Note
This repository contains tools and scripts sourced from various GitHub repositories and other open-source platforms. All original works are credited to their respective authors. If you are the owner of any content and wish to have it removed, please contact the repository author directly. This project is intended for educational and ethical purposes only. Unauthorized use, distribution, or modification of these tools without proper consent is prohibited. By using this repository, you agree to comply with all applicable laws and ethical guidelines. The author is not responsible for any misuse or damage caused by the tools provided herein.
- Password Hash Cracking (
hashlib/ hashcat integration) - LDAP Brute Force
- SSH Brute Force with Paramiko
- FTP Brute Force
- SMB Brute Force (
impacket)
- Packet Sniffer Using raw sockets
- Packet Sniffer Decoding Header
- Packet Sniffer Decoding ICMP
- Python Subnet Scanner with ICMP Packet Analysis
- Email Credential Sniffer in Python
- Check Open and Closed Ports on a Remote Host
- Multithreaded TCP Port Scanning
- Scanning a Range of Ports on a Remote Host
- Test a Socket Connection to a Remote Host
- Resolve Host Name from an IP Address
- TCP SYN Scan with Scapy
- OS Fingerprinting
- Custom Protocol Crafting
- Network Traceroute with Scapy
- DNS Spoofing / DNS Poisoning
- DHCP Starvation Attack
- SYN Flood / DoS Scripts
- VLAN Hopping
- ICMP Tunneling
- SSL/TLS Stripping
- 802.11 Wi-Fi Deauth Attack (Scapy)
- WPA Handshake Capture
- Brute-force HTTP authentication scan
- Multi-threaded Brute-Force Login Script
- multi-threaded brute-force attack on a WordPress login page
- SQL Injection Detection & Exploitation
- XSS Payload Injection Tester (Reflected / Stored / DOM)
- CSRF Token Bypass
- XXE Injection Tester
- SSRF Detection Script
- LFI / RFI Scanner
- JWT Token Manipulation
- CORS Misconfiguration Scanner
- GraphQL Enumeration & Fuzzing
- Cookie Manipulation / Session Hijacking
- HTTP Request Smuggling
- OAuth Attack Scripts
- Web Scraper / Crawler for Recon (BeautifulSoup / Selenium)
- REST API Fuzzer
- Burp Suite Intruder Payload Generator (Python Extension)
- Burp Suite Extension: BHP Wordlist (Bing Search Integration)
- Burp Suite Extension: BHP Wordlist Generator
- WHOIS Lookup Automation
- DNS Enumeration (Subdomains)
- Google Dorking Automation
- Shodan API Integration
- Email Harvesting (
theHarvester-style) - Banner Grabbing
- SNMP Enumeration
- SMB Enumeration (
impacket) - NetBIOS / LLMNR Poisoning
- EXIF Metadata Extraction from Images/Docs
- Username / Social Media Enumeration
- keylogger
- Captures a screenshot of the entire desktop on a Windows system
- Execute shellcode from a web server
- Sandbox Detection
- Monitor processes on a Windows system
- Monitor specific directories
- Code Injection
- Browser Hijacking and Login Redirect
- Simple HTTP Server for Capturing Credentials
- Document Exfiltration Using Tumblr
- Generates a new RSA key pair with a 2048-bit key length
- Decrypts and decompresses the encrypted data
- Reverse Shell Generator (TCP / HTTP / HTTPS)
- Bind Shell
- Meterpreter-Style Python Backdoor
- Windows Registry Manipulation
- Token Impersonation (Windows)
- Password Dumping from Memory
- Pass-the-Hash Attack (
impacket) - Mimikatz Integration / Credential Dumping
- Linux SUID / GUID Enumeration
- Cron Job Abuse Detection
- Persistence via Startup Scripts / Cron / Registry
- Data Exfiltration over DNS / ICMP / Covert Channels
- Kerberoasting
- Pass-the-Ticket
- LDAP Enumeration (
ldap3) - BloodHound Data Collection (
BloodHound.py) - SMB Share Enumeration (
SMBMap)
- Payload Obfuscation
- Process Hollowing
- DLL Injection (Windows)
- Log Clearing / Tampering
- File Timestomping
- Polymorphic Shellcode
- Base64 / XOR Payload Encoding
- DNS-Based C2 Channel
- HTTP / HTTPS C2 Beacon
- Slack / Discord C2
- Encrypted C2 with AES
- Heartbeat / Persistence Mechanism
- CVE Scanner / Vulnerability Checker
- Service Version Fingerprinting
- Nmap Python Wrapper (
python-nmap)
- Exploit Development — Buffer Overflow
- Format String Vulnerability Tester
- Custom Fuzzing Framework (TCP / UDP / File / API)
- ROP Chain Generation
- Buffer Overflow Pattern Generator (like
pattern_create) - Shellcode Encoder / Decoder
- Bad Character Finder
- Padding Oracle Attack
- ECB Mode Detection
- Frequency Analysis (Classic Ciphers)
- Weak TLS / SSL Detection
- S/MIME & PGP Key Extraction
- Password Hash Identifier
- AES / XOR Custom Encryption & Decryption
- Phishing Email Generator
- Clone Website for Credential Harvesting
- URL Obfuscation Techniques
- Extract password hashes from a Windows memory dump using Volatility 3
- Redirect execution to the injected shellcode
- Immunity Debugger
- Docker Escape Techniques
- AWS / Azure / GCP Misconfiguration Scanners
- S3 Bucket Enumeration
- Accept input from a file
- Accept input from a pipe
- Capture and process command output
- Redirect input/output streams
- List directory contents
- Example of using
osmodule for directory operations - Create backups of files or directories
- Handle password input securely
