokes continuously and sent those keystrokes to a specific location, that can be either your email, server, or stored locally in your system. Complete guide: https://xtremepentest.hashnode.dev/creating-your-own-keylogger

Day 04: A Brief Introduction to Scapy

Scapy is a python interactive packet manipulation program/library for computer networks. It runs natively on Linux, Mac OS X and the latest version of scapy also supports windows out-out-the-box. So, you can use nearly all scapy's features on a windows machine without any problems. Complete guide: https://xtremepentest.hashnode.dev/a-brief-introduction-to-scapy

Owner
0xTRAW
Hi.., I'm TRÄW🤟(Pythonist). I'm that hacker your friends told you about. I'm a content creator, I create educational cybersec videos. I love fuzzing things!
0xTRAW
CTF framework and exploit development library

pwntools - CTF toolkit Pwntools is a CTF framework and exploit development library. Written in Python, it is designed for rapid prototyping and develo

Gallopsled 9.8k Dec 31, 2022
Early days of an Asset Discovery tool.

Please star this project! Written in Python Report Bug . Request Feature DISCLAIMER This project is in its early days, everything you see here is almo

grag1337 3 Dec 20, 2022
A simple automatic tool for finding vulnerable log4j hosts

Log4Scan A simple automatic tool for finding vulnerable log4j hosts Installation pip3 install -r requirements.txt Usage usage: log4scan.py [-h] (-f FI

Federico Rapetti 20018955 6 Mar 10, 2022
A simple Outline Server Access Key Copy and Paste Web Interface

Outline Keychain A simple Outline Server Access Key Copy and Paste Web Interface Developed for key and password export and copy & paste for other Shad

Zhe 1 Dec 28, 2021
The probability of having the password you want in the PassMaker is +90%!!

PasswordMaker Strong listing password Introduction The probability of having the password you want in the tool is +90%!! How to Install Open the termi

MasterBurnt 4 Sep 05, 2021
An OSINT tool that searches for devices directly connected to the internet (IoT) with a user specified query. It returns results for Webcams, Traffic lights, Refridgerators, Smart TVs etc.

An OSINT tool that searches for devices directly connected to the internet (IoT) with a user specified query. It returns results for Webcams, Traffic

Richard Mwewa 48 Nov 20, 2022
CVE-2022-22536 - SAP memory pipes(MPI) desynchronization vulnerability CVE-2022-22536

CVE-2022-22536 SAP memory pipes desynchronization vulnerability(MPI) CVE-2022-22

antx 49 Nov 09, 2022
web指纹识别工具

前言 一直苦于没有用的顺手的web指纹识别工具,学习前辈s7ckTeam的Glass和broken5的WebAliveScan优秀开源程序开发的轻量型web指纹工具。

EASY 966 Dec 26, 2022
Credit Card And SK Checker Written In Python

💳 Credit Card Checker (CC Checker) & Mass SK Checker & Generator 💳

Rimuru Tempest 53 Dec 31, 2022
Compilation of resources and insights that helped me on my journey to data scientist

Compilation of resources and insights that helped me on my journey to data scientist

Conor Dewey 1.5k Jan 02, 2023
All in One CRACKER911181's Tool. This Tool For Hacking and Pentesting.🎭

This is A Python & Bash Programming Based Termux-Tool Created By CRACKER911181. This Tool Created For Hacking and Pentesting. If You Use This Tool To Evil Purpose,The Owner Will Never be Responsible

CRACKER911181 1 Jan 10, 2022
Script checks provided domains for log4j vulnerability

log4j Script checks provided domains for log4j vulnerability. A token is created with canarytokens.org and passed as header at request for a single do

Matthias Nehls 2 Dec 12, 2021
Cobalt Strike Beacon configuration extractor and parser.

Cobalt Strike Configuration Extractor and Parser Overview Pure Python library and set of scripts to extract and parse configurations (configs) from Co

Stroz Friedberg 102 Dec 18, 2022
IDA2Obj is a tool to implement SBI (Static Binary Instrumentation).

IDA2Obj IDA2Obj is a tool to implement SBI (Static Binary Instrumentation). The working flow is simple: Dump object files (COFF) directly from one exe

Mickey 94 Dec 13, 2022
PoC for CVE-2021-45897 aka SCRMBT-#180 - RCE via Email-Templates (Authenticated only) in SuiteCRM <= 8.0.1

CVE-2021-45897 PoC for CVE-2021-45897 aka SCRMBT-#180 - RCE via Email-Templates (Authenticated only) in SuiteCRM = 8.0.1 This vulnerability was repor

Manuel Zametter 17 Nov 09, 2022
A proof-of-concept exploit for Log4j RCE Unauthenticated (CVE-2021-44228)

CVE-2021-44228 – Log4j RCE Unauthenticated About This is a proof-of-concept exploit for Log4j RCE Unauthenticated (CVE-2021-44228). This vulnerability

Pedro Havay 20 Nov 11, 2022
Springboot directory scanning

Springboot directory scanning

WINEZERO 87 Dec 28, 2022
Python exploit for vsftpd 2.3.4 - Backdoor Command Execution

CVE-2011-2523 - vsftpd 2.3.4 Exploit Discription vsftpd, which stands for Very Secure FTP Daemon,is an FTP server for Unix-like systems, including Lin

Padsala Tushal 5 Nov 08, 2022
An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.

Log4JHunt An automated, reliable scanner for the Log4Shell CVE-2021-44228 vulnerability. Video demo: Usage Here the help usage: $ python3 log4jhunt.py

RedHunt Labs 39 Nov 21, 2022
Click-Jack - Automatic tool to find Clickjacking Vulnerability in various Web applications

CLICK-Jack It is a automatic tool to find Clickjacking Vulnerability in various

Prince Prafull 4 Jan 10, 2022