Stars
📚 Freely available programming books
The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.
An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
Faker is a Python package that generates fake data for you.
A Powerful Spider(Web Crawler) System in Python.
Impacket is a collection of Python classes for working with network protocols.
CTF framework and exploit development library
Modular visual interface for GDB in Python
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
PEDA - Python Exploit Development Assistance for GDB
The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.
PathPicker accepts a wide range of input -- output from git commands, grep results, searches -- pretty much anything. After parsing the input, PathPicker presents you with a nice UI to select which…
GitPython is a python library used to interact with Git repositories.
Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authenticat…
Mimesis is a robust data generator for Python that can produce a wide range of fake data in multiple languages.
Veil 3.1.X (Check version info in Veil at runtime)
Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, build your taylor-made EASM tool, co…
Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.
An opinionated todo-list plugin for Sublime Text editor (version 2 and 3)
Veil Evasion is no longer supported, use Veil 3.0!
A pure-python fully automated and unattended fuzzing framework.