- Example of using
getpassfor secure password input - Reprompt for password input
- Generate and handle warning messages
- Example of using Python's logging module
- Log warnings and error codes
- Violent Python
- Grey Hat Python
- Black Hat Python
- Python Penetration Testing Essentials
- Python for Secret Agents
- Python Web Penetration Testing Cookbook
- Learning Penetration Testing with Python
- Python Forensics
- The Beginner's Guide to IDAPython
- Python for Offensive PenTest: A Practical Guide to Ethical Hacking and Penetration Testing Using Python
- Scapy: Send, sniff, dissect and forge network packets
- Impacket: Craft and decode network packets with support for NMB and SMB
- dpkt: Fast, simple packet creation/parsing with TCP/IP protocol definitions
- pypcap, Pcapy, Pcapy-NG, libpcap: Python bindings for libpcap
- libdnet: Low-level networking routines
- SMBMap: Enumerate Samba share drives across an entire domain
- AutoRecon: Multi-threaded network reconnaissance tool
- Habu: Python network hacking toolkit
- Knock Subdomain Scan: Enumerate subdomains through wordlist
- SubBrute: Fast subdomain enumeration tool
- Spoodle: Mass subdomain + poodle vulnerability scanner
- Mitm6: IPv6-based MITM tool
- Mallory: Extensible TCP/UDP man-in-the-middle proxy
- Pytbull-NG: Flexible IDS/IPS testing framework
- Capstone: Lightweight multi-platform disassembly framework
- Keystone: Lightweight multi-platform assembler framework
- diStorm: Disassembler library for AMD64
- pydasm: Python interface to libdasm x86 disassembling library
- Frida: Dynamic instrumentation framework
- Unicorn Engine: CPU emulator framework
- PyEMU: Fully scriptable IA-32 emulator
- Androguard: Reverse engineering and analysis of Android applications
- IDAPython: IDA Pro Python integration plugin
- Ghidrathon: Python 3 scripting extension for Ghidra
- CHIPSEC: Platform security analysis framework
- Paimei: Reverse engineering framework with PyDBG, PIDA, pGRAPH
- python-ptrace: Debugger using ptrace
- PyDbgEng: Python wrapper for Microsoft Windows Debugging Engine
- pefile: Read and work with Portable Executable files
- PyBFD: Python interface to GNU Binary File Descriptor library
- afl-python: American fuzzy lop support for pure-Python code
- Sulley: Fuzzer development and fuzz testing framework
- Peach Fuzzing Platform: Extensible fuzzing framework
- untidy: General purpose XML fuzzer
- Powerfuzzer: Highly automated web fuzzer
- Construct: Library for parsing and building data structures
- Fusil: Python library for writing fuzzing programs
- XSStrike: Advanced XSS detection suite
- Requests: Elegant and simple HTTP library
- lxml: Easy-to-use library for processing XML and HTML
- HTTPie: Human-friendly cURL-like command line HTTP client
- Twill: Command-line web browsing with automated testing support
- FunkLoad: Functional and load web tester
- spynner: Programmatic web browsing with Javascript/AJAX support
- mitmproxy: SSL-capable intercepting HTTP proxy
- spidy: Simple command-line web crawler
- Waymap: Web vulnerability scanner for penetration testers
- Volatility: Extract digital artifacts from volatile memory (RAM)
- Rekall: Memory analysis framework by Google
- TrIDLib: Identify file types from binary signatures
- pyew: Hexadecimal editor and disassembler for malware analysis
- Exefilter: Filter file formats and detect/remove active content
- jsunpack-n: Generic JavaScript unpacker
- yara-python: Identify and classify malware samples
- phoneyc: Pure Python honeyclient implementation
- CapTipper: Analyse HTTP malicious traffic from PCAP files
- Cuckoo: Automated malware analysis system
- CAPE: Malware configuration and payload extraction
- pdfminer.six: Extract text from PDF files
- peepdf-3: Analyse and explore PDF files for malicious content
- Didier Stevens' PDF tools: Analyse, identify and create PDF files
- pyPDF: Pure Python PDF toolkit
- Angr: Binary analysis framework for vulnerability research and exploit development
- ScoutSuite: Multi-cloud security auditing tool
- Certipy: Active Directory Certificate Services enumeration and abuse
- BloodHound.py: Python-based BloodHound ingestor for AD security assessment
- wmiexec.py: Execute Powershell commands via WMI
- Pentestly: Python and Powershell penetration testing framework
- hacklib: Toolkit for hacking enthusiasts
- Exomind: Framework for building decorated graphs and OSINT modules
- Project Jupyter: Enhanced interactive shell
- matplotlib: 2D plotting of arrays
- Mayavi: 3D scientific data visualization
- RTGraph3D: Dynamic 3D graphs
- Beautiful Soup: HTML parser optimized for screen-scraping
- Pandas: High-performance data structures and analysis tools
- NetworkX: Graph library for edges and nodes
- Whoosh: Full-text indexing and searching library
- simplejson: JSON encoder/decoder
- pyparsing: General parsing module
- lxml: Feature-rich library for XML and HTML
- Hachoir: View and edit binary stream field by field
- Pexpect: Control and automate other programs
- SikuliX: Visual technology to search and automate GUIs
- PyQt and PySide: Python bindings for Qt framework
