🏴☠️ tools (py3 version) of Black Hat Python book 🏴☠️
-
Updated
Nov 10, 2024 - Python
🏴☠️ tools (py3 version) of Black Hat Python book 🏴☠️
Professional Use Only - Handle With Extreme Care! This tool is designed for experienced security professionals and red teams. It provides a battle-tested framework for infrastructure hardening, threat detection, and offensive security research. PoisonIvory is not for script kiddies! It intentionally requires deep technical knowledge to operate ...
POC of a Advanced keylogger and covert channel - Remotely receiving victim's keystrokes and clipboard data. emulating an illegal covert channel between the victim and the attacker
The Extractor is a Python script that extracts Google dorks from the official Google Hacking Database (GHDB) XML file and saves them in a CSV file. The script only extracts dorks that contain the "inurl:" operator because they are more specific and useful for targeted web scanning.
Source code for the Go version of the book "Black Hat Python: Python Programming for Hackers and Pentesters, 2nd Edition" by Justin Seitz and Tim Arnold.
All the code from the book "Black Hat Python" by Justin Seitz and Tim Arnold.
我們利用受害者瀏覽色情網站的行為,去蒐集他所點擊的影片標題與網址,再透過他平常使用gmail寄信的行為,我們去蒐集他的寄信者作為威脅的籌碼,將他所觀看的影片資訊寄給他的gmail寄信的好友們,作為警告與威脅。
A compilation of codes and scripts from the book "Black Hat Python" by Justin Seitz.
Add a description, image, and links to the black-hat-python topic page so that developers can more easily learn about it.
To associate your repository with the black-hat-python topic, visit your repo's landing page and select "manage topics."